IIA IIA-CIA-Part3 Übungsprüfungen
Zuletzt aktualisiert am 27.04.2025- Prüfungscode: IIA-CIA-Part3
- Prüfungsname: CIA Exam Part Three: Business Knowledge for Internal Auditing
- Zertifizierungsanbieter: IIA
- Zuletzt aktualisiert am: 27.04.2025
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?
- A . Variety.
- B . Velocity.
- C . Volume.
- D . Veracity.
An organization buys equity securities for trading purposes and sells them within a short time period.
Which of the following is the correct way to value and report those securities at a financial statement date?
- A . At fair value with changes reported in the shareholders‘ equity section.
- B . At fair value with changes reported in net income.
- C . At amortized cost in the income statement.
- D . As current assets in the balance sheet
According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
- A . HTTP sites provide sufficient security to protect customers’credit card information.
- B . Web servers store credit cardholders’information submitted for payment.
- C . Database servers send cardholders’ information for authorization in clear text.
- D . Payment gatewaysauthorizecredit cardonlinepayments.
Which of the following attributes of data is the most significantly impacted by the internet of things?
- A . Normalization
- B . Velocity
- C . Structuration
- D . Veracity
Which of the following is a limitation of the remote wipe for a smart device?
- A . Encrypted data cannot be locked to prevent further access
- B . Default settings cannot be restored on the device.
- C . All data, cannot be completely removed from the device
- D . Mobile device management software is required for successful remote wipe
The budgeted cost of work performed is a metric best used to measure which project management activity?
- A . Resource planning.
- B . Cost estimating
- C . Cost budgeting.
- D . Cost control.
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?
- A . There is a greater need for organizations to rely on users to comply with policies and procedures.
- B . With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures.
- C . Incident response times are less critical in the BYOD environment, compared to a traditional environment
- D . There is greater sharing of operational risk in a BYOD environment
An intruder posing as the organization’s CEO sent an email and tricked payroll staff into providing employees‘ private tax information.
What type of attack was perpetrated?
- A . Boundary attack.
- B . Spear phishing attack.
- C . Brute force attack.
- D . Spoofing attack.
Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?
- A . Decentralized
- B . Centralized
- C . Departmentalized
- D . Tall structure
Management is pondering the following question:
"How does our organization compete?"
This question pertains to which of the following levels of strategy?
- A . Functional-level strategy
- B . Corporate-level strategy.
- C . Business-level strategy,
- D . DepartmentsHevet strategy