IIA IIA-CIA-Part2 CIA Exam Part Two: Practice of Internal Auditing Online Training
IIA IIA-CIA-Part2 Online Training
The questions for IIA-CIA-Part2 were last updated at Jan 28,2025.
- Exam Code: IIA-CIA-Part2
- Exam Name: CIA Exam Part Two: Practice of Internal Auditing
- Certification Provider: IIA
- Latest update: Jan 28,2025
Which of the following statements about assurance maps is correct?
- A . An assurance map is used by the chief audit executive to coordinate assurance activities with other internal and external assurance providers
- B . An assurance map is a picture of all assurance engagements performed by the internal audit activity across the organization
- C . An assurance map is used by the engagement supervisor to coordinate the roles of various internal audit team members assigned to assurance engagements
- D . An assurance map lists the procedures and testing activities performed by an internal audit team during an assurance engagement
When me internal audit activity does not have sufficient time to complete its usual root cause analysis which c4 the following is most appropriate?
- A . The chief audit executive may recommend that management conduct further work to identify the root cause and address the issue
- B . Internal auditors should finish the engagement without conducting the root cause analysis and draft the audit report, though the report would not be considered complete until the analysis is concluded
- C . internal auditors must adjust their future engagement schedule to ensure that the root cause analysis is always performed before the engagement is concluded
- D . Internal auditors should Instead perform a Pareto rule analysis
Which of the following manual audit approaches describes testing the validity of a document by following it backward to a previously prepared record?
- A . Tracing
- B . Reperformance
- C . Vouching
- D . Walkthrough
Which of the following best illustrates the primary focus of a risk-based approach to control self-assessment?
- A . To evaluate controls regarding the computer security of an oil refinery.
- B . To examine the processes involved in exploring, developing, and operating a gold mine.
- C . To assess the likelihood and impact of events associated with operating a finished goods warehouse.
- D . To link a financial institution’s business objectives to a work unit responsible for the associated risk.
If observed during fieldwork by an internal auditor, which of the following activities is least important to communicate formally to the chief audit executive?
- A . Acts that may endanger the health or safety of individuals.
- B . Acts that favor one party to the detriment of another.
- C . Acts that damage or have an adverse effect on the environment.
- D . Acts that conceal inappropriate activities in the organization.
Which of the following should management action plans include at a minimum?
- A . An implementer for the action plan
- B . An owner of the action plan
- C . The internal auditor’s next review date of the action plan
- D . Detailed procedures for the action plan
During a fraud interview, it was discovered that unquestioned authority enabled a vice president to steal funds from the organization.
Which of the following best describes this condition?
- A . Scheme.
- B . Opportunity.
- C . Rationalization.
- D . Pressure.
What is the primary objective of an engagement supervisor’s review of key activities performed during the engagement?
- A . To ensure that the engagement is completed on time and within budget
- B . To ensure that all work performed meets acceptable quality standards
- C . To ensure that management has provided suitable responses to all observations
- D . To ensure that management is satisfied with the progress of the engagement
Which of the following would most likely cause an internal auditor to consider adding fraud work steps to the audit program?
- A . Improper segregation of duties.
- B . Incentives and bonus programs.
- C . An employee’s reported concerns.
- D . Lack of an ethics policy.
What is the best course of action for a chief audit executive if an internal auditor identifies in the early stage of an audit that some employees have inappropriate access to a key system?
- A . Contact the audit committee chair to discuss the finding
- B . Obtain verbal assurance from management that the inappropriate access will be removed
- C . Issue an interim audit report so that management can implement action plans
- D . Ask the auditor to create a ticket with the IT help desk requesting to revoke the inappropriate access