IIA IIA-CRMA-ADV Certification in Risk Management Assurance Online Training
IIA IIA-CRMA-ADV Online Training
The questions for IIA-CRMA-ADV were last updated at Nov 26,2024.
- Exam Code: IIA-CRMA-ADV
- Exam Name: Certification in Risk Management Assurance
- Certification Provider: IIA
- Latest update: Nov 26,2024
While attending a conference, an internal auditor won an all-expense paid trip sponsored by a vendor of the internal auditor’s organization.
Which of the following actions are most appropriate for the auditor to take?
- A . Consult with an immediate supervisor and notify the organization’s audit committee.
- B . Consult with an immediate supervisor and review the organization’s ethics policy.
- C . Give the prize to a friend or family member and notitfy the organization’s audit committee.
- D . Give the prize to a friend or family member and review the organization’s ethics policy.
While attending a conference, an internal auditor won an all-expense paid trip sponsored by a vendor of the internal auditor’s organization.
Which of the following actions are most appropriate for the auditor to take?
- A . Consult with an immediate supervisor and notify the organization’s audit committee.
- B . Consult with an immediate supervisor and review the organization’s ethics policy.
- C . Give the prize to a friend or family member and notitfy the organization’s audit committee.
- D . Give the prize to a friend or family member and review the organization’s ethics policy.
While attending a conference, an internal auditor won an all-expense paid trip sponsored by a vendor of the internal auditor’s organization.
Which of the following actions are most appropriate for the auditor to take?
- A . Consult with an immediate supervisor and notify the organization’s audit committee.
- B . Consult with an immediate supervisor and review the organization’s ethics policy.
- C . Give the prize to a friend or family member and notitfy the organization’s audit committee.
- D . Give the prize to a friend or family member and review the organization’s ethics policy.
Cost of the engagement versus the potential benefits.
- A . 1 and 4 only
- B . 2 and 3 only
- C . 2, 3, and 4 only
- D . 1, 2, 3, and 4
Which of the following is the most significant disadvantage of using checklists to evaluate internal controls?
- A . They serve as a reminder of what controls should exist in a process.
- B . They require yes/no responses to specific questions, not open-ended responses.
- C . They do not capture all controls that may exist.
- D . They are useful in assessing risk.
An internal auditor notes that employees are able to download files from the internet. According to IIA guidance, which of the following strategies would best protect the organization from the risk of copyright infringement and licensing violations resulting from this practice?
- A . Apply antivirus and patch management software.
- B . Utilize dedicated and encrypted network connections.
- C . Install a software inventory management application.
- D . Utilize secure socket layer encryption.
An internal auditor notes that employees are able to download files from the internet. According to IIA guidance, which of the following strategies would best protect the organization from the risk of copyright infringement and licensing violations resulting from this practice?
- A . Apply antivirus and patch management software.
- B . Utilize dedicated and encrypted network connections.
- C . Install a software inventory management application.
- D . Utilize secure socket layer encryption.
An internal auditor notes that employees are able to download files from the internet. According to IIA guidance, which of the following strategies would best protect the organization from the risk of copyright infringement and licensing violations resulting from this practice?
- A . Apply antivirus and patch management software.
- B . Utilize dedicated and encrypted network connections.
- C . Install a software inventory management application.
- D . Utilize secure socket layer encryption.
An internal auditor notes that employees are able to download files from the internet. According to IIA guidance, which of the following strategies would best protect the organization from the risk of copyright infringement and licensing violations resulting from this practice?
- A . Apply antivirus and patch management software.
- B . Utilize dedicated and encrypted network connections.
- C . Install a software inventory management application.
- D . Utilize secure socket layer encryption.
Justified and necessary, according to the IIA Code of Ethics and Standards.
- A . 1 only
- B . 2 only
- C . 3 only
- D . 1 and 2 only