Which of the following would most likely serve as a foundation for individual operational goats?
Which of the following would most likely serve as a foundation for individual operational goats?A . Individual skills and capabilities.B . Alignment with organizational strategy.C . Financial and human resources of the unit.D . Targets of key performance indicatorsView AnswerAnswer: D
What is the purpose of integration testing?
An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?A . To verify that the application meets stated user requirements.B . To verify that standalone programs match code specifications.C . To verify that the application would work appropriately for the intended number...
Which of the following should software auditors do when reporting internal audit findings related to enterprise wide resource planning?
Which of the following should software auditors do when reporting internal audit findings related to enterprise wide resource planning?A . Draft separate audit reports for business and IT management.B . Conned IT audit findings to business issues.C . Include technical details to support IT issues.D . Include an opinion on...
Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?
An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?A . Normalize the data,B . Obtain the dataC . Identify the risks. Analyze the data.View AnswerAnswer: C
Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?
Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?A . Only preventive measures.B . Alternative and reactive measures.C . Preventive and alternative measures.D . Preventive and reactive measures.View AnswerAnswer: B
Which of the following duties should not be performed by the identified administrator?
An internal auditor identified a database administrator with an incompatible dual role. Which of the following duties should not be performed by the identified administrator?A . Designing and maintaining the database.B . Preparing input data and maintaining the database.C . Maintaining the database and providing its security,D . Designing the...
Which of the following should be the first step in the project management plan?
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?A . Estimate time required to complete the whole project.B . Determine the responses to expected project risks.C . Break the project into manageable components.D . Identify...
Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?
Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?A . Train all employees on bring-your-own-device (BYOD) policies.B . Understand what procedures are in place for locking lost devicesC . Obtain a list of all smart devices in useD...
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?A . Key performance indicators.B . Reports of software customization.C . Change and patch management.D . Master data managementView AnswerAnswer: A
According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?
According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?A . Install and update anti-virus software.B . Implement data encryption techniques.C . Set data availability by user need.D . Upgrade firewall configurationView AnswerAnswer: C