Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the IIA CIA IIA-CIA-Part3-3P Questions and answers with ValidTests

Exam IIA-CIA-Part3-3P All Questions
Exam IIA-CIA-Part3-3P Premium Access

View all detail and faqs for the IIA-CIA-Part3-3P exam

Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following best describes a transformational leader, as opposed to a transactional leader?

Options:

A.

The leader searches for deviations from the rules and standards and intervenes when deviations exist.

B.

The leader intervenes only when performance standards are not met.

C.

The leader intervenes to communicate high expectations.

D.

The leader does not intervene to promote problem-solving.

Expert Solution
Questions # 12:

A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software

that will remotely wipe data in case of theft or other incidents.

Which of the following should the organization ensure in exchange for the employees' consent?

Options:

A.

That those employees who do not consent to MDM software cannot have an email account.

B.

That personal data on the device cannot be accessed and deleted by system administrators.

C.

That monitoring of employees' online activities is conducted in a covert way to avoid upsetting them.

D.

That employee consent includes appropriate waivers regarding potential breaches to their privacy.

Expert Solution
Questions # 13:

Which of the following is a characteristic of big data?

Options:

A.

Big data is often structured.

B.

Big data analytic results often need to be visualized.

C.

Big data is often generated slowly and is highly variable.

D.

Big data comes from internal sources kept in data warehouses.

Expert Solution
Questions # 14:

In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners.

Which of the following network types is illustrated by this scenario?

Options:

A.

A value-added network.

B.

A local area network.

C.

A metropolitan area network.

D.

A wide area network.

Expert Solution
Questions # 15:

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

Options:

A.

The risk that users try to bypass controls and do not install required software updates.

B.

The risk that smart devices can be lost or stolen due to their mobile nature.

C.

The risk that an organization intrusively monitors personal information stored on smart devices.

D.

The risk that proprietary information is not deleted from the device when an employee leaves.

Expert Solution
Questions # 16:

A restaurant deeded to expand its business to include delivery services rather than relying on third-party food delivery services. Which of the following best describes the restaurant's strategy?

Options:

A.

Diversification

B.

Vertical integration

C.

Risk avoidance

D.

Differentiation

Expert Solution
Questions # 17:

A retail organization mistakenly did not include S10.000 of inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?

Options:

A.

Cost of sales and net income are understated

B.

Cost of sales and net income are overstated

C.

Cost of sales is understated and net income is overstated.

D.

Cost of sales is overstated and net income is understated.

Expert Solution
Questions # 18:

An organization has instituted a bring-your-own-device (BYOD) work environment Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?

Options:

A.

Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.

B.

Ensure that relevant access to key applications is strictly controlled through an approval and review process

C.

Institute detection and authentication controls for all devices used for network connectivity and data storage

D.

Use management software to scan and then prompt patch reminders when devices connect to the network

Expert Solution
Questions # 19:

An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?

Options:

A.

Normalize the data

B.

Obtain the data

C.

identify the risks

D.

Analyze the data

Expert Solution
Questions # 20:

Which of the following security controls would provide the most efficient and effective authentication for customers to access their online shopping account?

Options:

A.

12-digit password feature.

B.

Security question feature.

C.

Voice recognition feature.

D.

Two-level sign-on feature.

Expert Solution
Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions