View all detail and faqs for the IIA-CIA-Part3-3P exam
In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as part of reviewing workstations?
What would an internal auditor do to ensure that a process to mitigate risk is in place for the organization's change management process?
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?
While reviewing the contracts for a large city, the internal auditor learns that the organization contracted to perform trash collection is paid based on the number of bins emptied each week as a result, the city has minimal control over payments Which of the following actions should the auditor recommend to give the city greater control over payments?
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?
Based on lest results an IT auditor concluded that the organization would suffer unacceptable toss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
Which of the following statements about mentoring is true?
1) Mentoring can be used effectively for increasing employee retention
2) Mentoring can be used effectively in reducing employees frustration.
3) Mentoring can be used effectively for increasing organization communication.
4) Mentoring can be used effectively as a short term activity consisting of instruction and training
Which of the following statements is true concerning the basic accounting treatment of a partnership?
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?