Which of the following methods, if used in conjunction with electronic data interchange (EDI), will improve the organization's cash management program, reduce transaction data input time and errors, and allow the organization to negotiate discounts with EDI vendors based on prompt payment?
A. Electronic funds transfer.
B. Knowledge-based systems.
C. Biometrics.
D. Standardized graphical user interface.
The first stage in the development of a crisis management program is to:
A. Formulate contingency plans.
B. Conduct a risk analysis.
C. Create a crisis management team.
D. Practice the response to a crisis.
Which of the following are appropriate functions for an IT steering committee?
1) Assess the technical adequacy of standards for systems design and programming. 2) Continually monitor of the adequacy and accuracy of software and hardware in use. 3) Assess the effects of new technology on the organization's IT operations. 4) Provide broad oversight of implementation, training, and operation of new systems.
A. 1, 2, and 3
B. 1, 2, and 4
C. 1, 3, and 4
D. 2, 3, and 4
Which of the following is true regarding an organization's relationship with external stakeholders?
A. Specific guidance must be followed when interacting with nongovernmental organizations.
B. Disclosure laws tend to be consistent from one jurisdiction to another.
C. There are several internationally recognized standards for dealing with financial donors.
D. Legal representation should be consulted before releasing internal audit information to other assurance
An organization uses a database management system (DBMS) as a repository for data. The DBMS, in turn, supports a number of end-user developed applications which were created using fourth-generation programming languages. Some of the applications update the database. Which of the following is the most important control related to the integrity of the data in the database?
A. End users have their read-only applications approved by the information systems department before accessing the database.
B. Concurrency update controls are in place.
C. End-user applications are developed on personal computers before being implemented on the mainframe.
D. A hierarchical database model is adopted so that multiple users can be served at the same time.
Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?
A. Each party's negotiator presents a menu of options to the other party.
B. Each party adopts one initial position from which to start.
C. Each negotiator minimizes the information provided to the other party.
D. Each negotiator starts with an offer, which is optimal from the negotiator's perspective.
Which of the following statements pertaining to a market skimming pricing strategy is not true?
A. The strategy is favored when unit costs fall with the increase in units produced.
B. The strategy is favored when buyers are relatively insensitive to price increases.
C. The strategy is favored when there is insufficient market capacity and competitors cannot increase market capacity.
D. The strategy is favored when high price is perceived as high quality.
Which of the following would best prevent unauthorized external changes to an organization's data?
A. Antivirus software, firewall, data encryption.
B. Firewall, data encryption, backup procedures.
C. Antivirus software, firewall, backup procedures.
D. Antivirus software, data encryption, change logs.
A holding company set up a centralized group technology department, using a local area network with a mainframe computer to process accounting information for all companies within the group. An internal auditor would expect to find all of the following controls within the technology department except:
A. Adequate segregation of duties between data processing controls and file security controls.
B. Documented procedures for remote job entry and for local data file retention.
C. Emergency and disaster recovery procedures and maintenance agreements in place to ensure continuity of operations.
D. Established procedures to prevent and detect unauthorized changes to data files.
Which of the following control techniques would minimize the risk of interception during transmission in an
electronic data interchange system?
1) Encryption.
2) Traffic padding.
3) Edit checks.
4) Structured data format.
A. 1 and 2 only
B. 2 and 3 only
C. 3 and 4 only
D. 1, 2, and 3 only
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your IIA-CIA-PART3-3P exam preparations and IIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.