Which of The following two approaches can be used to evaluate management controls in performance audits?
A. Targeted approach
B. Planning based approach
C. Measurement based approach
D. Comprehensive approach
Financial statements which are fairly presented meet all of the following guide lines EXCEPT:
A. Generally accepted accounting principles are used.
B. Financial statements reflect underlying transactions and events in a way that facilities the presentation of the financial position, results of operations, and cash flows.
C. Ensuring that staff auditors are qualified to perform their assignments and verifying that audit working papers adequately support audit findings, conclusions, and recommendations.
D. Financial statements classify and summarize information in a reasonable manner
___________are the framework that management establishes to ensure that it meets its responsibilities in a variety of areas. The objectives _________of are that all transactions should be authorized, accounted for accurately and completely, and in the correct time frame.
A. Internal controls, external controls
B. External controls, internal controls
C. Internal controls, accounting controls
D. Accounting controls, internal controls
All of the following are the factors on which audit work schedules may be based on EXCEPT:
A. The length of time since the area was last audited and the extent and type of findings in the last audit.
B. Audits prioritized based on assessment of the degree of risk of potential loss (such as potential loss of dollars, lives, or of public trust) associated with the audit area.
C. Audit work scheduled (e.g., activities to be audited, time frames for audit, resource estimates).
D. The occurrence of major recent changes in operations, programs, systems, or controls and the availability of audit staff resources.
The form and content of written policies and procedures should be appropriate to the size and structure of the auditing department and the complexity of its work. Formal administrative and technical audit manuals help employees to consistently comply with established performance standards.
Then who is responsible for developing and maintaining written policies and procedures to guide audit staff?
A. The head of the audit unit
B. A director or chief
C. The head of the department
D. Audit staff
Security administration is responsible for security over the computer facility, including all aspects of physical and data security. Following is a list of Control techniques for security administration. Please choose the correct option.
A. Ensure that there are adequate backup power sources, alarms, and prevention equipment
B. Ensuring that the computer security administration function is independent of computer operations.
C. All of the above
D. None of the above
The characteristics of ____________ will vary based on the _____ of the audit unit and the nature of its work. Where as The frequency of required quality assurance reviews varies based on the _____ of standards followed.
A. Internal quality control systems, size, type
B. External quality control systems, size, type
C. External quality control systems, quality, type
D. Internal quality control systems, length, type
Program audits are designed to assess whether a program, activity, or function is achieving the desired results or benefits established by the legislature or other authorizing body. Program audits consider all of the following effectiveness issues EXCEPT:
A. Whether the program is achieving its intended objectives and is making its intended impact on stakeholders.
B. Whether the program duplicates, overlaps, or conflicts with another program.
C. Reported measures of economy and efficiency that are valid and reliable.
D. Whether the organization has adequate systems for planning, managing, and monitoring to achieve its goals and objectives.
All of the following are the Aspects of control activities that would help an auditor assess vulnerability EXCEPT:
A. Inadequate performance monitoring by high-level management and prolonged under staffing.
B. Acceptance of audit findings and corrective action taken.
C. Lack of competence and integrity of management and staff.
D. Planning about future events
Security controls reduce or prevent disruption of service, loss of assets, and unauthorized access to equipment. An effective physical security program is necessary to protect the system and data. All of the following are techniques for security control.
A. Establish control over access to and within the facility.
B. Implement a written and tested disaster contingency plan.
C. Ensure that there are adequate backup power sources. alarms, and prevention equipment.
D. All of the above
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your IIA-CGAP exam preparations and IIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.