IIA Certified Internal Auditor Exam CIA Exam Questions in PDF

Free IIA CIA Dumps Questions (page: 32)

Which of the following is a control weakness that allows for the greatest probability of fraud?

  1. The log-on accounts for the computerized information management system are not immediately canceled for terminated employees.
  2. Scheduled physical counts to verify the perpetual inventory system are frequently delayed because of staff shortages and conflicting priorities.
  3. An employee is responsible for entering identifying information into the inventory database whenever supplies are delivered. A manager periodically compares inventory records with supplies on hand.
  4. The employee who handles all cash sales has responsibility for balancing the cash register and making bank deposits.

Answer(s): D



In a manufacturing organization, all sales prices are determined centrally and are electronically sent to the distribution centers to update their sales price tables. Any pricing deviations must be approved by central headquarters. To determine how this process is functioning, an internal auditor should

  1. Document the flow of sales price information, and determine how the table is accessed and updated.
  2. Develop a flowchart of the sales order process to determine how orders are taken and priced.
  3. Identify who approves the shipment of goods and how the goods are priced.
  4. Obtain a copy of the existing flowchart for the computer program to determine how price data are accessed.

Answer(s): A



To determine if a new computer system is improving the use of a manufacturer's limited facilities in serving the largest number of customers, an auditor should compare

  1. The number of reworked orders and their costs before and after system installation.
  2. Inventory and materials handling costs before and after system installation.
  3. The number of orders filled and their cycle times before and after system installation.
  4. The number of reworked orders and orders filled before and after system installation.

Answer(s): C



A retail store uses a computerized perpetual inventory system with annual physical counts. The best approach for determining whether item counts in the perpetual inventory records are accurate at interim dates is to use generalized audit software to

  1. Generate stratified random samples of items for manual counting and compare counts to perpetual inventory records.
  2. Compare beginning and ending perpetual inventory counts after adjustment for sales and replenishments.
  3. Compute revised item count values by adjusting existing counts for spoilage and shrinkage.
  4. Simulate inventory transactions between physical inventory counts taken annually.

Answer(s): A



Which of the following best describes the most important criteria when assigning responsibility for specific tasks required in an audit engagement?

  1. Auditors must be given assignments based primarily upon their years of experience.
  2. All auditors assigned an audit task must have the knowledge and skills necessary to complete the task satisfactorily.
  3. Tasks must be assigned to the audit team member who is most qualified to perform them.
  4. All audit team members must have the skills necessary to satisfactorily complete any task that will be required in the audit engagement.

Answer(s): B



Share your comments for IIA CIA exam with other users:

S
Siyya
1/19/2024 8:30:00 PM

might help me to prepare for the exam

T
Ted
6/21/2023 11:11:00 PM

just paid and downlaod the 2 exams using the 50% sale discount. so far i was able to download the pdf and the test engine. all looks good.

P
Paul K
11/27/2023 2:28:00 AM

i think it should be a,c. option d goes against the principle of building anything custom unless there are no work arounds available

P
ph
6/16/2023 12:41:00 AM

very legible

S
sephs2001
7/31/2023 10:42:00 PM

is this exam accurate or helpful?

A
ash
7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days

S
Sneha
8/17/2023 6:29:00 PM

this is useful

S
sachin
12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected

T
tomAws
7/18/2023 5:05:00 AM

nice questions

R
Rahul
6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?

T
TeamOraTech
12/5/2023 9:49:00 AM

very helpful to clear the exam and understand the concept.

C
Curtis
7/12/2023 8:20:00 PM

i think it is great that you are helping people when they need it. thanks.

S
sam
7/17/2023 6:22:00 PM

cannot evaluate yet

N
nutz
7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid

R
rajesh soni
1/17/2024 6:53:00 AM

good examplae to learn basic

T
Tanya
10/25/2023 7:07:00 AM

this is useful information

N
Nasir Mahmood
12/11/2023 7:32:00 AM

looks usefull

J
Jason
9/30/2023 1:07:00 PM

question 81 should be c.

T
TestPD1
8/10/2023 12:22:00 PM

question 18 : response isnt a ?

A
ally
8/19/2023 5:31:00 PM

plaese add questions

D
DIA
10/7/2023 5:59:00 AM

is dumps still valid ?

A
Annie
7/7/2023 8:33:00 AM

thanks for this

A
arnie
9/17/2023 6:38:00 AM

please upload questions

T
Tanuj Rana
7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning

F
Future practitioner
8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!

A
Ace
8/3/2023 10:37:00 AM

number 52 answer is d

N
Nathan
12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help

C
Corey
12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.

R
Rajender
10/18/2023 3:54:00 AM

i would like to take psm1 exam.

B
Blessious Phiri
8/14/2023 9:53:00 AM

cbd and pdb are key to the database

A
Alkaed
10/19/2022 10:41:00 AM

the purchase and download process is very much streamlined. the xengine application is very nice and user-friendly but there is always room for improvement.

D
Dave Gregen
9/4/2023 3:17:00 PM

please upload p_sapea_2023

S
Sarah
6/13/2023 1:42:00 PM

anyone use this? the question dont seem to follow other formats and terminology i have been studying im getting worried

S
Shuv
10/3/2023 8:19:00 AM

good questions

AI Tutor 👋 I’m here to help!