Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CIA Challenge Exam IIA-ACCA Updated Exam

Page: 18 / 22
Question 72

An internal auditor performed a review of IT outsourcing and found that the service provider was failing to meet the terms of the service level agreement. Which of the following approaches is most appropriate to address this concern?

Options:

A.

The organization should review the skill requirements and ensure that the service provider is maintaining sufficient expertise and retaining skilled resources.

B.

The organization should proactively monitor the performance of the service provider, escalate concerns, and use penalty clauses in the contract where necessary.

C.

The organization should ensure that there is a clear management communication strategy and path for evaluating and reporting on all outsourced services concerns.

D.

The organization should work with the service provider to review the current agreement and expectations relating to objectives, processes, and overall performance.

Question 73

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?

Options:

A.

The auditor eliminated duplicate information.

B.

The auditor organized data to minimize useless information.

C.

The auditor made data usable for a specific purpose by ensuring that anomalies were identified and corrected.

D.

The auditor ensured data fields were consistent and that data could be used for a specific purpose.

Question 74

According to IIA guidance, which of the following statements is true regarding analytical procedures?

Options:

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences but cannot be used to identify the absence of differences

Question 75

Which of the following risks is best addressed by encryption?

Options:

A.

Information integrity risk.

B.

Privacy risk

C.

Access risk

D.

Software risk

Page: 18 / 22
Exam Code: IIA-ACCA
Exam Name: ACCA CIA Challenge Exam
Last Update: Nov 21, 2024
Questions: 604
IIA-ACCA pdf

IIA-ACCA PDF

$28  $80
IIA-ACCA Engine

IIA-ACCA Testing Engine

$33.25  $95
IIA-ACCA PDF + Engine

IIA-ACCA PDF + Testing Engine

$45.5  $130