IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

IIA IIA-CIA-Part2인증자료

그렇게 많은 IT인증덤프공부자료를 제공하는 사이트중 Pass4Test의 인지도가 제일 높은 원인은 무엇일가요?그건 Pass4Test의 제품이 가장 좋다는 것을 의미합니다. Pass4Test에서 제공해드리는 IIA IIA-CIA-Part2덤프공부자료는 IIA IIA-CIA-Part2실제시험문제에 초점을 맞추어 시험커버율이 거의 100%입니다. 이 덤프만 공부하시면  IIA IIA-CIA-Part2시험패스에 자신을 느끼게 됩니다.







NO.1 What would be used to determine the collectability of accounts receivable balances?

A. The file of related shipping documents.

B. Negative accounts receivable confirmations.

C. Positive accounts receivable confirmations.

D. An aged accounts receivable listing.

Answer: D




NO.2 Which of the following procedures would provide the best evidence of the effectiveness of a

credit-granting function?

A. Observe the process.

B. Review the trend in receivables write-offs.

C. Ask the credit manager about the effectiveness of the function.

D. Check for evidence of credit approval on a sample of customer orders.

Answer: B




NO.3 When internal auditors provide consulting services, the scope of the engagement is primarily

determined by:

A. Internal auditing standards.

B. The audit engagement team.

C. The engagement client.

D. The internal audit activity's charter.

Answer: C




NO.4 An internal auditor is assigned to conduct an audit of security for a local area network (LAN) in

the finance department of the organization. Investment decisions, including the use of hedging

strategies and financial derivatives, use data and financial models which run on the LAN. The LAN is

also used to download data from the mainframe to assist in decisions. Which of the following

should be considered outside the scope of this security audit engagement?

A. Investigation of the physical security over access to the components of the LAN.

B. The ability of the LAN application to identify data items at the field or record level and implement

user access security at that level.

C. Interviews with users to determine their assessment of the level of security in the system and the

vulnerability of the system to compromise.

D. The level of security of other LANs in the company which also utilize sensitive data.

Answer: D




NO.5 Which of the following situations might allow an employee to steal checks sent to an

organization and subsequently cash them?

A. Checks are not restrictively endorsed when received.

B. Only one signature is required on the organization's checks.

C. One employee handles both accounts receivable and purchase orders.

D. One employee handles both cash deposits and accounts payable.

Answer: A




NO.6 Which of the following would be an appropriate improvement to controls over large

quantities of consumable material that are charged to expense when placed in bins which are

accessible to production workers?

A. Relocate bins to the inventory warehouse.

B. Require management to compare the cost of consumable items used to the budget.

C. Lock the bins during normal working hours.

D. None of the above actions are needed for items of minor cost and size.

Answer: B




NO.7 A manufacturing process could create hazardous waste at several production stages, from

raw materials handling to finished goods storage. If the objective of a pollution prevention audit

engagement is to identify opportunities for minimizing waste, in what order should the following

opportunities be considered?

I.Recycling and reuse.

II.Elimination at the source.

III.Energy conservation.

IV.Recovery as a usable product.

Treatment.

A. V, II, IV, I, III.

B. IV, II, I, III, V.

C. I, III, IV, II, V.

D. III, IV, II, V, I.

Answer: B




NO.8 Which of the following would be a red flag that indicates the possibility of inventory fraud?

I.The controller has assumed responsibility for approving all payments to certain vendors.

II.The controller has continuously delayed installation of a new accounts payable system, despite a

corporate directive to implement it.

III.Sales commissions are not consistent with the organization's increased levels of sales.

IV.Payments to certain vendors are supported by copies of receiving memos, rather than originals.

A. I and II only.

B. II and III only.

C. I, II, and IV only.

D. I, III, and IV only.

Answer: C




Posted 2014/8/7 10:15:47  |  Category: IIA  |  Tag: IIA-CIA-Part2인증자료