Question: 1
Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?
Question: 2
Which of the following factors should be considered when determining the appropriate combination of manual techniques and computer-assisted audit techniques (CAATs) to be used during an audit?
1. Acceptance of CAATs findings by entity management.
2. Computer knowledge and expertise of the auditor.
3. Time constraints.
4. Level of audit risk.
Question: 3
According to IIA guidance, which of the following describes the primary reason to implement environmental and social safeguards within an organization?
Question: 4
When auditing the award of a major contract, which of the following should an internal auditor suspect as a red flag for a bidding fraud scheme?
1. Subsequent change orders increase requirements for low-bid items.
2. Material contract requirements are different on the actual contract than on the request for bids.
3. A high percentage of employees are charged to indirect accounts.
4. Losing bidders are hired as subcontractors.
Question: 5
When setting the scope for the identification and assessment of key risks and controls in a process, which of the following would be the least appropriate approach?