Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

IIA-CIA-Part3 Questions and Answers

Question # 6

While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?

A.

Review the call center script used by customer service agents to interact with callers, and update the script if necessary.

B.

Be-emphasize the importance of call center employees completing a certain number of calls per hour.

C.

Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve.

D.

Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily

Full Access
Question # 7

Which of the following is a likely result of outsourcing?

A.

Increased dependence on suppliers.

B.

Increased importance of market strategy.

C.

Decreased sensitivity to government regulation

D.

Decreased focus on costs

Full Access
Question # 8

A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?

A.

Cost of sales and net income are understated.

B.

Cost of sales and net income are overstated.

C.

Cost of sales is understated and not income is overstated.

D.

Cost of sales is overstated and net Income is understated.

Full Access
Question # 9

Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?

A.

Verify completeness and accuracy.

B.

Verify existence and accuracy.

C.

Verify completeness and integrity.

D.

Verify existence and completeness.

Full Access
Question # 10

Which of the following differentiates a physical access control from a logical access control?

A.

Physical access controls secure tangible IT resources, whereas logical access controls secure software and data internal to the IT system.

B.

Physical access controls secure software and data internal to the IT system, whereas logical access controls secure tangible IT resources.

C.

Physical access controls include firewalls, user IDs, and passwords, whereas logical access controls include locks and security guards.

D.

Physical access controls include input processing and output controls, whereas logical access controls include locked doors and security guards.

Full Access
Question # 11

Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?

A.

The term describes budgets that exclude fixed costs.

B.

Flexible budgets exclude outcome projections, which are hard to determine, and instead rely on the most recent actual outcomes.

C.

The term is a red flag for weak budgetary control activities.

D.

Flexible budgets project data for different levels of activity.

Full Access
Question # 12

Which of the following is true regarding the use of remote wipe for smart devices?

A.

It can restore default settings and lock encrypted data when necessary.

B.

It enables the erasure and reformatting of secure digital (SD) cards.

C.

It can delete data backed up to a desktop for complete protection if required.

D.

It can wipe data that is backed up via cloud computing

Full Access
Question # 13

Which observations should the chief audit executive include in the executive summary of the final engagement communication?

A.

All observations

B.

Only observations with an action plan

C.

Only significant observations

D.

Only observations agreed with management

Full Access
Question # 14

Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?

A.

The organization sells inventory to an overseas subsidiary at fair value.

B.

The local subsidiary purchases inventory at a discounted price.

C.

The organization sells inventory to an overseas subsidiary at the original cost.

D.

The local subsidiary purchases inventory at the depreciated cost.A

Full Access
Question # 15

An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?

A.

Cold recovery plan,

B.

Outsourced recovery plan.

C.

Storage area network recovery plan.

D.

Hot recovery plan

Full Access
Question # 16

Which of the following measures the operating success of a company for a given period of time?

A.

Liquidity ratios.

B.

Profitability ratios.

C.

Solvency ratios.

D.

Current ratios.

Full Access
Question # 17

An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?

A.

To verify that the application meets stated user requirements.

B.

To verify that standalone programs match code specifications.

C.

To verify that the application would work appropriately for the intended number of users.

D.

To verify that all software and hardware components work together as intended.

Full Access
Question # 18

Which approach should a chief audit executive take when preparing the internal audit plan?

A.

Organize the auditable units within the organization into an audit universe to facilitate risk assessment

B.

Select auditable units within the organization based on monetary values

C.

Evaluate auditable units based on senior management's information about risks

D.

Eliminate auditable units not mandated to be audited by laws and regulations applicable to the organization

Full Access
Question # 19

Employees of an organization noticed that an exterior surface of the office building was deteriorating. Upon investigation, it was found that the deterioration was caused by harsh cleaning chemicals used to remove excessive bird droppings, and that the birds were drawn to the building to feed from a spider infestation. Which of the following best represents a root cause-based recommendation for this situation?

A.

Repair the surface of the building

B.

Discontinue the use of the cleaning chemicals

C.

Scare the birds away by installing scarecrows

D.

Enhance cleaning of the building to displace spiders

Full Access
Question # 20

Which of the following is most influenced by a retained earnings policy?

A.

Cash.

B.

Dividends.

C.

Gross margin.

D.

Net income.

Full Access
Question # 21

An internal audit engagement team found that the risk register of the project under review did not include significant risks identified by the internal audit function. The project manager explained that risk register preparations are facilitated by risk managers and that each project’s risk review follows the same set of questions. Which of the following recommendations will likely add the greatest value to the project management process of the organization?

A.

Update the risk register of the project with the newly identified risks

B.

Train senior management on risk management principles

C.

Revise the methodology of the project risk identification process

D.

Reassign the responsibility of risk register completion to risk managers

Full Access
Question # 22

In an organization with a poor control environment, which of the following indicators would help an internal audit function measure its ability to provide risk-based assurance?

A.

The value of potential cost savings, or prevented losses, identified per year

B.

The percentage of observations that can be linked to significant organizational risks

C.

The extent of data mining or data analytics used during assurance engagements

D.

The amount of time dedicated to organization-wide risk assessments

Full Access
Question # 23

A chief audit executive (CAE) is calculating the available internal audit resource hours while planning the annual internal audit plan. The CAE needs to calculate the total number of hours available for audits. Which of the following should be deducted in order to have time available only for engagements?

A.

Time spent on coaching the internal audit function on new engagement procedures

B.

Time spent on the preliminary risk assessment of the engagement

C.

Time spent for the documentation of supporting files for the engagement

D.

Time spent on reporting the results of the engagement

Full Access
Question # 24

Through meetings with management, an organization's chief audit executive (CAE) learns of a risk that exceeds the established risk tolerance. What would be an appropriate next action for the CAE to take?

A.

Design and recommend an appropriate response to the risk

B.

Discuss the risk and the implications of the risk with management responsible for the risk area

C.

Schedule an audit of the risk area to assess the risk likelihood and impact

D.

Prepare a memo to report the risk to the board

Full Access
Question # 25

Which of the following best describes a transformational leader, as opposed to a transactional leader?

A.

The leader searches for deviations from the rules and standards and intervenes when deviations exist.

B.

The leader intervenes only when performance standards are not met.

C.

The leader intervenes to communicate high expectations.

D.

The leader does not intervene to promote problem-solving

Full Access
Question # 26

Which of the following statements is accurate when planning for an external quality assurance assessment of the internal audit function?

A.

The external assessment would include the audit function’s compliance with laws and regulations

B.

The selected qualified assessor can be from the organization’s shared services team

C.

The external assessment team members must work for an accounting firm

D.

The frequency of the performance of assessments should be considered by the assessor

Full Access
Question # 27

According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?

A.

Install and update anti-virus software.

B.

Implement data encryption techniques.

C.

Set data availability by user need.

D.

Upgrade firewall configuration

Full Access
Question # 28

Which of the following attributes of data are cybersecurity controls primarily designed to protect?

A.

Veracity, velocity, and variety.

B.

Integrity, availability, and confidentiality.

C.

Accessibility, accuracy, and effectiveness.

D.

Authorization, logical access, and physical access.

Full Access
Question # 29

An internal auditor has finalized an engagement of the vendor master file. The results of the current engagement do not differ significantly from that of last year, in which several significant weaknesses in internal controls were reported. The internal auditor states in the final communication that the internal controls are as effective as that of the previous year. Which of the following elements of quality of communication could be improved?

A.

Conciseness

B.

Constructiveness

C.

Objectivity

D.

Accuracy

Full Access
Question # 30

When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?

A.

Activity

B.

Subprocess

C.

Major process

D.

Mega process

Full Access
Question # 31

The chief audit executive (CAE) and management of the area under review disagree over managing a significant risk item. According to IIA guidance, which of the following actions should the CAE take first?

A.

Refer the matter to the board for resolution

B.

Consult the approved audit charter on supremacy of internal auditors’ decisions

C.

Record management’s and the internal auditor's positions in the audit report

D.

Discuss the issue in question further with senior management

Full Access
Question # 32

A chief audit executive (CAE) is developing a strategic plan for the internal audit function. In the last two years, the organization has faced significant IT risks, but the internal audit function has not been able to audit those areas due to a lack of knowledge. How could the CAE address this in the strategic plan?

A.

Purchase a data analytics program for the internal audit function

B.

Hold listening sessions to receive management's input on the strategic plan

C.

Develop a succession plan for the internal audit function to avoid staffing deficiencies

D.

Identify relevant training resources to strengthen staff skillsets

Full Access
Question # 33

When determining the level of physical controls required for a workstation, which of the following factors should be considered?

A.

Ease of use.

B.

Value to the business.

C.

Intrusion prevention.

D.

Ergonomic model.

Full Access
Question # 34

Which of the following is a characteristic of using a hierarchical control structure?

A.

Less use of policies and procedures.

B.

Less organizational commitment by employees.

C.

Less emphasis on extrinsic rewards.

D.

Less employee’s turnover.

Full Access
Question # 35

An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.

Hackers breaching the organization's network to access research and development reports

C.

A denial-of-service attack that prevents access to the organization's website.

D.

A hacker accessing she financial information of the company

Full Access
Question # 36

In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?

A.

Input controls

B.

Segregation of duties

C.

Physical controls

D.

Integrity controls

Full Access
Question # 37

The chief audit executive (CAE) has embraced a total quality management approach to improving the internal audit activity's (lAArs) processes. He would like to reduce the time to complete audits and improve client ratings of the IAA. Which of the following staffing approaches is the CAE most likely lo select?

A.

Assign a team with a trained audit manager to plan each audit and distribute field work tasks to various staff auditors.

B.

Assign a team of personnel who have different specialties to each audit and empower Team members to participate fully in key decisions

C.

Assign a team to each audit, designate a single person to be responsible for each phase of the audit, and limit decision making outside of their area of responsibility.

D.

Assign a team of personnel who have similar specialties to specific engagements that would benefit from those specialties and limit Key decisions to the senior person.

Full Access
Question # 38

An internal auditor discusses user-defined default passwords with the database administrator. Such passwords will be reset as soon as the user logs in for the first time, but the initial value of the password is set as "123456." Which of the following are the auditor and the database administrator most likely discussing in this situation?

A.

Whether it would be more secure to replace numeric values with characters.

B.

What happens in the situations where users continue using the initial password.

C.

What happens in the period between the creation of the account and the password change.

D.

Whether users should be trained on password management features and requirements.

Full Access
Question # 39

A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?

A.

Fixed maintenance costs.

B.

Variable maintenance costs.

C.

Mixed maintenance costs.

D.

Indirect maintenance costs.

Full Access
Question # 40

When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?

A.

Identification of achievable goals and timelines

B.

Analysis of the competitive environment.

C.

Plan for the procurement of resources

D.

Plan for progress reporting and oversight.

Full Access
Question # 41

Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?

A.

Prompt response and remediation policy

B.

Inventory of information assets

C.

Information access management

D.

Standard security configurations

Full Access
Question # 42

Which of the following best describes a potential benefit of using data analyses?

A.

It easily aligns with existing internal audit competencies to reduce expenses

B.

It provides a more holistic view of the audited area.

C.

Its outcomes can be easily interpreted into audit: conclusions.

D.

Its application increases internal auditors' adherence to the Standards

Full Access
Question # 43

An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?

A.

Customers can access and update personal information when needed.

B.

The organization retains customers' personal information indefinitely.

C.

Customers reserve the right to reject sharing personal information with third parties.

D.

The organization performs regular maintenance on customers' personal information.

Full Access
Question # 44

Which of the following would be the best method to collect information about employees' job satisfaction?

A.

Online surveys sent randomly to employees.

B.

Direct onsite observations of employees.

C.

Town hall meetings with employees.

D.

Face-to-face interviews with employees.

Full Access
Question # 45

A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?

A.

Readiness assessment.

B.

Project risk assessment.

C.

Post-implementation review.

D.

Key phase review.

Full Access
Question # 46

Senior management is trying to decide whether to use the direct write-off or allowance method for recording bad debt on accounts receivables. Which of the following would be the best argument for using the direct write-off method?

A.

It is useful when losses are considered insignificant.

B.

It provides a better alignment with revenue.

C.

It is the preferred method according to The IIA.

D.

It states receivables at net realizable value on the balance sheet.

Full Access
Question # 47

A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?

A.

Reviewing the customer's wire activity to determine whether the request is typical.

B.

Calling the customer at the phone number on record to validate the request.

C.

Replying to the customer via email to validate the sender and request.

D.

Reviewing the customer record to verify whether the customer has authorized wire requests from that email address.

Full Access
Question # 48

Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?

A.

Lower shareholder control

B.

lower indebtedness

C.

Higher company earnings per share.

D.

Higher overall company earnings

Full Access
Question # 49

Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?

A.

The cash dividends received increase the investee investment account accordingly.

B.

The investee must adjust the investment account by the ownership interest

C.

The investment account is adjusted downward by the percentage of ownership.

D.

The investee must record the cash dividends as dividend revenue

Full Access
Question # 50

How can the concept of relevant cost help management with behavioral analyses?

A.

It explains the assumption mat both costs and revenues are linear through the relevant range

B.

It enables management to calculate a minimum number of units to produce and sell without having to incur a loss.

C.

It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions

D.

It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action

Full Access
Question # 51

The chief audit executive (CAE) has been asked to evaluate the chief technology officer's proposal to outsource several key functions in the organization's IT department. Which of the following would be the most appropriate action for the CAE to determine whether the proposal aligns with the organization's strategy?

A.

Understand strategic context and evaluate whether supporting information is reliable and complete.

B.

Ascertain whether governance and approval processes are transparent, documented, and completed.

C.

Perform a due diligence review or asses management's review of provider operations.

D.

Identify key performance measures and data sources.

Full Access
Question # 52

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.

Review the password length, frequency of change, and list of users for the workstation's login process.

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity

Full Access
Question # 53

During which phase of the contracting process ere contracts drafted for a proposed business activity?

A.

Initiation phase.

B.

Bidding phase

C.

Development phase

D.

Management phase

Full Access
Question # 54

Which of the following is a disadvantage in a centralized organizational structure?

A.

Communication conflicts

B.

Slower decision making.

C.

Loss of economies of scale

D.

Vulnerabilities in sharing knowledge

Full Access
Question # 55

Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?

A.

Anti-malware software

B.

Authentication

C.

Spyware

D.

Rooting

Full Access
Question # 56

With regard to project management, which of the following statements about project crashing Is true?

A.

It leads to an increase in risk and often results in rework.

B.

It is an optimization technique where activities are performed in parallel rather than sequentially.

C.

It involves a revaluation of project requirements and/or scope.

D.

It is a compression technique in which resources are added so the project.

Full Access
Question # 57

Which of the following is an example of a physical control?

A.

Providing fire detection and suppression equipment

B.

Establishing a physical security policy and promoting it throughout the organization

C.

Performing business continuity and disaster recovery planning

D.

Keeping an offsite backup of the organization's critical data

Full Access
Question # 58

Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?

A.

High-yield bonds

B.

Commodity-backed bonds

C.

Zero coupon bonds

D.

Junk bonds

Full Access
Question # 59

An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?

A.

It is particularly helpful to management when the organization is facing rapid change.

B.

It is a more successful approach when adopted by mechanistic organizations.

C.

It is mere successful when goal setting is performed not only by management, but by all team members, including lower-level staff.

D.

It is particularly successful in environments that are prone to having poor employer-employee relations.

Full Access
Question # 60

Which of the following statements is true regarding data backup?

A.

System backups should always be performed real time.

B.

Backups should be stored in a secured location onsite for easy access.

C.

The tape rotation schedule affects how long data is retained

D.

Backup media should be restored only m case of a hardware or software failure

Full Access
Question # 61

Which of the following statements is true regarding the management-by-objectives method?

A.

Management by objectives is most helpful in organizations that have rapid changes.

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.

C.

Management by objectives helps organizations to keep employees motivated.

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.

Full Access
Question # 62

Which of the following scenarios best illustrates a spear phishing attack?

A.

Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.

B.

A person posing as a representative of the company’s IT help desk called several employees and played a generic prerecorded message requesting password data.

C.

A person received a personalized email regarding a golf membership renewal, and he click a hyperlink to enter his credit card data into a fake website

D.

Many users of a social network service received fake notifications of e unique opportunity to invest in a new product.

Full Access
Question # 63

Which of the following is the best example of IT governance controls?

A.

Controls that focus on segregation of duties, financial, and change management,

B.

Personnel policies that define and enforce conditions for staff in sensitive IT areas.

C.

Standards that support IT policies by more specifically defining required actions

D.

Controls that focus on data structures and the minimum level of documentation required

Full Access
Question # 64

According to Herzberg's Two-Factor Theory of Motivation, which of the following factors arc mentioned most often by satisfied employees?

A.

Salary and status

B.

Responsibility and advancement

C.

Work conditions and security

D.

Peer relationships and personal life

Full Access
Question # 65

Which of the following techniques would best detect on inventory fraud scheme?

A.

Analyze invoice payments just under individual authorization limits.

B.

Analyze stratification of inventory adjustments by warehouse location.

C.

Analyze Inventory Invoice amounts and compare with approved contract amounts.

D.

Analyze differences discovered curing duplicate payment testing.

Full Access
Question # 66

Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?

A.

Greater cost-effectiveness

B.

Increased economies of scale

C.

Larger talent pool

D.

Strong internal controls

Full Access
Question # 67

For employees, the primary value of implementing job enrichment is which of the following?

A.

Validation of the achievement of their goals anti objectives

B.

Increased knowledge through the performance of additional tasks

C.

Support for personal growth and a meaningful work experience

D.

An increased opportunity to manage better the work done by their subordinates

Full Access
Question # 68

Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?

A.

At the value agreed upon by the partners.

B.

At book value.

C.

At fair value

D.

At the original cost.

Full Access
Question # 69

Which of the following should be included in a data privacy poky?

1. Stipulations for deleting certain data after a specified period of time.

2. Guidance on acceptable methods for collecting personal data.

3. A requirement to retain personal data indefinitely to ensure a complete audit trail,

4. A description of what constitutes appropriate use of personal data.

A.

1 and 2 only

B.

2 and 3 only

C.

1, 2 and 4 only

D.

2, 3, and 4 only

Full Access
Question # 70

According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?

A.

Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations.

B.

Drafting a strong contract that requires regular vendor control reports end a right-to-audit clause.

C.

Applying administrative privileges to ensure right to access controls are appropriate.

D.

Creating a standing cyber-security committee to identify and manage risks related to data security

Full Access
Question # 71

An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety

The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?

A.

Average cost method

B.

First-in, first-out (FIFO) method

C.

Specific identification method

D.

Activity-based costing method

Full Access
Question # 72

Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?

A.

Authorization

B.

Architecture model

C.

Firewall

D.

Virtual private network

Full Access
Question # 73

An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?

A.

Decrease the transfer price

B.

Increase the transfer price

C.

Charge at the arm's length price

D.

Charge at the optimal transfer price

Full Access
Question # 74

Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?

A.

Job complicating

B.

Job rotation

C.

Job enrichment

D.

Job enlargement

Full Access
Question # 75

Which of the following statements. Is most accurate concerning the management and audit of a web server?

A.

The file transfer protocol (FTP) should always be enabled.

B.

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.

C.

The number of ports and protocols allowed to access the web server should be maximized.

D.

Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.

Full Access
Question # 76

An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?

A.

Use of a central processing unit

B.

Use of a database management system

C.

Use of a local area network

D.

Use of electronic data Interchange

Full Access
Question # 77

An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.

Which of the following terms would the investor most likely label this investment in her portfolio?

A.

A star

B.

A cash cow

C.

A question mark

D.

A dog

Full Access
Question # 78

An organization's account for office supplies on hand had a balance of $9,000 at the end of year one. During year two. The organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11 ,500 in office supplies on hand. Based on this Information, what would he recorded in the adjusting entry an the end of year two?

A.

A debit to office supplies on hand for S2.500

B.

A debit to office supplies on hand for $11.500

C.

A debit to office supplies on hand for $20,500

D.

A debit to office supplies on hand for $42,500

Full Access
Question # 79

Which of the following statements is true regarding cost-volume-profit analysis?

A.

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.

B.

Breakeven point is the amount of units sold to cover variable costs.

C.

Breakeven occurs when the contribution margin covers fixed costs.

D.

Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.

Full Access
Question # 80

Under which of the following circumstances can the internal audit function rely most confidently on the work performed by external auditors?

A.

The chief audit executive (CAE) has access to the external auditors' audit programs and workpapers

B.

The CAE requires that external auditors use the same techniques, methods, and terminology as the internal auditors

C.

The board of directors reviews the materiality and risk assessment performed by external auditors to direct the CAE

D.

The board of directors requires that all final communications by external auditors be reviewed by the CAE

Full Access
Question # 81

What is the first step an internal audit function should take to define its organizational structure, deliverables, communication protocols, and resourcing model?

A.

Recommend improvements to the organization’s governance policies, processes, and structures

B.

Define a hiring plan to address competency gaps needed to execute the audit plan

C.

Construct periodic self-assessments, ongoing monitoring, and external assessments to measure quality

D.

Assess the needs and expectations of the board, senior management, and external auditors

Full Access
Question # 82

An analytical model determined that on Friday and Saturday nights the luxury brands stores should be open for extended hours and with a doubled number of employees

present; while on Mondays and Tuesdays costs can be minimized by reducing the number of employees to a minimum and opening only for evening hours Which of the

following best categorizes the analytical model applied?

A.

Descriptive.

B.

Diagnostic.

C.

Prescriptive.

D.

Prolific.

Full Access
Question # 83

Which of the following biometric access controls uses the most unique human recognition characteristic?

A.

Facial comparison using photo identification.

B.

Signature comparison.

C.

Voice comparison.

D.

Retinal print comparison.

Full Access
Question # 84

The finance department of an organization recently undertook an asset verification exercise. The internal audit function scheduled a review of the IT department’s operations, which includes verifying the existence of computers distributed and their assignment. Can the internal audit function consider relying on the asset verification work performed by the finance department?

A.

Yes, in order to be efficient and make better use of internal audit resources

B.

No, as the finance department is an internal department of the organization

C.

Yes, but the finance manager would be responsible for supporting the conclusions of the work

D.

No, the internal audit function should do its own verification and should not rely on the work of finance

Full Access
Question # 85

An internal auditor uses a risk and control questionnaire as part of the preliminary survey for an audit of the organization's anti-bribery and corruption program. What is the primary purpose of using this approach?

A.

To compare records from one source to subsequently prepared records about the anti-bribery program

B.

To ascertain the existence of certain controls in the organization's anti-bribery program

C.

To obtain testimonial information about certain controls in the organization's anti-bribery program

D.

To validate control information through outside parties independent of the anti-bribery program

Full Access
Question # 86

The internal audit function conducted an engagement on maintenance operations of a construction organization and identified several issues of medium importance. The head of maintenance proposed an improvement plan with deadlines and personnel responsible. The internal audit function issued the final report to senior management. Senior management was dissatisfied with the report as they believed that improvement plan deadlines should be considerably shorter. Which of the following should the internal audit function change in the reporting process?

A.

Discontinue discussing draft reports with responsible employees, as their input is needed during fieldwork only

B.

Involve senior management at the draft report stage and in the development of action plans

C.

Request senior management to issue a separate memo regarding their changes to deadlines

D.

Invite senior management to the board meeting regarding engagement results so that they can express their concerns

Full Access
Question # 87

Which of the following describes how human resources can best assist in recruitment efforts for the internal audit function?

A.

Prepare competency-based interview questions and interview potential candidates

B.

Leverage the organization's intranet and recruiting agencies to search for potential candidates

C.

Forward all applications to the chief audit executive for review

D.

Select the most qualified candidate for the vacant position

Full Access
Question # 88

Which of the following is a key performance indicator of the efficiency of the internal audit function?

A.

The number of audits completed

B.

The number of significant audit observations

C.

The percentage of recommendations implemented

D.

The number of training hours per auditor

Full Access
Question # 89

Which of the following functions of a quality assurance and improvement program (QAIP) must be performed by personnel independent of the internal audit function?

A.

External assessments

B.

Communication of QAIP results to the board

C.

Disclosure of nonconformance

D.

Internal assessments

Full Access
Question # 90

Which of the following would be most likely found in an internal audit procedures manual?

A.

A summary of the strategic plan of the area under review

B.

Appropriate response options for when findings are disputed by management

C.

An explanation of the resources needed for each engagement

D.

The extent of the auditor's authority to collect data from management

Full Access
Question # 91

An IT auditor tested management of access rights and uncovered 48 instances where employees moved to a new position within the organization, but their former access rights were not revoked. System administrators explained that they did not receive information regarding employees’ new positions. Which of the following would be the best recommendation to address the root causes of the audit observation?

A.

Conduct an inventory of access rights of all employees who have changed their position within the last year

B.

Remove unneeded access rights for uncovered instances and reprimand system administrators for carelessness

C.

Provide system administrators with job descriptions of employees and let them determine relevant access rights

D.

Require that access rights to IT systems be ordered by process owners based on user role descriptions

Full Access
Question # 92

Which of the following scenarios indicates an effective use of financial leverage?

A.

An organisation has a rate of return on equity of 20% and a rate of return on assets of 15%.

B.

An organization has a current ratio of 2 and an inventory turnover of 12.

C.

An organization has a debt to total assets ratio of 0.2 and an interest coverage ratio of 10.

D.

An organization has a profit margin of 30% and an assets turnover of 7%.

Full Access
Question # 93

Which of the following is a sound network configuration practice to enhance information security?

A.

Change management practices to ensure operating system patch documentation is retained.

B.

User role requirements are documented in accordance with appropriate application-level control needs.

C.

Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.

D.

Interfaces reinforce segregation of duties between operations administration and database development.

Full Access
Question # 94

During an audit of the payroll system, the internal auditor identifies and documents the following condition:

"Once a user is logged into the system, the user has access to all functionality within the system."

What is the most likely root cause for tins issue?

A.

The authentication process relies on a simple password only, which is a weak method of authorization.

B.

The system authorization of the user does not correctly reflect the access rights intended.

C.

There was no periodic review to validate access rights.

D.

The application owner apparently did not approve the access request during the provisioning process.

Full Access
Question # 95

Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the

following would be a characteristic of the now highly centralized organization?

A.

Top management does little monitoring of the decisions made at lower levels.

B.

The decisions made at the lower levels of management are considered very important.

C.

Decisions made at lower levels in the organizational structure are few.

D.

Reliance is placed on top management decision making by few of the organization's departments.

Full Access
Question # 96

Which of the following statements is true regarding a project life cycle?

A.

Risk and uncertainty increase over the life of the project.

B.

Costs and staffing levels are typically high as the project draws to a close.

C.

Costs related to making changes increase as the project approaches completion.

D.

The project life cycle corresponds with the life cycle of the product produced by or modified by the project.

Full Access
Question # 97

While conducting' audit procedures at the organization's data center an internal auditor noticed the following:

- Backup media was located on data center shelves.

- Backup media was organized by date.

- Backup schedule was one week in duration.

The system administrator was able to present restore logs.

Which of the following is reasonable for the internal auditor to conclude?

A.

Backup media is not properly stored, as the storage facility should be off-site.

B.

Backup procedures are adequate and appropriate according to best practices.

C.

Backup media is not properly indexed, as backup media should be indexed by system, not date.

D.

Backup schedule is not sufficient, as full backup should be conducted daily.

Full Access
Question # 98

Which of the following statements is true regarding change management?

A.

The degree of risk associated with a proposed change determines whether the change request requires authorization

B.

Program changes generally are developed and tested in the production environment.

C.

Changes are only required by software programs

D.

To protect the production environment, changes must be managed in a repeatable, defined, and predictable manner

Full Access
Question # 99

Which of the following is a distinguishing feature of managerial accounting, which is not applicable to financial accounting?

A.

Managerial accounting uses double-entry accounting and cost data.

B.

Managerial accounting uses general accepted accounting principles.

C.

Managerial accounting involves decision making based on quantifiable economic events.

D.

Managerial accounting involves decision making based on predetermined standards.

Full Access
Question # 100

Which of the following attributes of data analytics relates to the growing number of sources from which data is being generated?

A.

Volume.

B.

Velocity.

C.

Variety.

D.

Veracity.

Full Access
Question # 101

A bond that matures after one year has a face value of S250,000 and a coupon of $30,000. if the market price of the bond is 5265,000, which of the following would be the market interest rate?

A.

Less than 12 percent.

B.

12 percent.

C.

Between 12.01 percent and 12.50 percent.

D.

More than 12 50 percent.

Full Access
Question # 102

Which of the following is most appropriately placed in the financing section of an organization's cash budget?

A.

Collections from customers

B.

Sale of securities.

C.

Purchase of trucks.

D.

Payment of debt, including interest

Full Access
Question # 103

Which of the following performance measures includes both profits and investment base?

A.

Residual income

B.

A flexible budget

C.

Variance analysis.

D.

A contribution margin income statement by segment.

Full Access
Question # 104

An intruder posing as the organization's CEO sent an email and tricked payroll staff into providing employees' private tax information. What type of attack was perpetrated?

A.

Boundary attack.

B.

Spear phishing attack.

C.

Brute force attack.

D.

Spoofing attack.

Full Access
Question # 105

Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?

A.

A flat structure results in lower operating and support costs than a hierarchical structure.

B.

A flat structure results in a stable and very collaborative environment.

C.

A flat structure enables field auditors to report to and learn from senior auditors.

D.

A flat structure is more dynamic and offers more opportunities for advancement than a hierarchical structure.

Full Access
Question # 106

Which of the following intangible assets is considered to have an indefinite life?

A.

Underground oil deposits

B.

Copyright

C.

Trademark

D.

Land

Full Access
Question # 107

The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?

A.

Beginning inventory was overstated for the year.

B.

Cost of goods sold was understated for the year.

C.

Ending inventory was understated for the year.

D.

Cost of goods sold was overstated for the year.

Full Access
Question # 108

According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?

A.

Initiation.

B.

Planning.

C.

Execution.

D.

Monitoring.

Full Access
Question # 109

While conducting an audit of the accounts payable department, an internal auditor found that 3% of payments made during the period under review did not agree with the submitted invoices. Which of the following key performance indicators (KPIs) for the department would best assist the auditor in determining the significance of the test results?

A.

A KPI that defines the process owner's tolerance for performance deviations.

B.

A KPI that defines the importance of performance levels and disbursement statistics being measured.

C.

A KPI that defines timeliness with regard to reporting disbursement data errors to authorized personnel.

D.

A KPI that defines operating ratio objectives of the disbursement process.

Full Access
Question # 110

Which of the following would be classified as IT general controls?

A.

Error listings.

B.

Distribution controls.

C.

Transaction logging.

D.

Systems development controls.

Full Access
Question # 111

Which of the following is an example of two-factor authentication?

A.

The user's facial geometry and voice recognition.

B.

The user's password and a separate passphrase.

C.

The user's key fob and a smart card.

D.

The user's fingerprint and a personal Identification number.

Full Access
Question # 112

Which of the following backup methodologies would be most efficient in backing up a database in the production environment?

A.

Disk mirroring of the data being stored on the database.

B.

A differential backup that is performed on a weekly basis.

C.

An array of independent disks used to back up the database.

D.

An incremental backup of the database on a daily basis.

Full Access
Question # 113

What is the primary purpose of data and systems backup?

A.

To restore all data and systems immediately after the occurrence of an incident.

B.

To set the maximum allowable downtime to restore systems and data after the occurrence of an incident.

C.

To set the point in time to which systems and data must be recovered after the occurrence of an incident.

D.

To restore data and systems to a previous point in time after the occurrence of an incident

Full Access
Question # 114

Which of the following statements Is true regarding the use of centralized authority to govern an organization?

A.

Fraud committed through collusion is more likely when authority is centralized.

B.

Centralized managerial authority typically enhances certainty and consistency within an organization.

C.

When authority is centralized, the alignment of activities to achieve business goals typically is decreased.

D.

Using separation of duties to mitigate collusion is reduced only when authority is centralized.

Full Access
Question # 115

Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?

A.

Cash payback technique

B.

Annual rate of return technique.

C.

Internal rate of return method.

D.

Net present value method.

Full Access
Question # 116

Which of the following would be the strongest control to prevent unauthorized wireless network access?

A.

Allowing access to the organization's network only through a virtual private network.

B.

Logging devices that access the network, including the date. time, and identity of the user.

C.

Tracking all mobile device physical locations and banning access from non-designated areas.

D.

Permitting only authorized IT personnel to have administrative control of mobile devices.

Full Access
Question # 117

The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

Favorable labor efficiency variance

Adverse labor rate variance

Adverse labor efficiency variance

Favorable labor rate variance

A.

1 and 2.

B.

1 and 4.

C.

3 and 4.

D.

2 and 3.

Full Access
Question # 118

Which of the following statements best describes the current state of data privacy regulation?

A.

Regulations related to privacy are evolving and complex, and the number of laws is increasing

B.

Most privacy laws are prescriptive and focused on organizations’ privacy rights

C.

The concept of data privacy is well established, privacy regulations are mature, and minimal regulatory changes are expected

D.

Because the concept of privacy is different around the world, data privacy is relatively unregulated

Full Access
Question # 119

Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?

A.

Gain sharing

B.

Commission

C.

Profit sharing

D.

Pension

Full Access
Question # 120

Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?

A.

Predictive analytics

B.

Prescriptive analytics

C.

Descriptive analytics

D.

Diagnostic analytics

Full Access
Question # 121

An internal auditor found the following information while reviewing the monthly financial statements for a wholesaler of safety glasses: Opening inventory: 1,000 units at $2 per unit; Purchased: 5,000 units at $3 per unit; Sold: 3,000 units at $7 per unit. The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?

A.

Average cost method

B.

First-in, first-out (FIFO) method

C.

Specific identification method

D.

Activity-based costing method

Full Access
Question # 122

An organization’s account for office supplies on hand had a balance of $9,000 at the end of year one. During year two, the organization recorded an expense for purchasing office supplies. At the end of year two, a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?

A.

A debit to office supplies on hand for $2,500

B.

A debit to office supplies on hand for $11,500

C.

A debit to office supplies on hand for $20,500

D.

A debit to office supplies on hand for $42,500

Full Access
Question # 123

Capital budgeting involves choosing among various capital projects to find the one(s) that will maximize a company's return on its financial investment. Which of the following parties approves the capital budget?

A.

Board of directors.

B.

Senior management.

C.

Chief financial officer.

D.

Accounting personnel.

Full Access
Question # 124

Which of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?

A.

A traditional key lock.

B.

A biometric device.

C.

A card-key system.

D.

A proximity device.

Full Access
Question # 125

Which of the following application controls is the most dependent on the password owner?

A.

Password selection.

B.

Password aging.

C.

Password lockout.

D.

Password rotation.

Full Access
Question # 126

According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?

A.

Individual workstation computer controls are not as important as companywide server controls

B.

Particular attention should be paid to housing workstations away from environmental hazards

C.

Cybersecurity issues can be controlled at an enterprise level, making workstation-level controls redundant

D.

With security risks near an all-time high, workstations should not be connected to the company network

Full Access
Question # 127

How do data analysis technologies affect internal audit testing?

A.

They improve the effectiveness of spot check testing techniques

B.

They allow greater insight into high-risk areas

C.

They reduce the overall scope of the audit engagement

D.

They increase the internal auditor’s objectivity

Full Access
Question # 128

Which of the following would most likely be found in an organization that uses a decentralized organizational structure?

A.

There is a higher reliance on organizational culture.

B.

There are clear expectations set for employees.

C.

There are electronic monitoring techniques employed.

D.

There is a defined code for employee behavior.

Full Access
Question # 129

Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?

A.

Authorization

B.

Architecture model

C.

Firewall

D.

Virtual private network

Full Access
Question # 130

Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?

A.

Remote wipe.

B.

Software encryption.

C.

Device encryption.

D.

Authentication.

Full Access
Question # 131

Which of the following statements is true regarding the management-by-objectives (MBO) approach?

A.

Management by objectives is most helpful in organizations that have rapid changes

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks

C.

Management by objectives helps organizations to keep employees motivated

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals

Full Access
Question # 132

According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?

A.

Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations

B.

Drafting a strong contract that requires regular vendor control reports and a right-to-audit clause

C.

Applying administrative privileges to ensure right-to-access controls are appropriate

D.

Creating a standing cybersecurity committee to identify and manage risks related to data security

Full Access
Question # 133

Which of the following best explains why an organization would enter into a capital lease contract?

A.

To increase the ability to borrow additional funds from creditors

B.

To reduce the organization’s free cash flow from operations

C.

To improve the organization’s free cash flow from operations

D.

To acquire the asset at the end of the lease period at a price lower than the fair market value

Full Access
Question # 134

A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?

A.

Lack of coordination among different business units

B.

Operational decisions are inconsistent with organizational goals

C.

Suboptimal decision-making

D.

Duplication of business activities

Full Access
Question # 135

Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?

A.

High-yield bonds

B.

Commodity-backed bonds

C.

Zero-coupon bonds

D.

Junk bonds

Full Access
Question # 136

What is the primary purpose of an integrity control?

A.

To ensure data processing is complete, accurate, and authorized

B.

To ensure data being processed remains consistent and intact

C.

To monitor the effectiveness of other controls

D.

To ensure the output aligns with the intended result

Full Access
Question # 137

Which of the following statements is true regarding data backup?

A.

System backups should always be performed in real-time.

B.

Backups should be stored in a secured location onsite for easy access.

C.

The tape rotation schedule affects how long data is retained.

D.

Backup media should be restored only in case of a hardware or software failure.

Full Access
Question # 138

A newly appointed chief audit executive (CAE) reviews current reporting practices. The CAE notices that exit meetings tend to be unproductive. When internal auditors present summaries of observations, engagement clients consistently complain that they do not understand where the observations come from. Which of the following could improve this situation?

A.

Send summaries of observations in advance of exit meetings and ask engagement clients to review them ahead of time

B.

Establish the purpose of exit meetings as for presentation of observations only and request that all disagreements are submitted in writing afterwards

C.

Read the entire draft internal audit report together with the clients at the exit meeting to eliminate any disputes

D.

Discontinue exit meetings, as they have proved to be ineffective and unproductive

Full Access
Question # 139

According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

A.

The business continuity management charter

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Full Access
Question # 140

With regard to project management, which of the following statements about project crashing is true?

A.

It leads to an increase in risk and often results in rework.

B.

It is an optimization technique where activities are performed in parallel rather than sequentially.

C.

It involves a revaluation of project requirements and/or scope.

D.

It is a compression technique in which resources are added to the project.

Full Access
Question # 141

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

A.

The risk that users try to bypass controls and do not install required software updates

B.

The risk that smart devices can be lost or stolen due to their mobile nature

C.

The risk that an organization intrusively monitors personal information stored on smart devices

D.

The risk that proprietary information is not deleted from the device when an employee leaves

Full Access
Question # 142

Based on test results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

A.

Requested backup tapes were not returned from the offsite vendor in a timely manner

B.

Returned backup tapes from the offsite vendor contained empty spaces

C.

Critical systems have been backed up more frequently than required

D.

Critical system backup tapes are taken off site less frequently than required

Full Access
Question # 143

Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?

A.

Greater cost-effectiveness

B.

Increased economies of scale

C.

Larger talent pool

D.

Strong internal controls

Full Access
Question # 144

Which of the following is a typical activity performed by the help desk?

A.

Monitoring the network

B.

Troubleshooting

C.

Backing up data

D.

Assigning authorizations to a user, a role, or profile

Full Access
Question # 145

Which of the following is a systems software control?

A.

Restricting server room access to specific individuals.

B.

Housing servers with sensitive software away from environmental hazards.

C.

Ensuring that all user requirements are documented.

D.

Performing intrusion testing on a regular basis.

Full Access
Question # 146

An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?

A.

26 days.

B.

90 days.

C.

100 days.

D.

110 days.

Full Access
Question # 147

A retail organization mistakenly did not include $10,000 of inventory in the physical count at the end of the year. What was the impact to the organization’s financial statements?

A.

Cost of sales and net income are understated

B.

Cost of sales and net income are overstated

C.

Cost of sales is understated and net income is overstated

D.

Cost of sales is overstated and net income is understated

Full Access
Question # 148

IT governance begins with which of the following activities?

A.

Identification of risk-mitigating options.

B.

Definition of IT objectives.

C.

Identification of IT risk events.

D.

Definition of risk response policies.

Full Access
Question # 149

Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?

A.

There is a greater need for organizations to rely on users to comply with policies and procedures.

B.

With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures.

C.

Incident response times are less critical in the BYOD environment compared to a traditional environment.

D.

There is greater sharing of operational risk in a BYOD environment.

Full Access
Question # 150

Which of the following statements is true regarding the capital budgeting procedure known as the discounted payback period?

A.

It calculates the overall value of a project.

B.

It ignores the time value of money.

C.

It calculates the time a project takes to break even.

D.

It begins at time zero for the project.

Full Access
Question # 151

An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?

A.

The auditor is normalizing data in preparation for analyzing it.

B.

The auditor is analyzing the data in preparation for communicating the results.

C.

The auditor is cleaning the data in preparation for determining which processes may be involved.

D.

The auditor is reviewing the data prior to defining the question.

Full Access
Question # 152

A motivational technique generally used to overcome monotony and job-related boredom is:

A.

Job specification.

B.

Job objectives.

C.

Job rotation.

D.

Job description.

Full Access
Question # 153

According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?

A.

Salary and status.

B.

Responsibility and advancement.

C.

Work conditions and security.

D.

Peer relationships and personal life.

Full Access
Question # 154

Which of the following is an example of a key systems development control typically found in the in-house development of an application system?

A.

Logical access controls monitor application usage and generate audit trails.

B.

The development process is designed to prevent, detect, and correct errors that may occur.

C.

A record is maintained to track the process of data from input, to output, to storage.

D.

Business users' requirements are documented, and their achievement is monitored.

Full Access