Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IIA IIA-CIA-Part3 Exam - Cheat-Test.com

Free IIA-CIA-Part3 Sample Questions:

Q: 1
Which implemented control would best assist in meeting the control objective that a system have the capability to hold users accountable for functions performed?
A. Programmed cutoff.
B. Redundant hardware.
C. Activity
D. Transaction error logging.
Answer: C
Activity logging provides an audit trail of user activity.

Q: 2
Which new issues, associated with rapidly advancing computer technology, create new risk exposures for organizations?
A. Changes in organizational reporting requirements and controls over computer abuse.
B. Controls over library tape procedures.
C. Complexity of operating systems and controls over privacy of data.
D. Changes in organizational behavior.
Answer: C
Advancing computer technology presents more complex audit environments. With theadvent of systems that permit remote access, the risk that unauthorized parties mayobtain or tamper with important information is increased.

Q: 3
Which of the following is an important senior management responsibility with regard to information systems security?
A. Assessing exposures.
B. Assigning access privileges.
C. Identifying ownership of data.
D. Training employees in security matters.
Answer: A
Senior management is responsible for risk assessment, including identification of risks and consideration of their significance, the likelihood of their occurrence, and how they shouldbe managed. Senior management is also responsible for establishing organizationalpolicies regarding computer security and implementing a compliance structure. Thus,senior management should assess the risks to the integrity, confidentiality, andavailability of information systems data and resources.

Q: 4
Management's enthusiasm for computer security seems to vary with changes in the environment, particularly the occurrence of other computer disasters. Which of the following concepts should be addressed when making a comprehensive recommendation regarding the costs and benefits of computer security?
I. Potential loss if security is not implemented
II. Probability of occurrences
III. Cost and effectiveness of the implementation and operation of computer security
A. I only.
B. I and II only.
C. III only.
D. I, II, and III.
Answer: D
Potential loss is the amount of dollar damages associated with a security problem or lossof assets.
Potential loss times the probability of occurrence is an estimate expected value)of the exposure associated with lack of security. It represents a potential benefit associatedwith the implementation of security measures. To perform a cost-benefit analysis, thecosts should be considered. Thus, all three items need to be addressed.

Q: 5
Of the following, the greatest advantage of a database server) architecture is:
A. Data redundancy can be reduced.
B. Conversion to a database system is inexpensive and can be accomplished quickly.
C. Multiple occurrences of data items are useful for consistency checking.
D. Backup and recovery procedures are minimized.
Answer: A
Data organized in files and used by the organization's various applications programs are collectively known as a database. In a database system, storage structures arecreated that render the applications programs independent of the physical or logicalarrangement of the data. Each data item has a standard definition, name, and format, andrelated items are linked by a system of pointers. The programs therefore need only tospecify data items by name, not by location. A database management system handlesretrieval and storage. Because separate files for different applications programs areunnecessary, data redundancy can be substantially reduced.

Q: 6
In an inventory system on a database management system DBMS), one stored record contains part number, part name, part color, and part weight. These individual items are called:
A. Fields.
B. Stored files.
C. Bytes.
D. Occurrences.
Answer: A
A record is a collection of related data items fields). A field data item) is a group ofcharacters representing one unit of information.

Q: 7
An inventory clerk, using a computer terminal, views the following on screen part number, part description, quantity on hand, quantity on order, order quantity, and reorder point for a particular inventory item. Collectively, these data make up a:
A. Field.
B. File.
C. Database.
D. Record.
Answer: D
A record is a collection of related data items fields). A field data item) is a group ofcharacters representing one unit of information. The part number, part description, etc.,are represented by fields.

Q: 8
Which of the following is the elementary unit of data storage used to represent individual attributes of an entity?
A. Database.
B. Data field.
C. File.
D. Record.
Answer: B
A data item or field is a group of characters. It is used to represent individual attributes ofan entity, such as an employee's address. A field is an item in a record.

Q: 9
A file-oriented approach to data storage requires a primary record key for each file. Which of the following is a primary record key?
A. The vendor number in an accounts payable master file.
B. The vendor number in a closed purchase order transaction file.
C. The vendor number in anopen purchase order master file.
D. All of the answers are correct.
Answer: A
The primary record key uniquely identifies each record in a file. Because there is only one record for each vendor in an accounts payable master file the vendor number would be the appropriate key.

Q: 10
A business is designing its storage for accounts receivable information. What data file concepts should be used to provide the ability to answer customer inquiries as they are received?
A. Sequential storage and chains.
B. Sequential storage and indexes.
C. Record keys, indexes, and pointers.
D. Inverted file structure indexes, and internal labels.
Answer: C
A record key is an attribute that uniquely identifies or distinguishes each record from the others. An index is a table listing storage locations for attributes, often including those other than the unique record key attribute. A pointer is a data item that indicates thephysical address of the next logically related record.

Q: 11
The primary reason for adopting TOM was to achieve:
A. Greater customer satisfaction.
B. Reduced delivery time.
C. Reduced delivery charges.
D. Greater employee participation.
Answer: A
TOM is an integrated system that anticipates, meets, andexceeds customers needs, wants, and expectations. The management and employees ofa large household goods moving company decided to adopt total quality management TOM and continuous improvement CI. The company believes that if it became nationally known as adhering to TOM and CI, one result would be an increase in the company's profits and market share.

Q: 12
What should the company focus on to achieve quality more economically?
A. Appraisal costs.
B. Prevention costs.
C. Internal failure costs.
D. External failure costs.
Answer: B
Prevention attempts to avoid defective output. Prevention costs include preventivemaintenance, employee training, review of equipment design, and evaluation of suppliers. Prevention is less costly than detection and correction of defective output.

Q: 13
A traditional quality control process in manufacturing consists of mass inspection of goods only at the end of a production process. A major deficiency of the traditional control process is that:
A. It is expensive to do the inspections at the end of the process.
B. It is not possible to rework defective items.
C. It is not 100% effective.
D. It does not focus on improving the entire production process.
Answer: D
The process used to produce the goods is not thoroughly reviewed and evaluated forefficiency and effectiveness. Preventing defects and increasing efficiency by improving the production process raises quality standards and decreases costs.

Q: 14
Under a total quality management TOM) approach:
A. Measurement occurs throughout the process, and errors are caught and corrected at thesource.
B. Quality control is performed by highly trained inspectors at the end of the productionprocess.
C. Upper management assumes the primary responsibility for the quality of the products andservices.
D. A large number of suppliers are used in order to obtain the lowest possible prices.
Answer: A
Total quality management emphasizes quality as a basic organizational function. TOM is the continuous pursuit of quality in every aspect of organizational activities. One of the basic tenets of TOM is doing it right the first time. Thus, errors should be caught and corrected at the source.

Q: 15
Which of the following is a characteristic of total quality management TQM)?
A. Management by objectives.
B. On-the-job training by other workers.
C. Quality by final inspection.
D. Education and self-improvement.
Answer: D
According to management theorist. Edwards Deming's well-known 14 points. Educationand self-improvement are essential. Knowledge is opportunity. Hence.Continuousimprovement should be everyone's primary career objective.

Q: 16
In which of the following organizational structures does total quality management TOM) work best?
A. Hierarchal.
B. Teams of people from the same specialty.
C. Teams of people from different specialties.
D. Specialists working individually.
Answer: C
TOM advocates replacement of the traditional hierarchal structure with teams of people from different specialties. This change follows from TQM's emphasis on empowering employees and team work. Employees should have proper training, necessary information, and the best tools; be fully engaged in the decision process; and receive fair compensation. If such empowered employees are assembled in teams of individuals with the required skills, TOM theorists believe they will be more effective than people performing their tasks separately in a rigid structure.

Q: 17
The most important component of quality control is:
A. Ensuring goods and services conform to the design specifications.
B. Satisfying upper management.
C. Conforming with ISO-9000 specifications.
D. Determining the appropriate timing of inspections.
Answer: A
The intent of quality control is to ensure that goods and services conform to the design specifications. Whether the focus is on feedforward, feedback, or concurrent control, the emphasis is on ensuring product or service conformity.

Q: 18
All of the following are generally included in a cost-of-quality report except:
A. Warranty claims.
B. Design engineering.
C. Supplier evaluations.
D. Lost contribution margin.
Answer: D
A cost-of-quality report includes most costs related to quality, including the costs of external failure, internal failure, prevention, and appraisal. Lost contribution margins from poor product quality are external failure costs that normally do not appear on a cost-of-quality report because they are opportunity costs. Opportunity costs are not usually recorded by the accounting system, thereby understating the costs of poor quality. Lost contribution margins from reduced sales, market share, and sales prices are external failure costs that are also not usually included in a cost-of-quality report.

Q: 19
The four categories of costs associated with product quality costs are:
A. External failure, internal failure, prevention, and carrying.
B. External failure, internal failure, prevention, and appraisal.
C. External failure, internal failure, training, and appraisal.
D. Warranty, product liability, training, and appraisal.
Answer: B
The following are the four categories of quality costs: prevention, appraisal, internal failure, and external failure lost opportunity. Costs of prevention include attempts to avoid defective output, including employee training, review of equipment design, preventive maintenance, and evaluation of suppliers. Appraisal costs include quality control programs, inspection, and testing. Internal failure costs are incurred when detection of defective products occurs before shipment, including scrap, rework, tooling changes, and downtime. External failure costs are incurred after the product has been shipped, including the costs associated with warranties, product liability, and customer ill will.

Q: 20
The cost of statistical quality control in a product quality cost system is categorized as a n)
A. Internal failure cost.
B. Training cost.
C. External failure cost.
D. Appraisal cost.
Answer: D
The following are the four categories of quality costs: prevention, appraisal, internal failure, and external failure lost opportunity). Appraisal costs include quality control programs, inspection, and testing. However, some authorities regard statistical quality and process control as preventive activities because they not only detect faulty work but also allow for adjustment of processes to avoid future defects.


© 2014 Cheat-Test.com, All Rights Reserved