Free CIMAPRO19-P03-1 Exam Braindumps (page: 27)

Page 26 of 69

Which of the following statements concerning the role of the Audit Committee is correct?

  1. The Audit Committee should provide arrangements for whistle blowing.
  2. The Audit Committee should design the system of internal controls.
  3. The Audit Committee should engage consultants to carry out business reviews.
  4. The Audit Committee should review and monitor the effectiveness of the company's internal audit function.
  5. The Audit Committee should decide annually whether it needs an internal audit function.
  6. The Audit Committee should decide annually whether it needs an external audit function.

Answer(s): A,D,E



N, a large company in the food production industry, has grown over the years by the acquisition of several smaller rivals. The company has ten branches located in its home country and has just opened a foreign branch for the first time. It has recently made some changes to the structure and implementation of its control system.
Which TWO of these would be most likely to improve the overall control system?

  1. Establishing an Internal Audit department.
  2. Purchase invoices are now approved for payment at branches and a list of approved invoices are sent to head office for payment. The invoices, supporting documentation and suppliers' statements are retained at the branches.
  3. Excess funds are now invested, by the Finance Director, in short-term securities. The Finance Director initiates buy and sell transactions and she also receives and retains all correspondence relating to the investments.
  4. A policy has been initiated to complete a physical inventory of all non-current assets at least annually. This is then reconciled with the non-current asset register.
  5. N has just opened a bank account in the currency in which the newly opened branch is now operating.

Answer(s): A,D



A Firewall is an element of a company's Information Technology infrastructure. Which THREE of the following are characteristics of a Firewall?

  1. A Firewall determines the boundary of the "Trusted" components of the company's Information Technology infrastructure.
  2. A Firewall protects sensitive data against accidental or malicious damage.
  3. A Firewall protects the computer suite against physical attack.
  4. A Firewall protects against unauthorised network access.
  5. A Firewall protects against viruses.
  6. A Firewall can screen every message coming into or out of the company network looking for key words, or attachments.

Answer(s): A,D,F



When a new computer system is being implemented there are several possible methods for managing the changeover from the old system to the new system.
Which THREE of the following are true?

  1. Phased changeover is the safest and slowest method of changeover.
  2. Phased changeover moves individual portions of the business to the new system one at a time.
  3. Pilot changeover moves the simplest part of the business to the new system first.
  4. Parallel running involves keeping the old system running, normally until certain data retention criteria are met or confidence is gained, while the new system deals with the new workload. Data input is usually carried out on both systems.
  5. Direct changeover, or Big Bang is only used when the systems are significantly different such that comparing the outputs of the two systems is largely irrelevant.
  6. All methods of changeover carry high risk and it is the preparation, consideration of data compatibility and data cleansing before the changeover which has the biggest impact on the smoothness of the transition.

Answer(s): B,D,F






Post your Comments and Discuss CIMA CIMAPRO19-P03-1 exam with other Community members:

CIMAPRO19-P03-1 Discussions & Posts