IIA CIA Exam
Certified Internal Auditor Exam (Page 20 )

Updated On: 12-Feb-2026

Which of the following should an internal audit activity take into consideration when evaluating an organization's privacy framework?

I). Types of information gathered by the organization.
II). Methods used to collect and store information.
III). Location and custody of key information.
IV). Intended use of information that is collected and stored.

  1. I and III only.
  2. I, II, and IV only.
  3. II, III, and IV only.
  4. I, II, III, and IV.

Answer(s): D



In addition to risk materiality, which of the following should be considered during the process of ranking and validating an organization's risk priorities?

  1. Possible financial loss.
  2. Competency of internal audit staff.
  3. Likelihood of risk occurrence.
  4. Liquidity of assets.

Answer(s): C



According to the International Professional Practices Framework, which of the following criteria should be used to evaluate an organization's governance process?

  1. Risk, control activities, information, and monitoring.
  2. Strategies, policies, procedures, and operations.
  3. Values, goals, monitoring, and accountability.
  4. Regulations, rules, laws, and systems.

Answer(s): C



An annual audit plan would be the primary method of identifying the internal audit activity's

  1. Authority.
  2. Resource needs.
  3. Reporting requirements.
  4. Independence.

Answer(s): B



An organization's decision to outsource its computer systems support is an example of which of the following risk responses?

  1. Risk acceptance.
  2. Risk sharing.
  3. Risk avoidance.
  4. Risk reduction.

Answer(s): B






Post your Comments and Discuss IIA CIA exam prep with other Community members:

Join the CIA Discussion