Free IIA-ACCA Exam Braindumps (page: 58)

Page 58 of 152

While conducting an audit of a third party's Web-based payment processor, an internal auditor discovers that a programming error allows customers to create multiple accounts for a single mailing address. Management agrees to correct the program and notify customers with multiple accounts that the accounts will be consolidated.
Which of the following actions should the auditor take?
1. Schedule a follow-up review to verify that the program was corrected and the accounts were consolidated.
2. Evaluate the adequacy and effectiveness of the corrective action proposed by management.
3. Amend the scope of the subsequent audit to verify that the program was corrected and that accounts were consolidated.
4. Submit management's plan of action to the external auditors for additional review.

  1. 1 and 2
  2. 1 and 4
  3. 2 and 3
  4. 3 and 4

Answer(s): A



An internal auditor is conducting a review of the procurement function and uncovers a potential conflict of interest between the chief operating officer and a significant supplier of IT software development services.
Which of the following actions is most appropriate for the internal auditor to take?

  1. Inform the audit supervisor.
  2. Investigate the potential conflict of interest.
  3. Inform the external auditors of the potential conflict of interest.
  4. Disregard the potential conflict, because it is outside the scope of the audit assignment.

Answer(s): A



A large retail organization, which sells most of its products online, experiences a computer hacking incident. The chief IT officer immediately investigates the incident and concludes that the attempt was not successful. The chief audit executive (CAE) learns of the attack in a casual conversation with an IT auditor.
Which of the following actions should the CAE take?
1. Meet with the chief IT officer to discuss the report and control improvements that will be implemented as a result of the security breach, if any.
2. Immediately inform the chair of the audit committee of the security breach, because thus far only the chief IT officer is aware of the incident.
3. Meet with the IT auditor to develop an appropriate audit program to review the organization's Internet-based sales process and key controls.
4. Include the incident in the next quarterly report to the audit committee.

  1. 1 and 2
  2. 1 and 3
  3. 2 and 4
  4. 3 and 4

Answer(s): A



During an assurance engagement, an internal auditor noted that the time staff spent accessing customer information in large Excel spreadsheets could be reduced significantly through the use of macros. The auditor would like to train staff on how to use the macros.
Which of the following is the most appropriate course of action for the internal auditor to take?

  1. The auditor must not perform the training, because any task to improve the business process could impact audit independence.
  2. The auditor must create a new, separate consulting engagement with the business process owner prior to performing the improvement task.
  3. The auditor should get permission to extend the current engagement, and with the process owner's approval, perform the improvement task.
  4. The auditor may proceed with the improvement task without obtaining formal approval, because the task is voluntary and not time-intensive.

Answer(s): C



Page 58 of 152



Post your Comments and Discuss IIA IIA-ACCA exam with other Community members:

Jeelzs commented on June 25, 2024
Awesome indeed
Anonymous
upvote