Free IIA-CIA-Part2 Exam Braindumps (page: 34)

Page 34 of 128

A chief audit executive (CAE) suspects that several employees have used desktop computers for personal gain. In conducting an investigation, the primary reason that the CAE would choose to engage a forensic information systems auditor rather than using the organization's information systems auditor is that a forensic information systems auditor would possess:

  1. Knowledge of the computing system that would enable a more comprehensive assessment of the computer use and abuse.
  2. Knowledge of what constitutes evidence acceptable in a court of law.
  3. Superior analytical skills that would facilitate the identification of computer abuse.
  4. Superior documentation and organization skills that would facilitate in the presentation of findings to senior management and the board.

Answer(s): B



While conducting a payroll audit, an internal auditor in a large government organization found inadequate segregation in the duties assigned to the assistant director of personnel. When the auditor explained the risk of fraud, the assistant director became upset, terminated the interview, and threatened to sue the organization for defamation of character if the audit engagement was not curtailed. The auditor discussed the situation with the chief audit executive (CAE). The CAE should then:

  1. Curtail the audit engagement to avoid potential legal action.
  2. Provide a report to senior management recommending a fraud investigation.
  3. Continue the original engagement program as planned but include a comment about the assistant director's reaction in the engagement final communication.
  4. Add additional testing to determine whether other indicators of fraud exist.

Answer(s): D



Which of the following is the most appropriate step for the chief audit executive to take in order to avoid defamation of character of the principal suspect in a fraud investigation?

  1. Restrict the use of potentially damaging words to privileged reports or discussions.
  2. Label all workpapers, reports, and correspondence of the internal audit activity as private.
  3. Restrict discussions of the fraud to members of management who express an interest in the investigation.
  4. Destroy all investigation workpapers and reports if the fraud cannot be proven.

Answer(s): A



The scope of a consulting engagement performed by internal auditors should:

  1. Be sufficient to address the objectives agreed upon with the client.
  2. Exclude areas that might be the subject of subsequent assurance engagements.
  3. Be limited to activities within the current operating period.
  4. Be preapproved in conjunction with the annual plan of consulting engagements.

Answer(s): A



Page 34 of 128



Post your Comments and Discuss IIA IIA-CIA-Part2 exam with other Community members:

NOOR commented on October 06, 2024
I want to pass my CIA Exam P2 withing the next 2weeks, can I get help?
UNITED ARAB EMIRATES
upvote

ET commented on August 19, 2024
I have just failed my CIA 2 second attempt today. May I have any assistance from you guys?
Anonymous
upvote