Question 261

An organization has a large number of vendors supplying goods to its various branches across the region. The code of conduct statements signed by the employees specify that the employees or their families will not sell goods to the organization. However, during the internal audit of a branch, the internal auditor suspected that some of the employees may be supplying goods to the organization contrary to the code of conduct. The chief audit executive has requested that a thorough review be completed to identify the potential employee vendors. Of the following tests, it would be least useful to compare [List A] with [List B].
[List A]
[List B]
  • Question 262

    When constructing a staffing schedule for the internal audit activity (IAA), which of the following criteria are most important for the chief audit executive to consider for the effective use of audit resources?
    1. The competency and qualifications of the audit staff for specific assignments.
    2. The effectiveness of IAA staff performance measures.
    3. The number of training hours received by staff auditors compared to the budget.
    4. The geographical dispersion of audit staff across the organization.
  • Question 263

    Which of the following items should be addressed in an organization's privacy statement?
    I. Intended use of collected information.
    II. Data storage and security.
    III. Network/infrastructure authentication controls.
    IV. Data retention policy of the organization.
    Parties authorized to access information.
  • Question 264

    It is close to the fiscal year end for a government agency, and the chief audit executive (CAE) has the following items to submit to either the board or the chief executive officer (CEO) for approval. According to IIA guidance, which of the following items should be submitted only to the CEO?
  • Question 265

    Which of the following is used to identify and prioritize critical business applications to determine those that must be restored and the order of restoration in the event that a disaster impairs information systems processing?