Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

IIA-CRMA-ADV IIA Certification in Risk Management Assurance Free Practice Exam Questions (2025 Updated)

Prepare effectively for your IIA IIA-CRMA-ADV Certification in Risk Management Assurance certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 5
Total 283 questions

Which of the following are components of the ISO 31000 risk management process?

1. Setting the context.

2. Risk treatment.

3. Risk avoidance.

4. Communication.

A.

1 and 2 only.

B.

2 and 3.

C.

3 and 4.

D.

1,2, and 4.

Which of the following factors should be considered when determining the appropriate combination of manual techniques and computer-assisted audit techniques (CAATs) to be used during an audit?

1. Acceptance of CAATs findings by entity management.

2. Computer knowledge and expertise of the auditor.

3. Time constraints.

4. Level of audit risk.

A.

1 and 4

B.

2 and 3 only

C.

1, 2, and 3

D.

2, 3, and 4

To fill a critical vacancy, an internal auditor is assigned temporarily to a nonaudit role in the purchasing department, where she worked previously before joining the internal audit activity. According to IIA guidance, which of the following statements is true regarding these circumstances?

A.

The chief audit executive (CAE) should review all work performed by the auditor during her temporary assignment to ensure no impairments.

B.

The CAE may conduct audits in the purchasing department during the auditor's temporary assignment.

C.

The auditor should obtain the CAE's approval as to the nature and scope of the duties she is permitted to perform during her temporary assignment.

D.

Any work performed by the auditor during her temporary assignment must conform to the internal audit charter.

Which of the following is a weakness of observation as audit evidence?

A.

It cannot be used to test the completeness assertion.

B.

It cannot be used to test the existence assertion.

C.

It cannot be used to test the occurrence assertion.

D.

It cannot be relied upon because the evidence is not persuasive.

According to IIA guidance, which of the following external groups is most likely to represent a liability risk, based on activities associated with the organization's corporate social responsibility program?

A.

Consumers.

B.

Activists.

C.

Suppliers.

D.

Investors.

Which of the following control activities is the most effective to ensure users' levels of access are appropriate for their current roles?

A.

The human resources department generates a monthly list of terminated and transferred employees and requests IT to update the user access as required.

B.

Standardized user access profiles are developed and the appropriate access profiles are automatically assigned to new or transferred employees.

C.

System administrator rights are assigned to one user in each department who can update user access of terminated or transferred employees immediately.

D.

Department managers are required to perform periodic user access reviews of relevant systems and applications.

Which of the following best ensures the independence of the internal audit activity?

1. The CEO and audit committee review and endorse any changes to the approved audit plan on an annual basis.

2. The audit committee reviews the performance of the chief audit executive (CAE) periodically.

3. The internal audit charter requires the CAE to report functionally to the audit committee.

A.

3 only

B.

1 and 2 only

C.

2 and 3 only

D.

1, 2, and 3

During an audit, the client questions the internal audit activity's authority to perform procedures over fraud allegations. According to HA guidance, which of the following would provide the most relevant support to respond to the client's concerns?

A.

Definition of Internal Auditing.

B.

MA Standards.

C.

Internal audit charter.

D.

The IIA's Code of Ethics.

Which of the following statements accurately describes the responsibility of the internal audit activity regarding IT governance?

1. The internal audit activity does not have any responsibility because IT governance is the responsibility of the board and senior management of the organization.

2. The internal audit activity must assess whether the IT governance of the organization supports the organization's strategies and objectives.

3. The internal audit activity may assess whether the IT governance of the organization supports the organization's strategies and objectives.

4. The internal audit activity may accept requests from management to perform advisory services regarding how the IT governance of the organization supports the organization's strategies and objectives.

A.

1 only.

B.

4 only.

C.

2 and 4.

D.

3 and 4.

Which of the following activities should the chief audit executive perform to ensure compliance with an organization's code of conduct?

A.

Act as an adviser to the committee responsible for reviewing violations of the code.

B.

Review and adjudicate all violations of the code of conduct.

C.

Lead the committee responsible for the oversight of the code.

D.

Implement a system of procedures to inform all employees of the code.

According to IIA guidance, which of the following practices by the chief audit executive (CAE) best enhances the organizational independence of the internal audit activity?

A.

CAE reviews and approves the annual audit plan.

B.

CAE meets privately with The CEO at least annually.

C.

CAE meets privately with The board at least annually.

D.

CAE reports to the board regarding audit staff performance evaluation and compensation.

Which of the following would be the most appropriate first step for the board to take when developing an effective system of governance?

A.

Determine the organization's overall risk appetite.

B.

Establish a governance committee.

C.

Delegate authority to members of senior management.

D.

Identify key stakeholders and their expectations.

An internal auditor is conducting an assessment of the organization's fraud prevention program using the COSO enterprise risk management framework. According to this framework, which of the following activities would fall under the control environment component for preventing fraud?

1. The organization uses an automated authority approval matrix to control payments.

2. The organization has a whistleblower hotline that is available to employees.

3. Annually, every manager completes a comprehensive fraud assessment of his or her department.

4. Annually, the organization reviews and communicates the code of expected behavior.

A.

1 and 2.

B.

1 and 3.

C.

2 and 3.

D.

2 and 4.

An organization decides to take no action on one of its financial risks because the cost of implementing the control outweighs the value of the asset being protected. Which of the following best describes this risk strategy?

A.

Risk avoidance.

B.

Risk-benefit analysis.

C.

Risk sharing.

D.

Risk acceptance.

An internal audit charter, approved by the board, restricts the internal audit activity to providing assurance only on the reliability of financial information and the effectiveness of internal accounting controls. Which of the following statements is true regarding the extent to which the external auditor may rely on the internal audit activity's work?

A.

The external auditor may make full use of the work, as the audit charter is very specific as to the work the internal audit activity may undertake.

B.

The external auditor may use the work, as the board has approved the charter, thus taking responsibility for any deficiencies.

C.

The external auditor must disregard the work, as the scope of the charter may introduce bias and result in a lack of due professional care.

D.

The external auditor may use the work with caution, due to the internal audit activity's scope and responsibility restrictions.

Which of the following must be in existence as a precondition to developing an effective system of internal controls?

A.

A monitoring process.

B.

A risk assessment process.

C.

A strategic objective-setting process.

D.

An information and communication process.

According to COSO, which of the following describes a principle related to the control environment?

A.

The organization identifies and assesses changes that could significantly impact the system of internal control.

B.

The organization establishes appropriate authorities and responsibilities in the pursuit of objectives.

C.

The organization selects and develops control activities that contribute to the mitigation of risks.

D.

The organization performs evaluations to ascertain whether internal control components are present and functioning.

A medical insurance provider uses an electronic claims-submission process and suspects that a number of physicians have submitted claims for treatments that were not performed. Which of the following control procedures would be most effective to detect this type of fraud?

A.

Require the physician to submit a signed statement attesting that the treatments had been performed.

B.

Send confirmations to the physicians, requesting them to verify the exact nature of the claims submitted to the insurance provider.

C.

Develop an integrated test facility and submit false claims to verify that the system is detecting such claims on a consistent basis.

D.

Use computer software to identify abnormal claims based on the insured's age and medical history.

An internal auditor is performing analytical reviews as part of an audit of a supermarket's merchandising department. Because the economy has declined since midyear, the auditor can expect to encounter which of the following?

A.

Higher inventory turnover.

B.

Higher operating margin.

C.

Lower obsolete stock disposal.

D.

Lower sales volume.

When auditing the award of a major contract, which of the following should an internal auditor suspect as a red flag for a bidding fraud scheme?

1. Subsequent change orders increase requirements for low-bid items.

2. Material contract requirements are different on the actual contract than on the request for bids.

3. A high percentage of employees are charged to indirect accounts.

4. Losing bidders are hired as subcontractors.

A.

1 only

B.

2 only

C.

1 and 3.

D.

2 and 4.

Page: 4 / 5
Total 283 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved