assessment (Oa) featUrInG 59 qUestIOns anD
ansWers, UpDateD fOr 2025, WIth verIfIeD
accUracy.
1. What is the definition of Internal Auditing? - ANSWER Internal Auditing is
an independent, objective assurance and consulting activity designed to add
value and improve an organization's operations.
2. What are the four types of objectives in internal auditing? - ANSWER
Strategic, Operations, Reporting, and Compliance objectives.
3. What do strategic objectives pertain to? - ANSWER Goals set by
management related to stakeholder interests.
4. What is the focus of operations objectives? - ANSWER Effectiveness and
efficiency of the entity's operations, including operational and financial
performance goals.
5. What do reporting objectives encompass? - ANSWER Internal and external
financial and non-financial reporting, including reliability, timeliness, and
transparency.
6. What is the purpose of compliance objectives? - ANSWER To ensure
adherence to laws and regulations applicable to the entity.
,7. What is governance in the context of internal auditing? - ANSWER The
combination of processes and structures implemented by the board to
inform, direct, manage, and monitor organizational activities.
8. Risk by Process Matrix - ANSWER Matrix linking processes to risks as key
or secondary.
9. COSO Internal Control Definition - ANSWER Process providing reasonable
assurance of achieving operations, reporting, compliance goals.
10.COSO Five Components - ANSWER Control Environment, Risk
Assessment, Control Activities, Information & Communication, Monitoring.
11.Preventive Controls - ANSWER Controls preventing issues before
occurrence.
12.Detective Controls - ANSWER Controls detecting issues after occurrence.
13.Entity-Level Controls - ANSWER High-level controls affecting the entire
organization.
14.Process-Level Controls - ANSWER Controls focused on specific business
processes.
15.Transaction-Level Controls - ANSWER Detailed controls ensuring correct
transaction processing.
16.Key Control - ANSWER Mitigates key risks directly.
, 17.Secondary Control - ANSWER Supports mitigation but insufficient alone.
18.Major Deficiency - ANSWER Weakness severely reducing likelihood of
achieving objectives.
19.Cybersecurity Definition - ANSWER Protection of information assets from
unauthorized access.
20.IT General Controls - ANSWER Controls applying across systems: access,
change mgmt, operations.
21.IT Application Controls - ANSWER Controls ensuring input, processing,
output accuracy.
22.Common Cyber Threats - ANSWER Nation-states, cybercriminals,
hacktivists, insiders, bad vendors.
23.BYOD Risk - ANSWER Risks from personal devices accessing corporate
data.
IT Risks - ANSWER Availability, access, hardware/software failure,
confidentiality, fraud.
ERP Benefits - ANSWER Real-time processing, integrated data, fewer errors.
, DMZ Definition - ANSWER Network isolation layer protecting internal systems.
Fraud Triangle - ANSWER Pressure, Opportunity, Rationalization.
Most Common Fraud Detection Method - ANSWER Tips/whistleblower reports.
Fraud Risk Assessment Steps - ANSWER Identify fraud risks; assess likelihood &
impact; develop responses.
Fraud Risk Management Components - ANSWER Governance, risk assessment,
control activities, investigation, monitoring.
Types of Fraud Risks - ANSWER Financial reporting, nonfinancial reporting,
asset misappropriation, illegal acts.
Internal Audit Role in Fraud - ANSWER Provides independent assurance over
fraud controls.
Fraud Control Activities - ANSWER Procedures designed to prevent or detect
fraud.
Fraud Investigation Outcomes - ANSWER Legal action, discipline, insurance
claims, process redesign.
How is risk management defined? - ANSWER The process conducted by
management to understand and deal with uncertainties that could affect the
organization's objectives.