Tuesday, November 25, 2025

CISA Exam Mocktest 1

 *CISA Exam Mocktest*


CISA Exam Mocktest..Answers at the end..


Below are 50 MCQ Questions with Answers based on CISA Certification Exam domains (IS Audit, Governance & Management of IT, IS Acquisition, Development & Implementation, IS Operations, Protection of Information Assets, BCP/DR, Cybersecurity, Risk, Controls & Audit Techniques).

(All are exam-style, scenario-based)


50 CISA Scenario-Based MCQs with Answers


IT Governance & Management


1. The primary purpose of IT governance is to: A. Optimize IT cost

B. Align IT with business objectives

C. Reduce audit issues

D. Improve employee productivity

Answer: 

2. Who is primarily responsible for managing IT risk? A. Internal auditor

B. Risk owner / Business process owner

C. CIO

D. IT security officer

Answer: 

3. Key factor for successful IT strategy implementation is: A. Strong password policy

B. Executive sponsorship

C. Frequent audits

D. Outsourcing

Answer: 

Information Systems Audit


4. The first step of an IS audit plan is: A. Risk assessment

B. Reporting results

C. Testing controls

D. Determining sampling size

Answer: 

5. Best evidence of effectiveness of password controls is: A. Review password policy

B. Interview IT staff

C. Review system access logs

D. Discuss with users

Answer: 

Risk Management


6. Risk = ? A. Impact + Control

B. Threat × Vulnerability × Impact

C. Incident / Probability

D. Exposure – Mitigation

Answer: 

7. Greatest risk with outsourcing IT processing: A. High cost

B. Loss of control over operations

C. Technology incompatibility

D. Increased staffing needs

Answer: 

BCP / DRP


8. Most important factor in BCP development: A. Backup systems are tested

B. Business impact analysis (BIA)

C. IT recovery procedures

D. Insurance

Answer: 

9. Recovery Time Objective (RTO) means: A. Maximum tolerable data loss

B. Time to restore operations

C. Time data must be backed up

D. Time of system crash

Answer: 

Cybersecurity / Access Control


10. Best control to prevent unauthorized system access: A. Audit trail review

B. Multi-factor authentication

C. Network diagram

D. Proxy server

Answer: 

11. Role-based access control is based on: A. Job responsibility

B. User preference

C. Seniority

D. Number of users

Answer: 

12. A session timeout control primarily protects against: A. Worms

B. Shoulder surfing

C. Unauthorized use of unattended device

D. Denial of service

Answer: 

Change & Configuration Management


13. The primary risk when bypassing change control procedures: A. Increased cost

B. System instability

C. Poor employee morale

D. License violation

Answer: 

14. Best control over emergency changes: A. Approval before implementation

B. Review and authorization after implementation

C. User testing

D. Training sessions

Answer: 

Software Development & SDLC


15. User acceptance testing ensures: A. Technical requirements are met

B. System meets business requirements

C. System is stable

D. System is secure

Answer: 

16. Which development method is best for rapidly changing requirements? A. Waterfall

B. Agile

C. Prototyping

D. Object-oriented

Answer: 

IT Operations


17. The best evidence of job scheduling effectiveness is: A. Backup logs

B. System downtime

C. Review of job run logs

D. Change logs

Answer: 

18. The primary objective of segregation of duties is to: A. Increase productivity

B. Speed up operations

C. Prevent fraud and errors

D. Reduce staff workload

Answer: 

Physical Security


19. Greatest risk if a data center fire suppression system fails: A. Loss of confidentiality

B. Loss of availability

C. Loss of accountability

D. Increased cyberattacks

Answer: 

20. Best protection of servers from power failure: A. Generator only

B. UPS + Generator

C. Surge protector

D. Auto restart

Answer: 

Network & Communication Security


21. Firewalls are primarily used to: A. Encrypt data

B. Block unauthorized access

C. Detect intrusions

D. Block viruses

Answer: 

22. IPS (Intrusion Prevention System) differs from IDS because it: A. Monitors network only

B. Blocks attacks in real time

C. Works only offline

D. Requires manual action

Answer: 

Database & Application Controls


23. Referential integrity ensures: A. Database backup

B. Consistency between tables

C. Faster response time

D. Accurate audit trails

Answer: 

24. Preventing duplicate entries is: A. Output control

B. Input validation control

C. Processing control

D. Accounting control

Answer: 

Audit Evidence & Techniques


25. The most reliable audit evidence is: A. Inquiry

B. Observation

C. Reperformance

D. Interview

Answer: 

26. CAATs are most useful when: A. Manual controls dominate

B. Systems process large volumes of transactions

C. Staff is not cooperative

D. Audit time is unlimited

Answer: 

Encryption & Data Protection


27. Encryption primarily protects: A. Authorization

B. Data confidentiality

C. Data retention

D. Data backup

Answer:

28. Digital signatures ensure: A. Encryption only

B. Non-repudiation and authentication

C. System backup

D. Access logs

Answer:

Malware & Threats


29. Malware that demands payment for file recovery: A. Virus

B. Ransomware

C. Worm

D. Rootkit

Answer: 

30. Social engineering attacks target: A. Firewalls

B. Human weaknesses

C. Network routers

D. Encryption

Answer: 

Logging & Monitoring


31. Log review helps primarily in: A. Backup recovery

B. Detecting unauthorized activities

C. Asset management

D. SDLC enhancement

Answer: 

Third-Party and Cloud


32. Key audit concern with cloud computing: A. Reduced hardware costs

B. Data ownership and control

C. Faster deployment

D. Reduced staffing

Answer: 


Incident Management


33. First step after security breach: A. Disconnect servers

B. Notify regulators

C. Contain the incident

D. Fire the administrator

Answer: 

Data Backup


34. Best method to protect offsite backup tapes: A. Compression

B. Encryption

C. Replication

D. Labeling

Answer: 

Access Control Testing


35. Best way to test user access rights: A. Confirm with managers

B. Review HR documents

C. Review access control list (ACL)

D. Review firewall policies

Answer: 

CobiT and Frameworks


36. COBIT focuses on: A. Network security

B. IT governance & control

C. Software testing

D. SDLC

Answer: 


Patch Management


37. Risk of missing security patches: A. Poor system performance

B. Vulnerability exploitation threat

C. Software redesign

D. Extra training required

Answer: 

Identity & Access


38. Least privilege principle means: A. Full access to everyone

B. Only minimal required access

C. Access based on friendship

D. Access reviewed annually only

Answer: 

Types of Testing


39. Penetration testing evaluates: A. Backup reliability

B. System security vulnerabilities

C. System functionality

D. Business process flow

Answer: 

Controls


40. A detective control example: A. Encryption

B. Firewalls

C. Log monitoring

D. Password policy

Answer: 


Sampling


41. Statistical sampling is preferred when: A. Small data volume

B. Large population size

C. Full audit possible

D. Data unavailable

Answer: 

Data Integrity


42. Hash totals ensure: A. Accuracy of processing

B. Confidentiality

C. Recovery ability

D. Faster processing

Answer: 

Segregation of Duties


43. In payroll, incompatible duties include: A. Preparing & distributing checks

B. Hiring & training staff

C. Processing & reporting

D. Review & approval

Answer: 

Asset Management


44. Best control to track mobile devices: A. Insurance

B. Asset register

C. Firewall

D. User agreement

Answer: 

Network


45. Primary risk of unmanaged switches: A. Noise interference

B. Unauthorized network access

C. High power usage

D. Slow response time

Answer: 

Audit Reporting


46. Most important part of an audit report: A. Audit procedures

B. Findings and recommendations

C. Management biographies

D. Auditor background

Answer: 

Digital Forensics


47. First step in evidence handling: A. Analyze

B. Report

C. Chain of custody

D. Photograph

Answer: 

Authentication


48. Biometric control verifies: A. What the user has

B. What the user knows

C. Who the user is

D. Where the user logs in

Answer: 

Availability Risk


49. Most important for high-availability system: A. Encryption

B. Redundancy

C. Antivirus

D. Policies

Answer: 

Audit Follow-up


50. Primary purpose of audit follow-up: A. Schedule next audit

B. Verify corrective actions

C. Add new controls

D. Create new risk

Answer 




ANSWERS......

Below are 50 MCQ Questions with Answers based on CISA Certification Exam domains (IS Audit, Governance & Management of IT, IS Acquisition, Development & Implementation, IS Operations, Protection of Information Assets, BCP/DR, Cybersecurity, Risk, Controls & Audit Techniques).

(All are exam-style, scenario-based)

50 CISA Scenario-Based MCQs with Answers


IT Governance & Management


1. The primary purpose of IT governance is to: A. Optimize IT cost

B. Align IT with business objectives

C. Reduce audit issues

D. Improve employee productivity

Answer: B



---


2. Who is primarily responsible for managing IT risk? A. Internal auditor

B. Risk owner / Business process owner

C. CIO

D. IT security officer

Answer: B



---


3. Key factor for successful IT strategy implementation is: A. Strong password policy

B. Executive sponsorship

C. Frequent audits

D. Outsourcing

Answer: B



---


Information Systems Audit


4. The first step of an IS audit plan is: A. Risk assessment

B. Reporting results

C. Testing controls

D. Determining sampling size

Answer: A



---


5. Best evidence of effectiveness of password controls is: A. Review password policy

B. Interview IT staff

C. Review system access logs

D. Discuss with users

Answer: C



---


Risk Management


6. Risk = ? A. Impact + Control

B. Threat × Vulnerability × Impact

C. Incident / Probability

D. Exposure – Mitigation

Answer: B



---


7. Greatest risk with outsourcing IT processing: A. High cost

B. Loss of control over operations

C. Technology incompatibility

D. Increased staffing needs

Answer: B



---


BCP / DRP


8. Most important factor in BCP development: A. Backup systems are tested

B. Business impact analysis (BIA)

C. IT recovery procedures

D. Insurance

Answer: B



---


9. Recovery Time Objective (RTO) means: A. Maximum tolerable data loss

B. Time to restore operations

C. Time data must be backed up

D. Time of system crash

Answer: B



---


Cybersecurity / Access Control


10. Best control to prevent unauthorized system access: A. Audit trail review

B. Multi-factor authentication

C. Network diagram

D. Proxy server

Answer: B



---


11. Role-based access control is based on: A. Job responsibility

B. User preference

C. Seniority

D. Number of users

Answer: A



---


12. A session timeout control primarily protects against: A. Worms

B. Shoulder surfing

C. Unauthorized use of unattended device

D. Denial of service

Answer: C



---


Change & Configuration Management


13. The primary risk when bypassing change control procedures: A. Increased cost

B. System instability

C. Poor employee morale

D. License violation

Answer: B



---


14. Best control over emergency changes: A. Approval before implementation

B. Review and authorization after implementation

C. User testing

D. Training sessions

Answer: B



---


Software Development & SDLC


15. User acceptance testing ensures: A. Technical requirements are met

B. System meets business requirements

C. System is stable

D. System is secure

Answer: B



---


16. Which development method is best for rapidly changing requirements? A. Waterfall

B. Agile

C. Prototyping

D. Object-oriented

Answer: B



---


IT Operations


17. The best evidence of job scheduling effectiveness is: A. Backup logs

B. System downtime

C. Review of job run logs

D. Change logs

Answer: C



---


18. The primary objective of segregation of duties is to: A. Increase productivity

B. Speed up operations

C. Prevent fraud and errors

D. Reduce staff workload

Answer: C



---


Physical Security


19. Greatest risk if a data center fire suppression system fails: A. Loss of confidentiality

B. Loss of availability

C. Loss of accountability

D. Increased cyberattacks

Answer: B



---


20. Best protection of servers from power failure: A. Generator only

B. UPS + Generator

C. Surge protector

D. Auto restart

Answer: B



---


Network & Communication Security


21. Firewalls are primarily used to: A. Encrypt data

B. Block unauthorized access

C. Detect intrusions

D. Block viruses

Answer: B



---


22. IPS (Intrusion Prevention System) differs from IDS because it: A. Monitors network only

B. Blocks attacks in real time

C. Works only offline

D. Requires manual action

Answer: B



---


Database & Application Controls


23. Referential integrity ensures: A. Database backup

B. Consistency between tables

C. Faster response time

D. Accurate audit trails

Answer: B



---


24. Preventing duplicate entries is: A. Output control

B. Input validation control

C. Processing control

D. Accounting control

Answer: B



---


Audit Evidence & Techniques


25. The most reliable audit evidence is: A. Inquiry

B. Observation

C. Reperformance

D. Interview

Answer: C



---


26. CAATs are most useful when: A. Manual controls dominate

B. Systems process large volumes of transactions

C. Staff is not cooperative

D. Audit time is unlimited

Answer: B



---


Encryption & Data Protection


27. Encryption primarily protects: A. Authorization

B. Data confidentiality

C. Data retention

D. Data backup

Answer: B



---


28. Digital signatures ensure: A. Encryption only

B. Non-repudiation and authentication

C. System backup

D. Access logs

Answer: B



---


Malware & Threats


29. Malware that demands payment for file recovery: A. Virus

B. Ransomware

C. Worm

D. Rootkit

Answer: B



---


30. Social engineering attacks target: A. Firewalls

B. Human weaknesses

C. Network routers

D. Encryption

Answer: B



---


Logging & Monitoring


31. Log review helps primarily in: A. Backup recovery

B. Detecting unauthorized activities

C. Asset management

D. SDLC enhancement

Answer: B



---


Third-Party and Cloud


32. Key audit concern with cloud computing: A. Reduced hardware costs

B. Data ownership and control

C. Faster deployment

D. Reduced staffing

Answer: B



---


Incident Management


33. First step after security breach: A. Disconnect servers

B. Notify regulators

C. Contain the incident

D. Fire the administrator

Answer: C



---


Data Backup


34. Best method to protect offsite backup tapes: A. Compression

B. Encryption

C. Replication

D. Labeling

Answer: B



---


Access Control Testing


35. Best way to test user access rights: A. Confirm with managers

B. Review HR documents

C. Review access control list (ACL)

D. Review firewall policies

Answer: C



---


CobiT and Frameworks


36. COBIT focuses on: A. Network security

B. IT governance & control

C. Software testing

D. SDLC

Answer: B



---


Patch Management


37. Risk of missing security patches: A. Poor system performance

B. Vulnerability exploitation threat

C. Software redesign

D. Extra training required

Answer: B



---


Identity & Access


38. Least privilege principle means: A. Full access to everyone

B. Only minimal required access

C. Access based on friendship

D. Access reviewed annually only

Answer: B



---


Types of Testing


39. Penetration testing evaluates: A. Backup reliability

B. System security vulnerabilities

C. System functionality

D. Business process flow

Answer: B



---


Controls


40. A detective control example: A. Encryption

B. Firewalls

C. Log monitoring

D. Password policy

Answer: C



---


Sampling


41. Statistical sampling is preferred when: A. Small data volume

B. Large population size

C. Full audit possible

D. Data unavailable

Answer: B



---


Data Integrity


42. Hash totals ensure: A. Accuracy of processing

B. Confidentiality

C. Recovery ability

D. Faster processing

Answer: A



---


Segregation of Duties


43. In payroll, incompatible duties include: A. Preparing & distributing checks

B. Hiring & training staff

C. Processing & reporting

D. Review & approval

Answer: A



---


Asset Management


44. Best control to track mobile devices: A. Insurance

B. Asset register

C. Firewall

D. User agreement

Answer: B



---


Network


45. Primary risk of unmanaged switches: A. Noise interference

B. Unauthorized network access

C. High power usage

D. Slow response time

Answer: B



---


Audit Reporting


46. Most important part of an audit report: A. Audit procedures

B. Findings and recommendations

C. Management biographies

D. Auditor background

Answer: B



---


Digital Forensics


47. First step in evidence handling: A. Analyze

B. Report

C. Chain of custody

D. Photograph

Answer: C



---


Authentication


48. Biometric control verifies: A. What the user has

B. What the user knows

C. Who the user is

D. Where the user logs in

Answer: C



---


Availability Risk


49. Most important for high-availability system: A. Encryption

B. Redundancy

C. Antivirus

D. Policies

Answer: B



---


Audit Follow-up


50. Primary purpose of audit follow-up: A. Schedule next audit

B. Verify corrective actions

C. Add new controls

D. Create new risk

Answer B

www.gmsisuccess.in



Monday, November 24, 2025

50 Question ⁉️ with answers Compre mocktest

50 Scenario-Based MCQ Questions covering the listed topics from US CMA Part 1: depreciation, impairment, deferred tax, receivable age analysis, overhead allocations, variances, budgeting, segment reporting, ROI/RI, responsibility centers, risks, leverage, controls, analytics, learning curve, EMV, EVPI, etc.


---

50 Scenario-Based MCQs

Depreciation & Impairment

1. A company purchased machinery for $300,000 with a useful life of 10 years and no salvage value. After 4 years, remaining useful life was revised downward to 3 more years. Straight-line method is used. What is the revised annual depreciation? A. $30,000
B. $50,000
C. $75,000
D. $60,000
Answer: 


---

2. A cash-generating unit (CGU) has carrying value of $950,000. The recoverable amount (higher of fair value less cost to sell $700,000 OR value-in-use $750,000) is $750,000. What is the impairment loss? A. $950,000
B. $200,000
C. $750,000
D. $50,000
Answer: 


---

Deferred Tax

3. A firm records accelerated depreciation for tax but straight-line for books. This temporary difference creates: A. Deferred tax liability
B. Deferred tax asset
C. Permanent tax difference
D. No tax impact
Answer: 


---

Receivables Aging

4. 60-day overdue accounts total $80,000 with expected uncollectible rate 6%. What is estimated allowance? A. $4,800
B. $6,000
C. $3,600
D. $1,800
Answer: 


---

Overhead Allocation

5. Step-down method first allocates service department S1 to S2 and production departments P1 & P2. If S1 cost = $100,000 and allocation percentages are S2 20%, P1 40%, P2 40%, how much is allocated to P1 in the first step? A. $20,000
B. $40,000
C. $50,000
D. $60,000
Answer: 


---

6. Reciprocal method uses simultaneous equations to allocate service costs. This method is preferred because: A. It is simple to apply
B. It fully recognizes inter-service use
C. It uses arbitrary percentages
D. It ignores overhead sharing
Answer: 


---

Over/Under-applied Overhead

7. Actual overhead = $520,000; applied OH = $500,000. Result? A. $20,000 overapplied
B. $20,000 underapplied
C. Balanced
D. Must be closed to COGM
Answer: 


---

Capacity

8. Maximum capacity under ideal production with no downtime refers to: A. Normal capacity
B. Practical capacity
C. Theoretical capacity
D. Actual capacity
Answer: 


---

Cash Flows & Budgeting

9. Depreciation is added back to Net income in operating cash flow because: A. It represents cash paid
B. It is a non-cash expense
C. It occurs only in investing
D. It is a financing item
Answer: 


---

10. A company expects January Sales $200,000; 30% cash, 70% collected next month. Expected February cash receipts from January sales: A. $140,000
B. $200,000
C. $60,000
D. $100,000
Answer: 


---

Raw Material Budget

11. Production requires 4 kg per unit. Expected production 10,000 units. RM opening stock 5,000 kg; closing desired 8,000 kg. Required purchase? A. 37,000 kg
B. 43,000 kg
C. 48,000 kg
D. 40,000 kg
Answer: 


---

Flexible Budget & Variances

12. Actual output = 4,000 units; standard 1.5 hrs per unit; actual hours = 5,800. Labour efficiency variance at $20/hr? A. 20,000 U
B. 16,000 U
C. 20,000 F
D. 16,000 F
Answer: 


---

13. Standard VOH = $6 per hr, actual hours = 7,200; standard hours allowed = 7,000. VOH efficiency variance? A. $1,200 U
B. $1,200 F
C. $600 F
D. $600 U
Answer: 


---

14. Fixed OH spending variance occurs due to: A. Change in hours worked
B. Change in capacity
C. Change in actual FOH spending
D. Change in efficiency
Answer: 


---

Segment Reporting / ROI / RI / Responsibility Centers

15. A division earns operating income $300,000, average assets $2,000,000. ROI? A. 10%
B. 15%
C. 20%
D. 30%
Answer: 


---

16. RI with required return 12%? Income $300,000; assets $2M.
A. $60,000
B. $40,000
C. $70,000
D. $36,000
Answer: 


---

17. A cost center is evaluated based on: A. Profit
B. Asset turnover
C. Cost control
D. ROI
Answer: 


---

Risk / Controls / Ethics

18. Responsibility for managing operational risk belongs to: A. Internal audit
B. Line management
C. External auditors
D. Board
Answer: 


---

19. Accepting tickets from vendor while selecting suppliers is: A. Stewardship
C. Benchmarking
D. Occupational fraud
Answer: 


---

20. Inherent limitation of internal control example: A. Segregation of duties
B. Collusion
C. Authorization
D. Reconciliation
Answer: 


---

Diseconomies of Scale

21. External diseconomies arise from: A. Poor coordination internally
B. High employee turnover
C. Higher industry-wide input cost
D. Machine breakdowns
Answer: 


---


22. Not a BSC perspective: A. Customer
B. Learning & Growth
C. Competitor strategy
D. Financial
Answer: 


---

Liquidity & Leverage

23. High debt-to-equity affects: A. Liquidity
B. Solvency
C. ROA
D. Sales growth
Answer: 


---

Data Analytics / Integrity

24. Data integrity ensures: A. Speed of computing
B. Completeness, accuracy, consistency
C. Volume reduction
D. Confidentiality only
Answer: 


---

Virus Types

25. A virus that disguises as normal software: A. Worm
C. Spyware
D. Ransomware
Answer: 


---

Internal Controls

26. Example of control environment: A. Bank reconciliation
B. Management integrity & ethical tone
C. Password control
D. Purchase authorization
Answer: 


---

27. Output control technique: A. Batch totals
B. Exception reports
C. Input validation
D. Log-in checks
Answer: 


---

Visualization

28. Visual tool to show parts-to-whole: A. Scatter plot
B. Histogram
D. Control chart
Answer: 


---

Correlation & Regression

29. r = 0.88 means: A. Weak positive relation
B. Strong positive relation
C. No relation
D. Perfect negative relation
Answer: 


---

Learning Curve

30. 80% learning curve means: A. Avg time decreases 80% each batch
B. Each time unit reduces to 80% of previous
C. Labour cost increases 20%
D. Production output 80%
Answer: 


---

Expected Monetary Value

31. EMV = Profit × Probability: Option A: $100k @ 40%, B: $80k @ 60%. Which chosen? A. A
B. B
C. Equal
D. Cannot decide
Answer: 


---

EVPI

32. EV under certainty = 90k; EMV best alternative = 70k. EVPI? A. 20k
B. 30k
C. 70k
D. 80k
Answer: 


---

Manufacturing Bottlenecks

33. A CNC machine with limited hours that constrains output is: A. Cost driver
B. Bottleneck resource
C. Joint product
D. Fixed input
Answer: 


---

Additional 17 Question True or False:

34. Overapplied OH decreases COGS → Answer: 


35. Segment report based on management approach → Answer: 


36. Data analytics prevents rather than detects fraud → Answer: 


37. Sole focus on ROI can cause dysfunctional decisions → Answer: 


38. Benchmarking vs industry = competitive benchmarking


39. Financial leverage increases EPS variability


40. Operating leverage increases business risk


41. Internal control feature: reasonable assurance


42. Phishing is social engineering attack


43. Reciprocal method uses simultaneous equations


44. Adequate working capital avoids liquidity crisis


45. Contribution margin used in CVP analysis


46. Variable OH spending variance relates to rates


47. Efficiency variance relates to usage


48. Safety stock protects against uncertainty


49. Step-down partially recognizes service departments


50. Conflict of interest minimized via independent review


Answers.....

Below are 50 Scenario-Based MCQ Questions with Answers covering the listed topics from US CMA Part 1: depreciation, impairment, deferred tax, receivable age analysis, overhead allocations, variances, budgeting, segment reporting, ROI/RI, responsibility centers, risks, leverage, controls, analytics, learning curve, EMV, EVPI, etc.
 
50 Scenario-Based MCQs (with Answers & Explanations)
Depreciation & Impairment
1. A company purchased machinery for $300,000 with a useful life of 10 years and no salvage value. After 4 years, remaining useful life was revised downward to 3 more years. Straight-line method is used. What is the revised annual depreciation? A. $30,000
B. $50,000
C. $75,000
D. $60,000
Answer: C
Explanation: Initial dep = 300,000/10 = 30,000. Accum dep 4 years = 120,000. NBV = 180,000. Revised dep = 180,000/3 = 60,000.
 
2. A cash-generating unit (CGU) has carrying value of $950,000. The recoverable amount (higher of fair value less cost to sell $700,000 OR value-in-use $750,000) is $750,000. What is the impairment loss? A. $950,000
B. $200,000
C. $750,000
D. $50,000
Answer: B
 
Deferred Tax
3. A firm records accelerated depreciation for tax but straight-line for books. This temporary difference creates: A. Deferred tax liability
B. Deferred tax asset
C. Permanent tax difference
D. No tax impact
Answer: A
 
Receivables Aging
4. 60-day overdue accounts total $80,000 with expected uncollectible rate 6%. What is estimated allowance? A. $4,800
B. $6,000
C. $3,600
D. $1,800
Answer: A
 
Overhead Allocation
5. Step-down method first allocates service department S1 to S2 and production departments P1 & P2. If S1 cost = $100,000 and allocation percentages are S2 20%, P1 40%, P2 40%, how much is allocated to P1 in the first step? A. $20,000
B. $40,000
C. $50,000
D. $60,000
Answer: B
 
6. Reciprocal method uses simultaneous equations to allocate service costs. This method is preferred because: A. It is simple to apply
B. It fully recognizes inter-service use
C. It uses arbitrary percentages
D. It ignores overhead sharing
Answer: B
 
Over/Under-applied Overhead
7. Actual overhead = $520,000; applied OH = $500,000. Result? A. $20,000 overapplied
B. $20,000 underapplied
C. Balanced
D. Must be closed to COGM
Answer: B
 
Capacity
8. Maximum capacity under ideal production with no downtime refers to: A. Normal capacity
B. Practical capacity
C. Theoretical capacity
D. Actual capacity
Answer: C
 
Cash Flows & Budgeting
9. Depreciation is added back to Net income in operating cash flow because: A. It represents cash paid
B. It is a non-cash expense
C. It occurs only in investing
D. It is a financing item
Answer: B
 
10. A company expects January Sales $200,000; 30% cash, 70% collected next month. Expected February cash receipts from January sales: A. $140,000
B. $200,000
C. $60,000
D. $100,000
Answer: A
 
Raw Material Budget
11. Production requires 4 kg per unit. Expected production 10,000 units. RM opening stock 5,000 kg; closing desired 8,000 kg. Required purchase? A. 37,000 kg
B. 43,000 kg
C. 48,000 kg
D. 40,000 kg
Answer: B
(10,000×4 + 8,000 – 5,000 = 43,000)
 
Flexible Budget & Variances
12. Actual output = 4,000 units; standard 1.5 hrs per unit; actual hours = 5,800. Labour efficiency variance at $20/hr? A. 20,000 U
B. 16,000 U
C. 20,000 F
D. 16,000 F
Answer: B
(SH = 6,000; AH = 5,800 → 200 F × $20 = 4,000 F? Wait) Correction: (6000-5800)*20 = 4,000 F (Correcting key) → Answer corrected: C
 
13. Standard VOH = $6 per hr, actual hours = 7,200; standard hours allowed = 7,000. VOH efficiency variance? A. $1,200 U
B. $1,200 F
C. $600 F
D. $600 U
Answer: A
 
14. Fixed OH spending variance occurs due to: A. Change in hours worked
B. Change in capacity
C. Change in actual FOH spending
D. Change in efficiency
Answer: C
 
Segment Reporting / ROI / RI / Responsibility Centers
15. A division earns operating income $300,000, average assets $2,000,000. ROI? A. 10%
B. 15%
C. 20%
D. 30%
Answer: B
 
16. RI with required return 12%? Income $300,000; assets $2M.
A. $60,000
B. $40,000
C. $70,000
D. $36,000
Answer: A
 
17. A cost center is evaluated based on: A. Profit
B. Asset turnover
C. Cost control
D. ROI
Answer: C
 
Risk / Controls / Ethics
18. Responsibility for managing operational risk belongs to: A. Internal audit
B. Line management
C. External auditors
D. Board
Answer: B
 
19. Accepting tickets from vendor while selecting suppliers is: A. Stewardship
B. Conflict of interest
C. Benchmarking
D. Occupational fraud
Answer: B
 
20. Inherent limitation of internal control example: A. Segregation of duties
B. Collusion
C. Authorization
D. Reconciliation
Answer: B
 
Diseconomies of Scale
21. External diseconomies arise from: A. Poor coordination internally
B. High employee turnover
C. Higher industry-wide input cost
D. Machine breakdowns
Answer: C
 
Balanced Scorecard
22. Not a BSC perspective: A. Customer
B. Learning & Growth
C. Competitor strategy
D. Financial
Answer: C
 
Liquidity & Leverage
23. High debt-to-equity affects: A. Liquidity
B. Solvency
C. ROA
D. Sales growth
Answer: B
 
Data Analytics / Integrity
24. Data integrity ensures: A. Speed of computing
B. Completeness, accuracy, consistency
C. Volume reduction
D. Confidentiality only
Answer: B
 
Virus Types
25. A virus that disguises as normal software: A. Worm
B. Trojan horse
C. Spyware
D. Ransomware
Answer: B
 
Internal Controls
26. Example of control environment: A. Bank reconciliation
B. Management integrity & ethical tone
C. Password control
D. Purchase authorization
Answer: B
 
27. Output control technique: A. Batch totals
B. Exception reports
C. Input validation
D. Log-in checks
Answer: B
 
Visualization
28. Visual tool to show parts-to-whole: A. Scatter plot
B. Histogram
C. Pie chart
D. Control chart
Answer: C
 
Correlation & Regression
29. r = 0.88 means: A. Weak positive relation
B. Strong positive relation
C. No relation
D. Perfect negative relation
Answer: B
 
Learning Curve
30. 80% learning curve means: A. Avg time decreases 80% each batch
B. Each time unit reduces to 80% of previous
C. Labour cost increases 20%
D. Production output 80%
Answer: B
 
Expected Monetary Value
31. EMV = Profit × Probability: Option A: $100k @ 40%, B: $80k @ 60%. Which chosen? A. A
B. B
C. Equal
D. Cannot decide
Answer: B
(A=40k, B=48k)
 
EVPI
32. EV under certainty = 90k; EMV best alternative = 70k. EVPI? A. 20k
B. 30k
C. 70k
D. 80k
Answer: A
 
Manufacturing Bottlenecks
33. A CNC machine with limited hours that constrains output is: A. Cost driver
B. Bottleneck resource
C. Joint product
D. Fixed input
Answer: B
 
Additional 17 True or False...
34. Overapplied OH decreases COGS → Answer: True
35. Segment report based on management approach → Answer: True
36. Data analytics prevents rather than detects fraud → Answer: False
37. Sole focus on ROI can cause dysfunctional decisions → Answer: True
38. Benchmarking vs industry = competitive benchmarking
39. Financial leverage increases EPS variability
40. Operating leverage increases business risk
41. Internal control feature: reasonable assurance
42. Phishing is social engineering attack
43. Reciprocal method uses simultaneous equations
44. Adequate working capital avoids liquidity crisis
45. Contribution margin used in CVP analysis
46. Variable OH spending variance relates to rates
47. Efficiency variance relates to usage
48. Safety stock protects against uncertainty
49. Step-down partially recognizes service departments
50. Conflict of interest minimized via independent review

www.gmsisuccess.in