SlideShare a Scribd company logo
1 of 3
Download to read offline
Audit and Assurance – Past Paper Questions
1
Q. The IT Manager has conducted an in-house review of his operations and has identified
the following specific risks and exposures:
(a) Processing the wrong data file.
(b) Missing transactions.
(c) Processing improper transactions.
(d) Recording transactions in a wrong accounting period.
(e) Lost transactions after a restart.
(f) Information security breaches and inadequate controls over privacy of data.
(g) System errors could go undetected or uncorrected for extended periods of time thus
compromising data integrity.
Since you are the IT Auditor, he has requested you to advise him on at least two controls
or control procedures each that may be put in place to address the identified risks and
exposures. (14)
Q. As data is stored electronically it may be difficult to trace transactions from the detail
to the summary. For example a report may claim to show TOTAL SALES for the
month but there is no way to check manually that every single invoice has been
included unless each transaction is logged. This ability to track transactions through
various reports is known as audit trail.
Required:
(a) Briefly explain the concept of Computer Audit. (04)
(b) Discuss ‘Round the Computer Audit’ and ‘Through the Computer Audit’. (08)
Q. Classify the following controls as preventive, detective, or corrective controls. Give
very brief reasons to justify your answers.
(i) Strong passwords
(ii) Exception reports
(iii) Digital signatures
(iv) Segregation of duties
(v) Backups
(vi) Review of system activity logs (06)
Q. Most of the advanced and sensitive systems place significant reliance on automated
controls. Audit trail is one such automated control.
(a) Explain the concept of audit trail in a computerized environment. (02)
(b) List the major benefits which can be derived from the use of audit trails (03)
Q. Classify the following controls into Input, Processing and Output Controls.
(i) Limit checks on calculated amounts.
(ii) Signature on source documents.
(iii) Use of bar codes.
(iv) Marking a file as read only.
(v) Audit trail.
(vi) Run-to-run totals.
(vii)Exception report showing data that does not conform to specified criteria.
(viii) Initial data should be within a predetermined range of values.
(ix) Checkpoint and recovery procedures.
(x) Unique login and password.
(xi) Restriction on printing of confidential reports.
(xii) Sequential checks. (06)
Audit and Assurance – Past Paper Questions
2
Q. The internal auditor of Crest Securities Limited has highlighted the following issues in
his report:
(i) Most of the users have weak passwords.
(ii) There is no password expiry policy.
(iii) Locked user accounts are unlocked automatically after 24 hours.
(iv) Users are allowed to use their smart phones, tablets and laptops for sending and
receiving official emails/documents.
(v) Firewall is installed with its default policy.
Required:
Suggest appropriate controls to address the above issues. (10)
Q. Segregate the following into preventive, detective and corrective controls and give brief
justification in support of your choice.
(i) Reviewing credit card bill before payment.
(ii) Keeping ATM card PIN separate from ATM card.
(iii)Monitoring expenditures against budgeted amounts.
(iv) Submitting revised invoices after correction.
(v) Updating IT access lists if individual’s role changes.
(vi) Review of implemented controls by internal auditor.
(vii)Mandatory change of computer passwords after every 45 days. (07)
Q. Smart Lease (SL) is a large-sized leasing company, primarily engaged in the leasing of
automobiles and industrial equipments. Operations of the company are fully automated
and are on custom-built IT applications. Over the last couple of years, the company has
experienced a number of IT related security incidents such as sabotage, fraud, and theft
of confidential or propriety information, both at head office and in branches.
Management has analyzed these incidents and come to the conclusion that majority of
these incidents were the work of insiders, i.e. employees of the company itself.
Required:
Suggest at least six IT security practices/controls which SL should establish to prevent
or detect insiders’ attacks on its IT resources. In each case explain the rationale behind
your suggestion. (12)
Q. Your firm is conducting IT audit of Elegant (Private) Limited (EPL) which is a
distributor of FMCG and has a network of branches across the country. Successful
implementation of an ERP system in the company last year has led to widespread
availability of information in all business areas.
Being the job in-charge on this assignment you have decided to adopt ‘concurrent
auditing techniques’. However, the audit manager has advised you that since
concurrent auditing techniques have never been used previously, the change should be
communicated to the client before implementing the same.
Required:
Prepare a note for EPL’s management describing briefly the factors which have
necessitated the use of concurrent auditing techniques; and (07)
Q. You are employed in a firm of chartered accountants. This is your second year as the
audit supervisor on the audit of Greet Bank Limited. The bank has made considerable
progress during the year under review which includes introduction of online banking
and increase in the number of branches.
Audit and Assurance – Past Paper Questions
3
This year you intend to adopt “through the computer” approach as against “around the
computer” approach followed last year.
Required:
(a) Justify the audit approach adopted last year and explain the reasons for the change in
approach for the current year. (08)
(b) Identify the difficulties which may arise while using “through the computer”
approach.(02)
Q. Generalized Audit Software provides a means to gain access to and manipulate data
maintained on computer storage media.
Required:
(a) Briefly explain the following functional capabilities provided by the generalized audit
software and in each case give two examples of how the auditor might use these
functional capabilities:
 Stratification and frequency analysis
 Arithmetical
 Statistical (7.5)
(b) Discuss any two limitations of generalized audit software. (03)
Q. (a) Identify any six factors that need to be considered while making a decision as regards
the use of Computer Assisted Audit Techniques (CAATs). (06)
(b) Describe the steps that need to be taken while planning the use of CAATs. (07)
Q. Identify the important matters which an IS Auditor would consider while selecting a
Computer Assisted Audit Technique. How could greater productivity and improved
quality of audits be achieved through CAATs? (06)
Q. With the emergence of business conglomerates and globalization the conventional
techniques of manual auditing are no longer an option. The quantum, location and
complexity of data stored in computerized systems warrants auditing through computer
based tools and techniques to ensure efficiency and provide desired level of assurance
to the stakeholders.
Required:
(a) Describe Generalized Audit Software and its major functions. (08)
(b) List any four limitations of Generalized Audit Software. (04)
Q. Compare the two techniques of auditing in the computerized environment viz.
‘Auditing around the computer’ and ‘Auditing through the computer’ and discuss risks
involved, benefit, reliability and ease of implementation. (05)

More Related Content

What's hot

Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentKugendranMani
 
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...Ee Chuan Yoong
 
Parallel simulation
Parallel simulationParallel simulation
Parallel simulationkzoe1996
 
Test Data Approach
Test Data ApproachTest Data Approach
Test Data Approachkzoe1996
 
Integrated Test Facility
Integrated Test FacilityIntegrated Test Facility
Integrated Test Facilitykzoe1996
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an IntroductoryMNorazizi HM
 
Artificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsArtificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsMarlon Dumas
 
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013Barun Kumar
 
Nelito barclays bank_rpa_regulatory_reporting_case_study1
Nelito barclays bank_rpa_regulatory_reporting_case_study1Nelito barclays bank_rpa_regulatory_reporting_case_study1
Nelito barclays bank_rpa_regulatory_reporting_case_study1isabelfabiano
 
Types of audit
Types of auditTypes of audit
Types of auditVadivelM9
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPsJayesh Daga
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized EnvironmentVadivelM9
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copySaleh Rashid
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...Dr. Sanjay Sawant Dessai
 

What's hot (20)

Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
 
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
 
Parallel simulation
Parallel simulationParallel simulation
Parallel simulation
 
Test Data Approach
Test Data ApproachTest Data Approach
Test Data Approach
 
Introduction to caat
Introduction to caatIntroduction to caat
Introduction to caat
 
Integrated Test Facility
Integrated Test FacilityIntegrated Test Facility
Integrated Test Facility
 
Real time Audit
Real time AuditReal time Audit
Real time Audit
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
Artificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsArtificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) Years
 
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
 
Nelito barclays bank_rpa_regulatory_reporting_case_study1
Nelito barclays bank_rpa_regulatory_reporting_case_study1Nelito barclays bank_rpa_regulatory_reporting_case_study1
Nelito barclays bank_rpa_regulatory_reporting_case_study1
 
Types of audit
Types of auditTypes of audit
Types of audit
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copy
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 

Viewers also liked

Bc mapping with referred books
Bc mapping with referred booksBc mapping with referred books
Bc mapping with referred booksMuhammad Ovais
 
Examiner Comments S 12 BCBS - See what kills
Examiner Comments S 12 BCBS - See what killsExaminer Comments S 12 BCBS - See what kills
Examiner Comments S 12 BCBS - See what killsMuhammad Ovais
 
Lecture 11 bmbs management information system qs
Lecture 11 bmbs management information system   qsLecture 11 bmbs management information system   qs
Lecture 11 bmbs management information system qsMuhammad Ovais
 
Lecture 07 bmbs motivation qs
Lecture 07 bmbs motivation   qsLecture 07 bmbs motivation   qs
Lecture 07 bmbs motivation qsMuhammad Ovais
 
Examiner Comments S 13 BCBS - See what kills
Examiner Comments S 13 BCBS - See what killsExaminer Comments S 13 BCBS - See what kills
Examiner Comments S 13 BCBS - See what killsMuhammad Ovais
 
04 practical writing all reports
04 practical writing   all reports04 practical writing   all reports
04 practical writing all reportsMuhammad Ovais
 
Examiner Comments A 12 BCBS - See what kills
Examiner Comments A 12 BCBS - See what killsExaminer Comments A 12 BCBS - See what kills
Examiner Comments A 12 BCBS - See what killsMuhammad Ovais
 
02 practical writing samples
02 practical writing   samples02 practical writing   samples
02 practical writing samplesMuhammad Ovais
 
01 practical writing all letters
01 practical writing   all letters01 practical writing   all letters
01 practical writing all lettersMuhammad Ovais
 
01 practical writing all letters
01 practical writing   all letters01 practical writing   all letters
01 practical writing all lettersMuhammad Ovais
 
02 practical writing samples - more lettters
02 practical writing   samples - more lettters02 practical writing   samples - more lettters
02 practical writing samples - more letttersMuhammad Ovais
 
10 practical writing samples - short reports
10 practical writing   samples - short reports10 practical writing   samples - short reports
10 practical writing samples - short reportsMuhammad Ovais
 
05 practical writing sample - pia business plan
05 practical writing   sample - pia business plan05 practical writing   sample - pia business plan
05 practical writing sample - pia business planMuhammad Ovais
 
08 practical writing meeting documents
08 practical writing   meeting documents08 practical writing   meeting documents
08 practical writing meeting documentsMuhammad Ovais
 
Parki krajobrazowe województwa łódzkiego
Parki krajobrazowe województwa łódzkiegoParki krajobrazowe województwa łódzkiego
Parki krajobrazowe województwa łódzkiegoRobert Czyżyński
 
07 practical writing sample - building maintenance proposal
07 practical writing   sample - building maintenance proposal07 practical writing   sample - building maintenance proposal
07 practical writing sample - building maintenance proposalMuhammad Ovais
 
02 practical writing samples
02 practical writing   samples02 practical writing   samples
02 practical writing samplesMuhammad Ovais
 

Viewers also liked (17)

Bc mapping with referred books
Bc mapping with referred booksBc mapping with referred books
Bc mapping with referred books
 
Examiner Comments S 12 BCBS - See what kills
Examiner Comments S 12 BCBS - See what killsExaminer Comments S 12 BCBS - See what kills
Examiner Comments S 12 BCBS - See what kills
 
Lecture 11 bmbs management information system qs
Lecture 11 bmbs management information system   qsLecture 11 bmbs management information system   qs
Lecture 11 bmbs management information system qs
 
Lecture 07 bmbs motivation qs
Lecture 07 bmbs motivation   qsLecture 07 bmbs motivation   qs
Lecture 07 bmbs motivation qs
 
Examiner Comments S 13 BCBS - See what kills
Examiner Comments S 13 BCBS - See what killsExaminer Comments S 13 BCBS - See what kills
Examiner Comments S 13 BCBS - See what kills
 
04 practical writing all reports
04 practical writing   all reports04 practical writing   all reports
04 practical writing all reports
 
Examiner Comments A 12 BCBS - See what kills
Examiner Comments A 12 BCBS - See what killsExaminer Comments A 12 BCBS - See what kills
Examiner Comments A 12 BCBS - See what kills
 
02 practical writing samples
02 practical writing   samples02 practical writing   samples
02 practical writing samples
 
01 practical writing all letters
01 practical writing   all letters01 practical writing   all letters
01 practical writing all letters
 
01 practical writing all letters
01 practical writing   all letters01 practical writing   all letters
01 practical writing all letters
 
02 practical writing samples - more lettters
02 practical writing   samples - more lettters02 practical writing   samples - more lettters
02 practical writing samples - more lettters
 
10 practical writing samples - short reports
10 practical writing   samples - short reports10 practical writing   samples - short reports
10 practical writing samples - short reports
 
05 practical writing sample - pia business plan
05 practical writing   sample - pia business plan05 practical writing   sample - pia business plan
05 practical writing sample - pia business plan
 
08 practical writing meeting documents
08 practical writing   meeting documents08 practical writing   meeting documents
08 practical writing meeting documents
 
Parki krajobrazowe województwa łódzkiego
Parki krajobrazowe województwa łódzkiegoParki krajobrazowe województwa łódzkiego
Parki krajobrazowe województwa łódzkiego
 
07 practical writing sample - building maintenance proposal
07 practical writing   sample - building maintenance proposal07 practical writing   sample - building maintenance proposal
07 practical writing sample - building maintenance proposal
 
02 practical writing samples
02 practical writing   samples02 practical writing   samples
02 practical writing samples
 

Similar to 02 a&a all questions

Sample audit plan
Sample audit planSample audit plan
Sample audit planMaher Manan
 
Bml 303 past papers pack
Bml 303 past papers packBml 303 past papers pack
Bml 303 past papers packSan King
 
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
Note on ‘Mapping’  CAAT Audit technique with  3 practical examplesNote on ‘Mapping’  CAAT Audit technique with  3 practical examples
Note on ‘Mapping’ CAAT Audit technique with 3 practical examplesAnmolDhale2
 
Data analytics - Alteryx Spotlight.pdf
Data analytics - Alteryx Spotlight.pdfData analytics - Alteryx Spotlight.pdf
Data analytics - Alteryx Spotlight.pdfssuser43b9f8
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
 
PBF Electronic or Electrials shop MS.pptx
PBF Electronic or Electrials shop MS.pptxPBF Electronic or Electrials shop MS.pptx
PBF Electronic or Electrials shop MS.pptxisraelidropadjah
 
Acc 340 Enhance teaching-snaptutorial.com
Acc 340 Enhance teaching-snaptutorial.comAcc 340 Enhance teaching-snaptutorial.com
Acc 340 Enhance teaching-snaptutorial.comrobertleew
 
ACC 340 Education Organization / snaptutorial.com
ACC 340  Education Organization / snaptutorial.comACC 340  Education Organization / snaptutorial.com
ACC 340 Education Organization / snaptutorial.comdonaldzs170
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
May/June 2008 Scenario 1
May/June 2008 Scenario 1May/June 2008 Scenario 1
May/June 2008 Scenario 1ianwbhs
 
Assocham global conference audit data standards - 28.10.2020
Assocham global conference   audit data standards - 28.10.2020Assocham global conference   audit data standards - 28.10.2020
Assocham global conference audit data standards - 28.10.2020Vinod Kashyap
 
computer system validation
computer system validationcomputer system validation
computer system validationGopal Patel
 
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4  Bullzeye Data Breach Readiness Assessment .docxPage 1 of 4  Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docxalfred4lewis58146
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET Journal
 
Accountant302018presentatie hs march122018
Accountant302018presentatie hs march122018Accountant302018presentatie hs march122018
Accountant302018presentatie hs march122018drs Pieter de Kok RA
 
Building Simple Continuous Reviews in ACL
Building Simple Continuous Reviews in ACLBuilding Simple Continuous Reviews in ACL
Building Simple Continuous Reviews in ACLJim Kaplan CIA CFE
 
Airline doc final java
Airline doc final javaAirline doc final java
Airline doc final javaprspvvv
 

Similar to 02 a&a all questions (20)

Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Bml 303 past papers pack
Bml 303 past papers packBml 303 past papers pack
Bml 303 past papers pack
 
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
Note on ‘Mapping’  CAAT Audit technique with  3 practical examplesNote on ‘Mapping’  CAAT Audit technique with  3 practical examples
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
 
Data analytics - Alteryx Spotlight.pdf
Data analytics - Alteryx Spotlight.pdfData analytics - Alteryx Spotlight.pdf
Data analytics - Alteryx Spotlight.pdf
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
PBF Electronic or Electrials shop MS.pptx
PBF Electronic or Electrials shop MS.pptxPBF Electronic or Electrials shop MS.pptx
PBF Electronic or Electrials shop MS.pptx
 
Acc 340 Enhance teaching-snaptutorial.com
Acc 340 Enhance teaching-snaptutorial.comAcc 340 Enhance teaching-snaptutorial.com
Acc 340 Enhance teaching-snaptutorial.com
 
e - Audit
e - Audite - Audit
e - Audit
 
ACC 340 Education Organization / snaptutorial.com
ACC 340  Education Organization / snaptutorial.comACC 340  Education Organization / snaptutorial.com
ACC 340 Education Organization / snaptutorial.com
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
May/June 2008 Scenario 1
May/June 2008 Scenario 1May/June 2008 Scenario 1
May/June 2008 Scenario 1
 
Assocham global conference audit data standards - 28.10.2020
Assocham global conference   audit data standards - 28.10.2020Assocham global conference   audit data standards - 28.10.2020
Assocham global conference audit data standards - 28.10.2020
 
computer system validation
computer system validationcomputer system validation
computer system validation
 
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4  Bullzeye Data Breach Readiness Assessment .docxPage 1 of 4  Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
 
Accountant302018presentatie hs march122018
Accountant302018presentatie hs march122018Accountant302018presentatie hs march122018
Accountant302018presentatie hs march122018
 
Building Simple Continuous Reviews in ACL
Building Simple Continuous Reviews in ACLBuilding Simple Continuous Reviews in ACL
Building Simple Continuous Reviews in ACL
 
Airline doc final java
Airline doc final javaAirline doc final java
Airline doc final java
 

More from Muhammad Ovais

Lippitt white and adair summaries
Lippitt white and adair summariesLippitt white and adair summaries
Lippitt white and adair summariesMuhammad Ovais
 
Possible format of the report questions in bc exam
Possible format of the report questions in bc examPossible format of the report questions in bc exam
Possible format of the report questions in bc examMuhammad Ovais
 
Workshop List - uploaded
Workshop List - uploadedWorkshop List - uploaded
Workshop List - uploadedMuhammad Ovais
 
Memo instructions for staff
Memo   instructions for staffMemo   instructions for staff
Memo instructions for staffMuhammad Ovais
 
Letter cool engineering ltd - recovery
Letter   cool engineering ltd - recoveryLetter   cool engineering ltd - recovery
Letter cool engineering ltd - recoveryMuhammad Ovais
 
Lecture 10 bmbs conflict and negotiation skills qs
Lecture 10 bmbs conflict and negotiation skills   qsLecture 10 bmbs conflict and negotiation skills   qs
Lecture 10 bmbs conflict and negotiation skills qsMuhammad Ovais
 
Lecture 09 bmbs team management qs
Lecture 09 bmbs team management   qsLecture 09 bmbs team management   qs
Lecture 09 bmbs team management qsMuhammad Ovais
 
Lecture 08 bmbs leadership qs
Lecture 08 bmbs leadership   qsLecture 08 bmbs leadership   qs
Lecture 08 bmbs leadership qsMuhammad Ovais
 
Lecture 06 bmbs employee behaviour qs
Lecture 06 bmbs employee behaviour   qsLecture 06 bmbs employee behaviour   qs
Lecture 06 bmbs employee behaviour qsMuhammad Ovais
 
Lecture 05 bmbs culture qs
Lecture 05 bmbs culture   qsLecture 05 bmbs culture   qs
Lecture 05 bmbs culture qsMuhammad Ovais
 
Lecture 04 bmbs managing change qs
Lecture 04 bmbs managing change   qsLecture 04 bmbs managing change   qs
Lecture 04 bmbs managing change qsMuhammad Ovais
 
Lecture 03 bmbs organizational structure qs
Lecture 03 bmbs organizational structure   qsLecture 03 bmbs organizational structure   qs
Lecture 03 bmbs organizational structure qsMuhammad Ovais
 
Lecture 02 bmbs the business environment qs
Lecture 02 bmbs the business environment   qsLecture 02 bmbs the business environment   qs
Lecture 02 bmbs the business environment qsMuhammad Ovais
 
Lecture 01 bmbs management conept qs
Lecture 01 bmbs management conept   qsLecture 01 bmbs management conept   qs
Lecture 01 bmbs management conept qsMuhammad Ovais
 
09 practical writing samples - cv
09 practical writing   samples - cv09 practical writing   samples - cv
09 practical writing samples - cvMuhammad Ovais
 
06 practical writing sample - building maintenance rfp
06 practical writing   sample - building maintenance rfp06 practical writing   sample - building maintenance rfp
06 practical writing sample - building maintenance rfpMuhammad Ovais
 

More from Muhammad Ovais (20)

Lippitt white and adair summaries
Lippitt white and adair summariesLippitt white and adair summaries
Lippitt white and adair summaries
 
Kn s 2 bc su
Kn s 2 bc suKn s 2 bc su
Kn s 2 bc su
 
Possible format of the report questions in bc exam
Possible format of the report questions in bc examPossible format of the report questions in bc exam
Possible format of the report questions in bc exam
 
Workshop List - uploaded
Workshop List - uploadedWorkshop List - uploaded
Workshop List - uploaded
 
Parallel structure
Parallel structureParallel structure
Parallel structure
 
Memo instructions for staff
Memo   instructions for staffMemo   instructions for staff
Memo instructions for staff
 
Letter cool engineering ltd - recovery
Letter   cool engineering ltd - recoveryLetter   cool engineering ltd - recovery
Letter cool engineering ltd - recovery
 
Tsa 2 caf 4 su
Tsa 2 caf 4 suTsa 2 caf 4 su
Tsa 2 caf 4 su
 
Exam techniques mo
Exam techniques   moExam techniques   mo
Exam techniques mo
 
Lecture 10 bmbs conflict and negotiation skills qs
Lecture 10 bmbs conflict and negotiation skills   qsLecture 10 bmbs conflict and negotiation skills   qs
Lecture 10 bmbs conflict and negotiation skills qs
 
Lecture 09 bmbs team management qs
Lecture 09 bmbs team management   qsLecture 09 bmbs team management   qs
Lecture 09 bmbs team management qs
 
Lecture 08 bmbs leadership qs
Lecture 08 bmbs leadership   qsLecture 08 bmbs leadership   qs
Lecture 08 bmbs leadership qs
 
Lecture 06 bmbs employee behaviour qs
Lecture 06 bmbs employee behaviour   qsLecture 06 bmbs employee behaviour   qs
Lecture 06 bmbs employee behaviour qs
 
Lecture 05 bmbs culture qs
Lecture 05 bmbs culture   qsLecture 05 bmbs culture   qs
Lecture 05 bmbs culture qs
 
Lecture 04 bmbs managing change qs
Lecture 04 bmbs managing change   qsLecture 04 bmbs managing change   qs
Lecture 04 bmbs managing change qs
 
Lecture 03 bmbs organizational structure qs
Lecture 03 bmbs organizational structure   qsLecture 03 bmbs organizational structure   qs
Lecture 03 bmbs organizational structure qs
 
Lecture 02 bmbs the business environment qs
Lecture 02 bmbs the business environment   qsLecture 02 bmbs the business environment   qs
Lecture 02 bmbs the business environment qs
 
Lecture 01 bmbs management conept qs
Lecture 01 bmbs management conept   qsLecture 01 bmbs management conept   qs
Lecture 01 bmbs management conept qs
 
09 practical writing samples - cv
09 practical writing   samples - cv09 practical writing   samples - cv
09 practical writing samples - cv
 
06 practical writing sample - building maintenance rfp
06 practical writing   sample - building maintenance rfp06 practical writing   sample - building maintenance rfp
06 practical writing sample - building maintenance rfp
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

02 a&a all questions

  • 1. Audit and Assurance – Past Paper Questions 1 Q. The IT Manager has conducted an in-house review of his operations and has identified the following specific risks and exposures: (a) Processing the wrong data file. (b) Missing transactions. (c) Processing improper transactions. (d) Recording transactions in a wrong accounting period. (e) Lost transactions after a restart. (f) Information security breaches and inadequate controls over privacy of data. (g) System errors could go undetected or uncorrected for extended periods of time thus compromising data integrity. Since you are the IT Auditor, he has requested you to advise him on at least two controls or control procedures each that may be put in place to address the identified risks and exposures. (14) Q. As data is stored electronically it may be difficult to trace transactions from the detail to the summary. For example a report may claim to show TOTAL SALES for the month but there is no way to check manually that every single invoice has been included unless each transaction is logged. This ability to track transactions through various reports is known as audit trail. Required: (a) Briefly explain the concept of Computer Audit. (04) (b) Discuss ‘Round the Computer Audit’ and ‘Through the Computer Audit’. (08) Q. Classify the following controls as preventive, detective, or corrective controls. Give very brief reasons to justify your answers. (i) Strong passwords (ii) Exception reports (iii) Digital signatures (iv) Segregation of duties (v) Backups (vi) Review of system activity logs (06) Q. Most of the advanced and sensitive systems place significant reliance on automated controls. Audit trail is one such automated control. (a) Explain the concept of audit trail in a computerized environment. (02) (b) List the major benefits which can be derived from the use of audit trails (03) Q. Classify the following controls into Input, Processing and Output Controls. (i) Limit checks on calculated amounts. (ii) Signature on source documents. (iii) Use of bar codes. (iv) Marking a file as read only. (v) Audit trail. (vi) Run-to-run totals. (vii)Exception report showing data that does not conform to specified criteria. (viii) Initial data should be within a predetermined range of values. (ix) Checkpoint and recovery procedures. (x) Unique login and password. (xi) Restriction on printing of confidential reports. (xii) Sequential checks. (06)
  • 2. Audit and Assurance – Past Paper Questions 2 Q. The internal auditor of Crest Securities Limited has highlighted the following issues in his report: (i) Most of the users have weak passwords. (ii) There is no password expiry policy. (iii) Locked user accounts are unlocked automatically after 24 hours. (iv) Users are allowed to use their smart phones, tablets and laptops for sending and receiving official emails/documents. (v) Firewall is installed with its default policy. Required: Suggest appropriate controls to address the above issues. (10) Q. Segregate the following into preventive, detective and corrective controls and give brief justification in support of your choice. (i) Reviewing credit card bill before payment. (ii) Keeping ATM card PIN separate from ATM card. (iii)Monitoring expenditures against budgeted amounts. (iv) Submitting revised invoices after correction. (v) Updating IT access lists if individual’s role changes. (vi) Review of implemented controls by internal auditor. (vii)Mandatory change of computer passwords after every 45 days. (07) Q. Smart Lease (SL) is a large-sized leasing company, primarily engaged in the leasing of automobiles and industrial equipments. Operations of the company are fully automated and are on custom-built IT applications. Over the last couple of years, the company has experienced a number of IT related security incidents such as sabotage, fraud, and theft of confidential or propriety information, both at head office and in branches. Management has analyzed these incidents and come to the conclusion that majority of these incidents were the work of insiders, i.e. employees of the company itself. Required: Suggest at least six IT security practices/controls which SL should establish to prevent or detect insiders’ attacks on its IT resources. In each case explain the rationale behind your suggestion. (12) Q. Your firm is conducting IT audit of Elegant (Private) Limited (EPL) which is a distributor of FMCG and has a network of branches across the country. Successful implementation of an ERP system in the company last year has led to widespread availability of information in all business areas. Being the job in-charge on this assignment you have decided to adopt ‘concurrent auditing techniques’. However, the audit manager has advised you that since concurrent auditing techniques have never been used previously, the change should be communicated to the client before implementing the same. Required: Prepare a note for EPL’s management describing briefly the factors which have necessitated the use of concurrent auditing techniques; and (07) Q. You are employed in a firm of chartered accountants. This is your second year as the audit supervisor on the audit of Greet Bank Limited. The bank has made considerable progress during the year under review which includes introduction of online banking and increase in the number of branches.
  • 3. Audit and Assurance – Past Paper Questions 3 This year you intend to adopt “through the computer” approach as against “around the computer” approach followed last year. Required: (a) Justify the audit approach adopted last year and explain the reasons for the change in approach for the current year. (08) (b) Identify the difficulties which may arise while using “through the computer” approach.(02) Q. Generalized Audit Software provides a means to gain access to and manipulate data maintained on computer storage media. Required: (a) Briefly explain the following functional capabilities provided by the generalized audit software and in each case give two examples of how the auditor might use these functional capabilities:  Stratification and frequency analysis  Arithmetical  Statistical (7.5) (b) Discuss any two limitations of generalized audit software. (03) Q. (a) Identify any six factors that need to be considered while making a decision as regards the use of Computer Assisted Audit Techniques (CAATs). (06) (b) Describe the steps that need to be taken while planning the use of CAATs. (07) Q. Identify the important matters which an IS Auditor would consider while selecting a Computer Assisted Audit Technique. How could greater productivity and improved quality of audits be achieved through CAATs? (06) Q. With the emergence of business conglomerates and globalization the conventional techniques of manual auditing are no longer an option. The quantum, location and complexity of data stored in computerized systems warrants auditing through computer based tools and techniques to ensure efficiency and provide desired level of assurance to the stakeholders. Required: (a) Describe Generalized Audit Software and its major functions. (08) (b) List any four limitations of Generalized Audit Software. (04) Q. Compare the two techniques of auditing in the computerized environment viz. ‘Auditing around the computer’ and ‘Auditing through the computer’ and discuss risks involved, benefit, reliability and ease of implementation. (05)