Questions from Auditing and Assurance


Q: What is the difference between an Internet-based and an intranet

What is the difference between an Internet-based and an intranet-based information system?

See Answer

Q: Describe briefly the controls that should be established over the operation of

Describe briefly the controls that should be established over the operation of a workstation to prevent use by unauthorized personnel.

See Answer

Q: What are the advantages of a virtualized client/server infrastructure?

What are the advantages of a virtualized client/server infrastructure?

See Answer

Q: Explain briefly what is meant by a malware and ransomware.

Explain briefly what is meant by a malware and ransomware.

See Answer

Q: Explain briefly what is meant by electronic data interchange (EDI).

Explain briefly what is meant by electronic data interchange (EDI). How does EDI affect a company’s audit trail?

See Answer

Q: Is it probable that the use of IT will eventually eliminate the

Is it probable that the use of IT will eventually eliminate the audit trail, making it impossible to trace individual transactions from their origin to the summary totals in the financial statements?...

See Answer

Q: Discuss the nature of end user computing.

Discuss the nature of end user computing.

See Answer

Q: Discuss what is meant by the phrase “shopping for accounting principles

Discuss what is meant by the phrase “shopping for accounting principles.” What mechanisms have served to prevent this practice by management?

See Answer

Q: Do auditors usually begin their consideration of internal control over IT activities

Do auditors usually begin their consideration of internal control over IT activities with a review of general or application control activities? Explain.

See Answer

Q: Describe the audit technique known as tagging and tracing. What is

Describe the audit technique known as tagging and tracing. What is the purpose of the technique?

See Answer