December
1998 QUESTION 3 Total Marks: 20 Marks |
Click here to access other
questions
SUGGESTED SOLUTIONS
|
(a) | (i) Name four activities which are carried out by internal auditors during the auditing process. | [4] |
One mark should be
awarded for each valid point (up to a maximum of four marks). Examples include the
following:
Other sensible answers should also receive credit.
|
||
(ii) What is the primary function of an external auditor? | [1] | |
The
external auditors primary function is to express an opinion on an
organisations accounts procedures, based on an examination of books and records. Other sensible answers should also receive credit.
|
||
(iii) Why is the role of an internal auditor not simply an extension of that of an external auditor? | [1] | |
Because the
internal auditor may have a high level role which aims at reporting on the managerial
effectiveness of the organisation, or their role may involve primarily checking on systems
and procedures and investigating whether these are being enforced. Other sensible answers should also receive credit.
|
||
(b) | (i) Why are auditors sometimes actively discouraged from auditing through complex computer systems? | [1] |
Because,
typically, a communication gap exists in that the auditors rarely have any deep computer
expertise. Other sensible answers should also receive credit.
|
||
(ii) Why are considerable sums of money typically expended on providing security for systems which are already operational? | [1] | |
Because
very few systems which are currently in existence have had security as a prime objective. Other sensible answers should also receive credit.
|
||
(iii) Name two problems in ensuring that the audit function makes a realistic contribution to computer security. | [2] | |
One mark
should be awarded for each valid point (up to a maximum of two marks). Examples include
the following:
Other sensible answers should also receive credit.
|
||
(c) | (i) Describe three ways of protecting original products. | [6] |
One mark
should be awarded for each valid point, and a further mark should be awarded for each
satisfactory elaboration.
Other sensible answers should also receive credit.
|
||
(ii) For each of the following,
identify which method of protection is most appropriate :
|
[4] | |
One mark
should be awarded for each of the following:
|