Question Tag: Data security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

AA – Nov 2016 – L2 – Q6b – Auditing in a Computerized Environment

This question explains the problems EDI systems may cause for auditors and outlines the necessary controls to mitigate these risks.

Hypermart Plc operates Electronics Data Interchange (EDI) system for the transmission of business documents.

Required:
Analyse the problems the EDI system may create for the auditor and what controls are expected to be in place to minimise the risks in the EDI system.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Nov 2016 – L2 – Q6b – Auditing in a Computerized Environment"

AA – Nov 2016 – L2 – Q6a – Auditing in a Computerized Environment

This question outlines the control systems that should be in place to minimize risks in an online and real-time airline ticketing system.

Hypermart Plc operates a chain of modern hyper stores, an on-line and real-time
airline ticketing agency and a mail order section selling goods over the internet.

Required:
a. Analyse the controls that should be in place to minimise risks that may arise
from the operations of the on-line and real-time airline ticketing system.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Nov 2016 – L2 – Q6a – Auditing in a Computerized Environment"

MI – May 2021 – L1 – SA – Q20 – Information System Development and Security

Identify the term for coding data into an unreadable form.

The coding of data into a form that is not understandable to a casual reader is called:

A. Firewall
B. Password
C. Encryption
D. Digital Signature
E. Logging

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2021 – L1 – SA – Q20 – Information System Development and Security"

AA – July 2023 – L2 – Q3a – Audit and Assurance Risk Environment, Audit and Assurance Evidence

Procedures external auditors perform to evaluate the effectiveness of data security controls.

a) Abbey Ltd is a medium-sized manufacturing company that produces various products for consumers. The company has a large amount of confidential data, including financial records, trade secrets, and personal information of employees and customers. The company has recently become concerned about cyber security risks and has hired an external auditor to conduct an audit of their data security controls.

Required:
Explain FIVE (5) procedures the External Auditor would need to perform to obtain evidence to evaluate the effectiveness of Abbey Ltd’s data security controls.

(10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – July 2023 – L2 – Q3a – Audit and Assurance Risk Environment, Audit and Assurance Evidence"

BMIS – March 2024 – L1 – Q5a – Introduction to information technology and information systems

Explain five measures to ensure the reliability of a new information system being developed by Marine Trust Company for improved performance.

The management of Marine Trust Company is developing a new information system to facilitate excellent performance and effective customer service.

Required: Explain FIVE (5) measures to ensure the reliability of the new system. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – March 2024 – L1 – Q5a – Introduction to information technology and information systems"

AA – Nov 2016 – L2 – Q6b – Auditing in a Computerized Environment

This question explains the problems EDI systems may cause for auditors and outlines the necessary controls to mitigate these risks.

Hypermart Plc operates Electronics Data Interchange (EDI) system for the transmission of business documents.

Required:
Analyse the problems the EDI system may create for the auditor and what controls are expected to be in place to minimise the risks in the EDI system.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Nov 2016 – L2 – Q6b – Auditing in a Computerized Environment"

AA – Nov 2016 – L2 – Q6a – Auditing in a Computerized Environment

This question outlines the control systems that should be in place to minimize risks in an online and real-time airline ticketing system.

Hypermart Plc operates a chain of modern hyper stores, an on-line and real-time
airline ticketing agency and a mail order section selling goods over the internet.

Required:
a. Analyse the controls that should be in place to minimise risks that may arise
from the operations of the on-line and real-time airline ticketing system.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Nov 2016 – L2 – Q6a – Auditing in a Computerized Environment"

MI – May 2021 – L1 – SA – Q20 – Information System Development and Security

Identify the term for coding data into an unreadable form.

The coding of data into a form that is not understandable to a casual reader is called:

A. Firewall
B. Password
C. Encryption
D. Digital Signature
E. Logging

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2021 – L1 – SA – Q20 – Information System Development and Security"

AA – July 2023 – L2 – Q3a – Audit and Assurance Risk Environment, Audit and Assurance Evidence

Procedures external auditors perform to evaluate the effectiveness of data security controls.

a) Abbey Ltd is a medium-sized manufacturing company that produces various products for consumers. The company has a large amount of confidential data, including financial records, trade secrets, and personal information of employees and customers. The company has recently become concerned about cyber security risks and has hired an external auditor to conduct an audit of their data security controls.

Required:
Explain FIVE (5) procedures the External Auditor would need to perform to obtain evidence to evaluate the effectiveness of Abbey Ltd’s data security controls.

(10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – July 2023 – L2 – Q3a – Audit and Assurance Risk Environment, Audit and Assurance Evidence"

BMIS – March 2024 – L1 – Q5a – Introduction to information technology and information systems

Explain five measures to ensure the reliability of a new information system being developed by Marine Trust Company for improved performance.

The management of Marine Trust Company is developing a new information system to facilitate excellent performance and effective customer service.

Required: Explain FIVE (5) measures to ensure the reliability of the new system. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – March 2024 – L1 – Q5a – Introduction to information technology and information systems"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan