(b) As a newly-qualified Chartered Certified Accountant in Boleyn & Co, you have been assigned to assist the ethicspartner in developing ethical guidance for the firm. In particular, you have been asked to draft guidance on thefollowing frequently asked q

题目

(b) As a newly-qualified Chartered Certified Accountant in Boleyn & Co, you have been assigned to assist the ethics

partner in developing ethical guidance for the firm. In particular, you have been asked to draft guidance on the

following frequently asked questions (‘FAQs’) that will be circulated to all staff through Boleyn & Co’s intranet:

(i) What Information Technology services can we offer to audit clients? (5 marks)

Required:

For EACH of the three FAQs, explain the threats to objectivity that may arise and the safeguards that should

be available to manage them to an acceptable level.

NOTE: The mark allocation is shown against each of the three questions.


相似考题
参考答案和解析
正确答案:
(b) FAQs
(i) Information Technology (IT) services
The greatest threats to independence arise from the provision of any service which involves auditors in:
■ auditing their own work;
■ the decision-making process;
■ undertaking management functions of the client.
IT services potentially pose all these threats:
■ self-interest threat – on-going services that provide a large proportion of Boleyn’s annual fees will contribute to a
threat to objectivity;
■ self-review threat – e.g. when IT services provided involve (i) the supervision of the audit client’s employees in the
performance of their normal duties; or (ii) the origination of electronic data evidencing the occurrence of
transactions;
■ management threat – e.g. when the IT services involve making judgments and taking decisions that are properly
the responsibility of management.
Thus, services that involve the design and implementation of financial IT systems that are used to generate information
forming a significant part of a client’s accounting system or financial statements is likely to create significant ethical
threats.
Possible safeguards include:
■ disclosing and discussing fees with the client’s audit committees (or others charged with corporate governance);
■ the audit client providing a written acknowledgment (e.g. in an engagement letter) of its responsibility for:
– establishing and monitoring a system of internal controls;
– the operation of the system (hardware or software); and
– the data used or generated by the system;
■ the designation by the audit client of a competent employee (preferably within senior management) with
responsibility to make all management decisions regarding the design and implementation of the hardware or
software system;
■ evaluation of the adequacy and results of the design and implementation of the system by the audit client;
■ suitable allocation of work within the firm (i.e. staff providing the IT services not being involved in the audit
engagement and having different reporting lines); and
■ review of the audit opinion by an audit partner who is not involved in the audit engagement.
Services in connection with the assessment, design and implementation of internal accounting controls and risk
management controls are not considered to create a threat to independence provided that the firm’s personnel do not
perform. management functions.
It would be acceptable to provide IT services to an audit client where the systems are not important to any significant
part of the accounting system or the production of financial statements and do not have significant reliance placed on
them by the auditors, provided that:
■ a member of the client’s management has been designated to receive and take responsibility for the results of the
IT work undertaken; and
■ appropriate safeguards are put in place (e.g. using separate partners and staff for each role and review by a partner
not involved in the audit engagement).
It would also generally be acceptable to provide and install off-the-shelf accounting packages to an audit client.
更多“(b) As a newly-qualified Chartered Certified Accountant in Boleyn Co, you have been assigned to assist the ethicspartner in developing ethical guidance for the firm. In particular, you have been asked to draft guidance on thefollowing frequently asked qu”相关问题
  • 第1题:

    You, like many of your classmates, probably have been in such a situation where you are asked to do something to help a foreign friend. (翻译)


    参考答案:像你的许多同学一样,你可能也曾有过亲身经历:有人请求你为外国友人帮忙做点事

  • 第2题:

    You have been asked to use a 23-bit network mask to segment the network block 209.18.12.0. How many usable host addresses will there be per subnet?()

    A. 510

    B. 1022

    C. 2046

    D. 8190


    参考答案:A

  • 第3题:

    You have been asked to use a 28 bit subnet mask to segment the following network block: 108.12.5.0. How many usable hosts per sub-net could you create?()

    A.10 hosts

    B.14 hosts

    C.12 hosts

    D.16 hosts


    参考答案:B

  • 第4题:

    You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()

    • A、Encryption
    • B、Bandwidth limits
    • C、Minimal signal loss
    • D、No EMI

    正确答案:C,D

  • 第5题:

    A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()

    • A、“Did you log in with an administrator account?”
    • B、“Have you been to any inappropriate websites?”
    • C、“What have you changed since the optical drive worked properly?”
    • D、“What has changed since the optical drive worked properly?”

    正确答案:D

  • 第6题:

    You ()him so closely; you should have kept your distance.

    • A、shouldn’tfollow
    • B、mustn’tfollow
    • C、couldn’t have been following
    • D、shouldn’t have been following

    正确答案:D

  • 第7题:

    You have been asked to create a static route with a next hop that is not directly connected to the router.Which configuration parameter enables the static route to accomplish this scenario?()

    • A、resolve
    • B、indirect
    • C、next-hop
    • D、recursive

    正确答案:A

  • 第8题:

    While designing your database, you have created the EMPLOYEEStable as an index-organized (IOT). You want to create a bitmap index on the JOD_IDcolumn to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()

    • A、 A primary key must have been created.
    • B、 A mapping table must have been created.
    • C、 An overflow tablespace must have been specified.
    • D、 The PCTTHRESHOLD option must have been specified.

    正确答案:B

  • 第9题:

    You are designing a group management strategy for users in the finance department. You need to  identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups.  What should you do?()

    • A、 Add the finance users to the financeData group to which the necessary permissions have been assigned.
    • B、 Add the finance users to the financeGG group to which the necessary permissions have been assigned.
    • C、 Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.
    • D、 Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned.

    正确答案:B

  • 第10题:

    多选题
    You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()
    A

    Encryption

    B

    Bandwidth limits

    C

    Minimal signal loss

    D

    No EMI


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    问答题
    Practice 4  Discussion—about 5 minutes  In this part of the test you are given a discussion topic. You have 30 seconds to look at the prompt card, an example of which is below, and then about 3 minutes to discuss the topic with your partner. After that the examiner will ask you more questions related to the topic.  For two candidates  Business Seminar  Your company is going to hold a seminar on a certain topic about marketing  You have been asked to help with the preparation for the seminar.  Discuss the situation together and decide:  ● What facilities and seminar arrangements you will need to make  ● Who you are going to invite to attend the seminar and how to contact them  For three candidates  Business Seminar  Your company is going to hold a seminar on a certain topic about marketing·  You have been asked to help with the preparation for the seminar.  Discuss the situation together and decide:  ● What facilities and seminar arrangements you will need to make  ● Who you are going to invite to attend the seminar and how to contact them  ● Where and when you will hold the seminar

    正确答案: 【参考范例】
    A: You know, there is going to hold a seminar about marketing.
    B: Yeah, I just want to have a talk with you about that. What facilities and seminar    arrangement do you think should we make?
    A: Well. I think we should prepare whiteboard and water pen, a projector, computers.
    B: Yes, I agree with you , what’s more, I think we also need drinking machines and coffee machines.
    A: Yeah. You remind me of something. We also need some secretaries.
    B: I share your view on that. Who are we going to invite to attend and how to contact them?
    A: What about inviting some senior marketing managers and some specialists on marketing to give speeches?
    B: Nice. We have to hire some interpreters to make the meeting go through well.
    A: That’s right. Some of them may not speak English well.
    解析: 暂无解析

  • 第12题:

    单选题
    You are designing a group management strategy for users in the finance department. You need to identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups. What should you do?()
    A

    Add the finance users to the financeData group to which the necessary permissions have been assigned.

    B

    Add the finance users to the financeGG group to which the necessary permissions have been assigned.

    C

    Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.  

    D

    Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned. 


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You have been asked to create a static route with a next hop that is not directly connected to the router. Which configuration parameter enables the static route to accomplish this scenario?()

    A. resolve

    B. indirect

    C. next-hop

    D. recursive


    参考答案:A

  • 第14题:

    You have been asked to use a 25 bit subnet mask to segment the following network block:209.18.12.0.How many usable will there be per subnet?()

    A.2 hosts

    B.120 hosts

    C.126 hosts

    D.255 hosts


    参考答案:C

  • 第15题:

    You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()

    A.A

    B.B

    C.C

    D.D


    参考答案:B

  • 第16题:

    You have been asked to use a 28 bit subnet mask to segment the following network block: 108.12.5.0. How many usable hosts per sub-net could you create?()

    • A、10 hosts
    • B、14 hosts
    • C、12 hosts
    • D、16 hosts

    正确答案:B

  • 第17题:

    You have been asked to use a 25 bit subnet mask to segment the following network block: 209.18.12.0. How many usable will there be per subnet?()

    • A、2 hosts
    • B、120 hosts
    • C、126 hosts
    • D、255 hosts

    正确答案:C

  • 第18题:

    You have been asked to use a 23-bit network mask to segment the network block 209.18.12.0, How many usable host address will there e per subnet?()

    • A、510
    • B、1022
    • C、2046
    • D、8190

    正确答案:A

  • 第19题:

    You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()

    • A、PPP
    • B、UDP
    • C、TCP
    • D、ICMP

    正确答案:A,C

  • 第20题:

    You work as a database administrator for Certkiller .com. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()

    • A、Database Control
    • B、Management Server
    • C、Management Repository
    • D、Application Server Control
    • E、Oracle Management Agent

    正确答案:E

  • 第21题:

    单选题
    A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()
    A

    “Did you log in with an administrator account?”

    B

    “Have you been to any inappropriate websites?”

    C

    “What have you changed since the optical drive worked properly?”

    D

    “What has changed since the optical drive worked properly?”


    正确答案: D
    解析: 暂无解析

  • 第22题:

    问答题
    Practice 4  ● A foreign business associate is visiting your company for three days. You have been asked to organize the visit and plan appropriate entertainment.  ● Write a letter to the visitor outlining a timetable for the visit and describing the activities you have planned.  ● Write 200-250 words on your Answer Sheet.

    正确答案: 【参考范文】
    Dear Richard,
    Further to our discussion of 6 May, I’m writing to present the scheduled programme during your visit to our company(12—15 May). I‘ll be waiting at the airport on Tuesday morning. If the airliner arrives on time, I’11 take you right to your hotel. Then you can have a rest and refresh yourself. As Mr. Cooper desires to see you before the meeting, you will have a private talk. After that we’ll travel to the company site for the meeting which according to the schedule will run form 15:30 to 17:00. Since that will be a busy day, I recommend a complete relaxation at a nearby entertainment centre. Wednesday’s meeting is due to start at 10:00a.m. A limousine has been arranged to collect you from the hotel at 9 : 40a.m. As the meeting will last for a whole day, we will have a working lunch. When work’s finished, you’11 have some free time at your disposal before attending a welcome banquet to be held at The Sheraton Hotel at 19: 00.
    We have enter your name for the Tennis Tournament (9:30 a.m on Thursday morning). Mr. Cooper will pick you up at the hotel at 9:00a.m. Then there is a cocktail party at 12:30 a.m, which some important local government officials will attend.
    A sedan will pick you up at your hotel at 9:50a.m on Friday morning to send you to the airport in time for your return flight at 11:50a.m. I’m looking forward to seeing you on the 12th. At the meanwhile, if you have any questions, please do not hesitate to contact me at 01082253922.
    Yours sincerely,
    Mary Young
    Personal Assistant to Mr. Cooper
    解析: 暂无解析

  • 第23题:

    单选题
    You have been asked to use a 28 bit subnet mask to segment the following network block: 108.12.5.0. How many usable hosts per sub-net could you create?()
    A

    10 hosts

    B

    14 hosts

    C

    12 hosts

    D

    16 hosts


    正确答案: B
    解析: 暂无解析