Premium Essay

Asa Tut8

In:

Submitted By Joan1990
Words 2637
Pages 11
Tutorial 8
10.20 You are an assurance services senior and your client is Antique Collectibles Pty Ltd (AC), a small company that specialises in buying and selling antique Australian-made bush furniture. AC purchases pieces at auction, cleans and repairs them, then sells them to the general public. This is the first year that your firm has conducted AC’s audit.
AC is a small owner-managed business that does not have complex organisational structure or an advanced information system. Due to the size of the entity, there is very little separation of duties at AC, and most employees at AC are related to the owner. AC tends to focus purely on sales and market share, and the owner has admitted that, at times, he has treated the finance department as a bit of an afterthought.
He has also admitted that he hasn’t paid much attention to the controls at AC, as he trusts the staff members, due to their relationships to him.
Required
Describe whether the auditor will take a substantive approach or a combined tests of controls and substantive approach to the audit. Explain your answer, with reference to the background information and to ASA 330.
ASA 330.7a states that the auditor, when designing further audit procedures shall 'consider the reasons for the assessment given to the risk of material misstatement at the assertion level for each class of transactions and account balance, including the likelihood of material misstatement due to the particular characteristics of the relevant class of transactions or account balance'. In other words this paragraph is referring to the inherent risk of the company. NOT RIGHT

The auditor should use ASA 330.7a and the background information provided as guidance for determining the most appropriate audit approach. AC is a straightforward small business where staff members are related to the owner. This information supports a low

Similar Documents

Premium Essay

Minr

...Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 3.1 Document Revised: Document Published: November 25, 2013 August 9, 2012 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED...

Words: 126829 - Pages: 508

Free Essay

Cisco Security

...captured from a massive footprint of security devices into dynamic updates and actionable intelligence, such as "reputation" scores, and pushes that intelligence out to a business's network security infrastructure for protective action. By incorporating Global Correlation, Cisco IPS 7.0 is up to two times as effective in stopping malicious attacks, in a shorter amount of time, than traditional signature-only IPS technologies. • Cisco ASA 5500 Series 8.2 Software: This offering in the Cisco Adaptive Security Appliances family is designed to enhance end-to-end security for offices of all sizes, improving threat mitigation and enabling companies to more securely connect, communicate and conduct business. With a new Botnet Traffic Filter for identifying infected clients, IPS availability for small offices, and increased clientless remote-access capabilities, Cisco now offers support for the widest range of platforms, operating systems and endpoints in the industry. • Cisco ASA Botnet Traffic Filter: The new Botnet Traffic Filter enables Cisco ASA 5500 Series appliances to...

Words: 532 - Pages: 3