TABLE OF CONTENTS
PAPERS PAGE
May-June 2019………………………………………………………………………………………………………………………………………3
OCT-NOV 2018 .............................................................................................................................................. 5
MAY-JUNE 2018 ............................................................................................................................................ 7
OCT-NOV 2017 ............................................................................................................................................ 11
MAY-JUNE 2017 .......................................................................................................................................... 18
MAY-JUNE 2016 …………………………………………………………………………………………………………………………………...35
OCT/NOV2016............................................................................................................................................. 40
AUE2602 www.unitutorials.co.za +27 (65) 160 9781
,May/June 2019
AUE2602 MAY/JUNE 2019
1.1(a). Requirements of the governing board are as follows
-Consists of executive and non -executive directors
-majority should be non-executive directors
-CEO Should not be the chairman of the board
-should have at least two executive members and one of them should be the CEO
b) Requirements of the Audit Committee
-All members should be non -executive directors
-all members should be independent
-Minimum of 3 members should be considered
-Members should not be fully employed by the company
-Members should not have interest in the company
C .Audit committee should meet four times a year and they report to the board of directors
1.3 Controls to minimize disaster and information technology disruptions
Protection is more than having physical and system access security controls. It can also mean
reducing the risk of system failure, e.g. removing single points of failure by having load
balancing servers or redundant systems or components. Potential exposures to systems deemed
to be critical to business processes should be identified and addressed as priority.
Preparedness means having detailed plans for addressing the effects of a disruption, such as
having seamless failover of systems and components, enabling essential business processes to
continue to function with no, or an acceptable minimum, break of service.
Improvement is the process of taking the knowledge gained from all the above and taking steps
to improve systems and increase resilience, and to continuously refine disaster recovery and
business continuity plans.
AUE2602 www.unitutorials.co.za +27 (65) 160 9781
,Facilities: What are the criteria that installations and infrastructure should meet to minimize the
risk of failure or severe disruption and eventual recovery? Where should such facilities be
located.
Processes: processes should be in place to deal with an incident or disaster, and how do they
make the topics outlined above combine to deliver the required, and defined, business services.
Supplier; the service suppliers are critical to IT continuity, and how do they ensure that they can
support the organization’s recovery and business continuity requirements? Are these service
suppliers, in turn, dependent upon the effective responses from other third parties, internal or
external to their organization?
1.4) Password controls
-Passwords should be unique to each individual (group passwords should not be used).
-Passwords should consist of at least six characters, be random not obvious, and a mix of
Letters, numbers, upper/lower case and symbols.
- Passwords/user-IDs for terminated or transferred personnel should be removed/disabled
At the time of termination or transfer.
-Passwords should be changed regularly and users should be forced by the system, to
-change their password (system sends the user a screen message to change his password
and allows a limited number of attempts to enter his existing password. After this, access
will not be granted until a new password has been registered).
-The first time a new employee accesses the system, he should be prompted to change his
Initial password.
-Passwords should not be displayed on PCs at any time, be printed on any reports or
Logged in transaction logs.
Password files should be subject to strict access controls to protect them from
Unauthorized read and write access. Encryption of password files is essential.
-Personnel should be prohibited from disclosing their passwords to others and subjected to
Disciplinary measures should they do so.
AUE2602 www.unitutorials.co.za +27 (65) 160 9781
, - Passwords should be changed if confidentiality has been violated, or violation is
Expected.
-Passwords should not be obvious, e.g. birthdays, names, name backwards, common
Words, and should not be the same as the user.
1.5 Procedure to be followed when conducting physical inventory count
Planning- Apart from carrying out the mandatory physical count of your inventory for tax
purposes, You can choose to physically count your inventory monthly, quarterly or at the end
of a reporting period.
After you’ve decided on a date, make sure you give your employees enough notice because
doing physical counts of inventory is normally done outside of conventional business hours. If
you’re going to perform the physical count of your inventory during business hours, notify
your customers by putting up a notice on your store at least five days in advance.
Select counters- The important job of taking physical counts of your inventory should only
be done by the most conscientious employees. Use both new and experienced employees to
provide checks and balances for the counting process.
Stop warehouse movement- Separate all recently received items so that they won’t be
included in the count. If possible, postpone deliveries to the warehouse, so that there will be
no fluctuation during the count.
Get count tags- Buy enough two-part count tags from a physical store or online to cover the
amount of inventory you expect to count. The inventory tags should be numbered in
sequence so they can be easily tracked.
AUE2602 www.unitutorials.co.za +27 (65) 160 9781