Chapter 11 Review Questions 1. List and explain five application risks 2. How can applications become incompatible systems 3. What are the key questions an IT auditor can ask in helping determine which enduser applications have top priority in an organization? 4. What are the four basic end-user environments? 5. In preparation for the audit of an end-user-developed application, what are the important questions the auditor can ask about the data that can help in assessing application risk? 6. Name and describe three potential risks associated with viruses. 7. A company has a centralized accounting system. Each individual department currently compiles its accounting paper transactions from its local accounting system. To eliminate the paper and increase efficiency, the company wants to implement an interface from the department accounting systems to the centralized accounting system. Name and describe the three most critical controls that you would recommend.