Email me

Monday, April 25, 2011

ISCA - Imp. qtns - By BVNR sir

IMPORTANT AREAS FOR MAY 2011 (NEWLY AMENDED)

 

1.a.What are the types of systems ? Explain the concept of decomposing with example ?

b. Explain the components of TPS with its features also ?

c. What are the prerequisites of MIS , and limitations of MIS ?

d. What are the five characteristics of EIS  ?

 

2. a.List down the reasons ,why organizations are not able to achieve system development objectives ?

b. Discuss system development methodologies ? What are the steps in prototyping and when is  prototyping  considered ?

c. What are the stages of SDLC ?What are the Activities covered in Fact finding Technique

 

3. a.What are the areas to be considered while studying about existing system , explain them in detail ?

b. Explain the Detailed system process  with relevant examples (Pseudocode, flow chart, dec.tables)

·                     Draw a Flow chart for arranging numbers in ascending order

·                     Draw a flow chart to print all the divisors of  a given number ?

c. Construct a decision tree for the following problem ?

 

Parameters

Sex

Age

Occupation

No of times

 travel in a year

I ac

Male

46

Private

12

II ac

Female

54

Public

6

I ac

Male

43

Public

20

II ac

Male

44

Private

8

III ac

Female

35

Public

2

II ac

Female

34

Public

4

II ac

Male

36

Private

7

I ac

Male

45

Public

5

II ac

Female

44

Private

8

III ac

Male

43

Public

10

II ac

Female

54

Public

6

III ac

Male

43

Public

15

I ac

Male

44

Private

4

II ac

Female

35

Private

12

You are requested to construct  a decision travel the  parameter is

·         No of Male / Female

·         Class of travel  like  I ac / II ac / III ac

·         Male age >=40 and Female >=40 and Male age <40 and Female <40

·         Type of occupation  Private or Public

·         Below public no of time travel < 10 and >=10 similarly for Private also

d.What are the Important factors to be considered while designing Input /out put ?

 

4. a. What is Testing  ? What are various types of test , list them with their components ?

b. What are the areas of Post implementation review ?

5. a.Discuss the effects of computers on audit ? Categories of IS audit  (Inst Mat pg no 3.11)

b. Explain the categories of control with Objectives of controls (Prev, dete,corr,compe)

c. List out the type of data coding Errors (Input ) ?

d. Explain the Auditors Role in authorization Controls ( Inst mat pg no 3.49)

 

6. a.What is a 5 scale grade which can suffice Data integrity , classify and suggest the level of protection ( Top sec . High.conf, Prop…)

b. Explain the technical Exposures ?

c. . Explain the areas a auditor need to evaluate  for Environment controls ?

 

7.a. What are the various phases of IS audit controls  with Documentation of control testing phase ? (inst mat 4,5)

b.What are various Concurrent audit techniques ?

c. How is the testing of  LAN and its environment is done since it is a vital part of IS Audit? Give an overview of the procedure to do so?

 

8. a. What is risk, threat , attack, vulnerability, exposure   ?  

b.There always risk exist for computerized environment explain the types of  cyber crimes?

c.A company wishes to analyse the risk for which what are the questions to be asked ?

d.? What are  various techniques for Risk evaluation ?

e.Explain the framework of telecommunications security, physical security ?

 

9,a. What are the objectives and Goals  of  BCP?

b. What are the audit tools and techniques used by a system auditor to ensure that disaster recovery plan is in order? Briefly explain them.?.

c, Explain the types of DRP plans ? What are the alternate processing plan when a disaster occurs ?

d. Explain the importance of back up redundancy and types of Back-up medias ?

e. What are the contents of Disaster Recovery Procedural plan document ?

 

10.a) Define ERP?  Explain the characteristics & Features of an effective ERP?

b)  Explain the implementation methodology of Erp ? What are the pre-requisites of an effective  ERP

c)  Explain the Risk  and Governance issues in an ERP?

d) Parle is developing several types of biscuits , having its branches all over the country . The management wishes to consolidate the information through centralizing for the information flowing  from its branches in uniform manner  across various levels of organization. A analyst was employed to study the prevailing situation and the management concerns. He recommended the Company to go for ERP ? What will be the situation  & Benefits of ERP if implemented ?

 

11. a) What are the eight ITIL series of documents?

b. . What is the role of HIPAA in ensuring privacy and security of health data? What are the various safeguards that HIPAA has suggested to ensure safeguarding of health data?

c. ABC company receives orders from customers either by telephone, fax or through EDI . A clerk then transcribes the order into one of the company's order form to be keyed into the order system. You being an ISA auditor recommend the various internal control procedures to be adopted to prevent inaccurate or unauthorized source data entry?

 

 

 

 

12.a) a . What  is security objective ? Explain Holistic approach?

b. Every business holds a vast amount of data , what steps do they need to take to keep all of their critical information Protected ?

c. What is the purpose and scope of IS audit ?

 

13.a What role is Information Systems Audit policy expected to play in ensuring information security?

b.What are Physical and Environmental Security ?

c.  Explain the sequence of activities involved in documentation of auditing working papers ?

 

14. a. Explain the differences between IT act 2000 & IT act 2008 ?

sections  2,3A,6A,10A,16, 18,30,34,43,44,46,57,58, 66-79A, 87,89 .

 

Supra system

Entropy

Supra system

Rad , Agile models

Data dictionary

System manual

Conversion strategies

COBIT objectives

Encryption , Firewalls

Residual risk

.audit tools and techniques

Back up tips

 

Types of backups

BPR

Areas of ISMS in personal security

Benchmarking

 

Qualitative technique in risk evaluation

Access control

Permanent audit file contents

Objectives of Info tech act 2008

Perimeter security

 

 

 

 

1 comment:

Anonymous said...

tks for ur service sir

Google