Guyz plsss provide me with quest of isca for nov13 given by

478 views 1 replies
guyz plsss provide me with quest of isca for nov'13 given by Jinesh
Replies (1)
*******CA FINAL ISCA GUESSWORK……… DEAR STUDENTS….I HAVE ALREADY MAILED U THE GUESS OF ISCA AROUND 1 MONTH BACK….. OUT OF THOSE…. U MUST REVISE…..************* PUT MAXIMUM{{{{{{{{ 3-3.5 }}}}}} HOURS ON RTP, MODEL TEST PAPER AND FOLLOWING……….. NOTE- ****** DO WHATSOEVER U WOULD BE DOING****** BESIDES THIS******** Ch-1 (1) 5 characterstic of EIS 2)HOW CAN U DESIGN ( CHAPTER- 2) AND IMPLEMENTATION OF DATABASE ( CH-1) UNDER DSS 3) Types of System (4) Transaction Processing System (TPS)? Explain important features of a TPS. misconceptions about MIS (5) set of principles to guide the design of measures and indicators to be included in an EIS chapter-2 (1) Agile Vs Waterfall (2) feasibility study of preliminary investigation (3) Design- Dataflow (4) Case Tool / Data Flow Diagram (5) where source code is examined/ not examined ( unit testing) Chapter- 3 (1) Logical access control/issues and path (2) Control objective a. Data integrity/ privacy policy & methods b. Internal control audit concepts c. PCI Policies / DES / Antivirus method. d. auditor’s role in authorization controls e. Corrective Controls CHAPTER:4 a. CIS Advantage/ disadvantage b. IS Audit effectiveness & control c. Resources of LAN d. continuous auditing techniques, advantage and disadvantage. CHAPTER: 5 (1) RISK a. Risk management cycle – 5 strategies in risk development ( revised in Nov 12) b. Delphi approach of risk evaluation CHAPTER: 6 a. Methodology & methods of disaster recovery / Business continuity plan b. ERP post implements- Dilues, expectation, Fear / Risk & issues c. tasks to be undertaken in ‘Vulnerability assessment and definition of requirement’ phase of a Business Continuity Plan d. Risk issues and governance CHAPTER: 8 (1) COBIT 5 – benefit, Enables, principles / SA 402 / COCO / ISMS/ISO 27001, infrastructure liability- version 3 CHAPTER: 9 (1) Information protection rules methods & IS AUDIT REPORT CHAPTER: 10 (1) DIGITAL SIGNATURE SECTIONS Sec 3,7,10,14,15 Penalties- sec 43,44,45 Offences- sec 66 to 72 SHORT NOTES (a) Weaknesses of Spiral Model (b) Data Dictionary (c) Cryptosystem (d) Test Plan (e) Cold Site and Hot Site (f) Final Acceptance Testing (h) Level 1- Initial Level of CMM


CCI Pro

Leave a Reply

Your are not logged in . Please login to post replies

Click here to Login / Register