Isca-important questions

Prashanth (Chartered Accountant) (2322 Points)

07 October 2011  

 

 Hi freinds ,here some of important questions from ISCA


INFORMATION SYSTEMS CONTROLS AND AUDIT

 

 

 

Important Questions For November 2011 Exams

CHAPTER 1 Information System Concepts

S.No.

Question

1.

Define information. What are the important attributes/ characteristics of useful and effective information?

2.

What are the various factors on which requirement of information depend?

3.

What are the characteristics of an effective Management Information System? What are the common misconceptions about MIS?

 

4.

What is a Decision Support System? What are the components of DSS?

 

5.

What are the characteristics and advantages of ERP systems?

6.

Write short notes on:

a)      Open system and closed system

b)      Deterministic and probabilistic system

c)       Supra system

d)      Characteristics of the types of information used in Executive decision making..

 

CHAPTER 2 SYSTEM DEVELOPMENT LIFE CYCLE METHODOLOGY

S. NO.

QUESTION

1.

What are the reasons due to which organizations fail to achieve their objective of system development?

2.

What are the steps involved in building a prototype? In which fields prototyping is more successful? What are the advantages and limitations of prototyping approach of system development?

3.

What are the objectives of conducting feasibility study? What are the major areas of conducting feasibility study?

4.

What are the various tests that are performed while conducting system testing?

5.

What are the activities involved in post implementation evaluation? Why post implementation evaluation is important?2

6.

Write short notes on:

a)      System Requirement Specification

b)      Data dictionary

c)       Different types of system maintenance

d)      Different types of unit tests

 

CHAPTER-3 AN OVERVIEW OF ENTERPRISE RESOURCE PLANNING

S. NO.

QUESTIONS

1.

Write a detailed note on the expectations, fears and the ground realities that a corporate management faces during the post - implementation phase of ERP.

 

2.

What guidelines should be followed before starting the implementation of ERP package?

3.

Describe briefly the following SAP R/3 applications :

a)      Financial Accounting

b)      Treasury

c)      Enterprise Controlling

d)      Production Planning and Control

 

4.

Why do ERP projects fail so often?

5.

How does ERP fit with E-Commerce?

6.

Write short notes on:

1)      Business Process Engineering

 

 

CHAPTER-4 INFORMATION TECHNOLOGY (AMENDMENT) ACT, 2008

S. NO

QUESTIONS

1.

What are the conditions subject to which any electronic signature or electronic authentication scheme shall be considered reliable?

2.

What are the objectives of IT Act, 2000?

 

3.

Define The Following Terms in the light of ITAA 2008:

·         Digital signature

·         Electronic Form

·         Electronic record

·         Information

·         Computer Resources

·         computer

4.

What does ITAA 2008 say about:

          i.            Time and dispatch and receipt of electronic record.

        ii.            Acknowledgement of receipt.

5.

Discuss the provisions of Sec. 6 Of ITAA 2008 related to use of electronic records and electronic signatures in Government and its agencies.

6.

What are the functions which a Controller may perform in respect of activities of Certifying Authorities?

7.

What certification is made by the Certifying Authority while issuing a Digital Signature Certificate under Sec. 36 of ITAA 2008?

 

CHAPTER 5 CONTROL OBJECTIVES

S.NO.

QUESTIONS

1.

What are main reasons for establishing information system controls?

2.

What is the effect of computer on audit?

3.

What are the different categories of IS audit?

4.

What are the different types of costs involved in implementing controls?

 

5.

What are the techniques involved in financial controls?

6.

What is the auditor’s role in user final acceptance testing?

7.

What is the significance of a security policy? What are the contents of security policy?

 

CHAPTER-6: TESTING-GENERAL AND AUTOMATED CONTROLS

S.NO

QUESTIONS

1.

What are the different tests through which the auditor can test controls? What are the different phases involved in information system control audit?

2.

What information should be reviewed by the auditor in the process of preliminary understanding of entity’s  IS controls?

 

3.

Describe the sequence in which the auditor should test the different controls?

4.

What different procedures can be used by the auditor to obtain sufficient and appropriate evidence to support their conclusions for assessing the operating effectiveness of IS controls?

5.

What are the contents of an audit report related to controls testing?

6.

Write short notes on:

a)      IS controls audit process

b)      Multiyear testing plans

c)       Snapshot and integrated Test Facility  techniques of concurrent audit

 

CHAPTER-7-RISK ASSESSMENT METHODOLOGIES AND APPLICATIONS

S.NO.

QUESTIONS

1.

Define risk, threat, vulnerability, attack, residual risk and exposure?

 

2.

What is risk assessment? How is it performed?

 

3.

Describe the process of risk management?

 

4.

What are the common risk mitigation techniques?

6.

Write short notes on:

a)      systematic risk and unsystematic risk

 

 

CHAPTER-8-BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING

S.NO.

QUESTIONS

1.

What is business continuity planning? What are the components of a business Continuity Plan? What are the steps involved in business continuity life cycle?

 

2.

What are the objectives of business continuity planning?

 

3.

What is business impact analysis? What are the various activities which are performed in the business impact analysis phase of business continuity plan development?

 

4.

What are the objectives of business continuity plan testing?

 

5.

What areas should be evaluated by an auditor while auditing the disaster recovery plan?

6.

Discuss the various important threats, risks and exposures in a computerized system?

 

7.

What are the factors which influence the selection of backup media? What are the purposes for which backups can be used?

 

 

CHAPTER-9-INFORMATION SYSTEMS AUDITING STANDARDS, GUIDELINES, BEST PRACTICES

S.NO.

QUESTIONS

1.

What is the process of graduating from a Level 1 maturity to a Level 5 maturity under CMM Framework?

2.

“Security policy involves a thorough understanding of the organization business goals and its dependence on information security.” What are the areas which should be covered under this policy? Also mention its controls and objectives.

3.

In the scope of the Information Technology Infrastructure Library (ITIL) framework, explain the guidelines stated in the IT Service Management books.

4.

What are the common features in all security standards?

5.

Explain the various domains of COBIT, identified for high level control objectives to manage IT resources.

 

6.

Write short notes on:

a)      Asset Classification and Control under ISMS

b)      Communications and operations management

c)       Configuration management under ITIL framework

 

CHAPTER-10- DRAFTING OF IS SECURITY POLICY, AUDIT POLICY, IS AUDIT REPORTING-A PRACTICAL PERSPECTIVE

S NO.

QUESTIONS

1.

What are the reasons which lead to gap between the need to protect systems and the degree of protection applied?

2.

What factors should be considered while protecting information? What are the basic ground rules that must be addressed sequentially to protect the information systems?

 

3.

What major points related to Access Control should be set out in the information security policy?

4.

What is the scope of IS audit?

5.

What audit policy should do?

6.

Write short notes on:

a)      Attributes of security objective

b)      What information is sensitive?