CA Loan Bajaj Finserv
CA Final Online Classes
CA Classes

Share on Facebook

Share on Twitter

Share on LinkedIn

Share on Email

Share More

1715 times
215 KB

Download Other files in Students category

File Content -

ISCA ANALYSIS March 18 2016 RTP NOVEMBER 2008 TO MAY 2016 + MOCK TEST PAPERS FROM 2010 TO 2015+ QUESTION PAPER FROM JUNE 2009 TO NOV-2015. USEFUL FROM MAY 2016 EXAMS. ISCAGiridhar’sTM CHAPTER-1 CONCEPTS OF GOVERNANCE AND MANAGEMENT OF INFORMATION SYSTEMS(CGMIS) 1. Explain the key benefits of IT Governance achieved at highest level in an organization.(NOV- 2014(2M). Study material 1.5.3+asked in Nov 2015 exams 2. Write short notes on the following with reference to Governance Dimensions:study material 1.2 (i) Conformance or Corporate Governance Dimension(MTP O-14) (ii) Performance or Business Governance Dimension OR Differentiate between Corporate Governance and Business Governance.(MTPO-15) 3. What do you understand by GEIT? Also explain its key benefits.(RTP N-14 + MTP M-15). Study material 1.5.4 4. Explain the key functions of IT Steering Committee in brief(MTP F-15). Study material 1.7.2 5. Discuss the key management practices, which are required for aligning IT strategy with enterprise strategy.(RTP M-15 + MAY 2015(EXAMS). Study material 1.8.4 6.‘The success of the process of ensuringbusiness value from use of IT can be measured by evaluating the benefits realized from IT enabled investments and services portfolio and how transparency of IT costs, benefits and risk is implemented’. Explain some of the key metrics, which can be used forsuch evaluation.(RTP N-15) study material 1.8.5 7. Explain the following terms with reference to Information Systems (i) Risk(RTP M-11+MTP S-15 + NOV 2014 ). Study material 1.9.3 +Sources of Risk(MTP S-15). Study material 1.9.2 (ii) Threat(NOV 2014 (EXAMS)+RTP M-15+M-12 (iii) Vulnerability(RTP M-12+N-11+MTP S-15 + MAY 2015(EXAMS) + NOV 2014 (EXAMS). Study material 1.9.3 (iv) Exposure(RTP M-12) (v) Attack(RTP M-12+N-11+N-09) (vi) Asset(RTP M-15) 8. Define the following terms: (i) Likelihood(RTP M-12+N-11+N-09) (ii) Countermeasure (iii) Residual Risk(RTP N-09) 9. Briefly explain various risk management strategies.(MTP S-15 + MTP O-13 + MTP F-13+RTP N-14 GIVEN IN CASE LAW).+ study material 1.9.4 10. Describe key management practices for implementing risk management.(RTP N-14 + MTP M-15 + MTP S-14 + MAY 2015(EXAMS). Study material 1.9.6 11. Discuss the five principles of COBIT 5 in brief.(RTP M-14 + MTP M-15 + MTP F-14 + May 2015(EXAMS) + study material 1.10.6 12. Discuss various categories of enablers under COBIT 5.(RTP N-15 + MTP O-14 + MTP A-14 + MTP O-13 + MAY 2014(EXAMS).+ study material 1.10.8 13. Discuss the areas, which should be reviewed by internal auditors as a part of the review of Governance, Risk and Compliance.(RTP N-14) (MOCK O-15) + study material 1.12.3 14. Discuss the key management practices for assessing and evaluating the system of internal controls in an enterprise in detail.(RTP N-14) (MOCK S-15)+ study material 1.12.5 15. Describe the major benefits achieved through proper governance in an organization. 16. What are the key governance practices that are required to implement GEIT in an enterprise? (MTP S-14). Study material 1.5.6 17. Discuss key management practices, which are needed to be implemented for evaluating ‘whether business value is derived from IT’in an organization.( study material-1.8.5). 18.‘COBIT 5 provides various management practices for ensuring compliance with external compliances as relevant to the enterprise’. Explain these practices in brief.(MTP S-14 + NOV 2015(4M) + NOV 2014(6M).+ study material 1.11.2 19. Discuss some of the sample metrics for reviewing the process of evaluating and assessing compliance with external laws & regulations and ITcompliances with internal policies.( study material 1.11.3) 20. Write short notes on the following: (i) Role of IT in enterprises(NOV2015(EXAMS) . study material 1.7 (ii) Integrating COBIT 5 with other frameworks(MOCK O-15) + study material 1.10.2 (iii) Sample areas of review for assessing and managing risks( study material 1.12.4). (iv) Evaluating IT Governance Structure and Practices by Internal Auditors.(RTP M-16) + study material 1.12.2) 21. Discuss different levels of managerial activity that are carried out in an enterprise.(RTP M-16) + NOV 2015exams+ MTP F-15) study material 1.8 22. Discuss key benefits of COBIT 5 framework.(RTP M-16+N-13) + study material 1.10.4 23. Internal Controls as per COSO(RTP N-15 + NOV 2014 (EXAMS). Study material 1.6.2 24. Key governance practices for evaluating risk management(RTP M-15 + MTP O-14). Study material 1.9.5. 25. Discuss COBIT and its components in brief.(RTP M-15) + study material 1.10.3 26. Discuss major benefits of Governance(RTP M-15 + NOV 2014 + 2015 (EXAMS). Study material 1.3.1 27. Need for enterprises to use COBIT-5(MTP F-15) + study material 1.10.1 28. Metrics of Risk Management.(NOV2015(exams) + study material 1.9.7 29.Strategic Planning(MTP F-15)(SM PG NO 1.14) CHAPTER-2: INFORMATION SYSTEMSCONCEPT(ISC) 1. Define the following terms briefly: (a) Abstract system(RTP M-15+N-10) (b) Physical System(RTP M-15+N-10) (c) Open System(RTPM-16+N-08) (d) Closed System(RTPM-16+N-08) (e) Deterministic System(RTP M-13+M-11+N-08) (f) Probabilistic System(RTP M-13+M-11+N-08) 2. Discuss important characteristics of Computer based Information Systems in brief.(RTP N-15+M- 13+N-11)(Study Material 2.7)+asked in may-11 exams 3. What do you understand by TPS?Briefly discuss the key activities involved in a TPS.(RTP N- 14)(asked in may 14 exams) 4. What are the principal components of a TPS? Discuss in brief.(MTP M-12) 5. Explain basic features of a TPS in brief(RTP N-13+M-11)+MTP S-14 : asked in Nov-13 6. What do you understand by MIS? Discuss major characteristics of an effective MIS(RTP N-12+M- 12+N-09)+MTP F-13 + O-13 +M-15 : asked in Nov 2015+NOV 2013 7. Briefly discuss major misconceptions about MIS.(RTP N-14+N-13)+MTP O-15 8.‘There are various constraints, which come in the way of operating an MIS’. Explain any four such constraints in brief.(RTP N-14+N-12+M-12+M-11) : asked in may 2012. 9. What are major limitations of MIS? Explain in brief.(RTP M-14+N-11+N-09)+MTP AUG-12+ MTP S- 13+ F-15 : asked in Nov 2012. 10. What is Decision Support System (DSS)? Explain the key characteristics of a DSS in brief.(RTP M- 14)+MTP S-13 : asked in may 2012+NOV 2008 11. What is EIS? Explain major characteristics of an EIS.(RTP N-15+N-14+M-14)(Study material pg no 2.25)+MTP AUG-12 + F-14 + M-15 :asked in Nov 2012+ may 2011 12.‘There is a practical set of principles to guide the design of measures and indicators to be included in an EIS’. Explain those principles in brief.(RTP N-13+N-12+M-12+N-11)+MTP F-13+A-14 13. Discuss the difference betweenEIS and Traditional Information Systems.(asked in may 2013) 14. What is an Expert System?(MTP S-15)Discuss some of the business implications of Expert Systems in brief.(RTP M-15+M-12+N-10)+MTP M-13 +O-13 (Study Material pg no 2.29)+ asked in may 2011. 15.Describe the major benefits of Expert Systems in brief.(RTP M-14)+MTP M-12+F-14 + O-14) : asked in Nov 2015+NOV 2010 16. Discuss some of the important implications/advantagesof Information Systems inbusiness(RTP M-13+M-11)(or)‘In modern business perspective,information systems have far reaching effects for smooth and efficient operations’. Discuss some of these important implications of information systems in business.(Studymaterial pg no 2.35) : asked in may 2015+may 2010 17. What is Information? Briefly discuss its attributes.(RTP M-16+M-15+M-11+N-09)+MTP F-12 +S- 14 (Study material pg no 2.3(2.2.1)) : asked in Nov 2011. 18. What is DSS? Explain the components of a DSS in brief.(RTP N-09) ( STUDY MATERIAL PG NO 2.23) 19. Differentiate between DSS and Traditional MIS. 20.“A Decision Support System supports human decision-making process rather than providing a means to replace it”. Justify the above statement by stating the characteristics of decision support system.(MTP O-14) 21.“Decision support systems are widely used as part of an Organization’s Accounting Information system”. Give examples to support this statement.(RTP N-15+N-09) (Study material pg no 2.24) OrDiscuss various examples of DSS in Accounting.(MTP M-15+O-15(Only capital budgeting system) 22. Briefly describe five/threemajor characteristics of the types of information used in Executive Decision making.(Asked in May 2010) 23. Write short notes on the following: (i) Text Processing Systems(RTP M-11) (ii) Components of Message Communication Systems(RTP N-10)(STUDY MATERIAL PG NO 2.14) + asked in Nov 2012(ONLY ELECTRONIC MAIL) (iii) Teleconferencing and Video-conferencing Systems (iv)Role of information in business 24. Describe the main pre-requisites of a Management Information System, which makes it an effective management tool.(RTP M-13)+MTP F-12 : asked in may 2014 25. Discuss major areas of Computer-based applications(RTP M-16) (study material 2.2.4-page no 2.8) 26. Discuss differentcomponentsof ERP (Enterprise Resource Planning) and its benefits.(Study materialpg no 2.31)+MTP S-13 (RTP M-16+M-14+M-11) :asked in Nov 2015(only components) 27. Why do we need Expert Systems?(RTP M-15) +MTP O-14 (Study Material pg no 2.30) : asked in Nov 2015 28. Discuss different types of Information Systems.(RTP M-15)+MTP S-14(Study material pg no 2.9) 29.What are the features of the Electronic Mail System?(RTP N-15 GIVEN IN CASE LAW) 30. Explain the major points for evaluation of effectives Management Information System (MIS).(RTP N-15 GIVEN IN CASE LAW) 31. What are the types of operations into which the different office activities can be broadly grouped under office automation systems?(RTP N-12)+ MTP O-14 (Study Material Pg no 2.12) : asked in May 2015+ NOV 2010EXAMS 32.Discuss different levels of management activitiesin management planning andcontrol hierarchy.(RTP N-10)(STUDY MATERIAL PG NO 2.38) 33.Describe the three levels of implementation of databases.(RTP N-10)+MTP M-13 (STUDY MATERIAL PG NO 2.23)+ asked in Nov 2010exams 34.Explain any four benefits of Office Automation Systems.(MTP M-12). 35.Discuss Information System and its components. What are the activities carried out by Information System in general?(MTP F-15). 36.Explicit and Tacit Knowledge(MTP S-15) study material PG NO 2.16. 37.Electronic Document Management System(MTP O-15) 38. Potential applications should possess to qualify for expert systemdevelopment. (Askedin May2013)study material PG NO 2.31. 39.To operate Information Systems (IS) effectively and efficiently a business manager should have following knowledge about it(asked in may 15 exams) 40.Discuss some IT tools that may prove to be crucial for the company’s business growth.(MTP O- 15)+asked in nov-14 exams CHAPTER-3: Protection of InformationSystems(POIS) 1.Discuss various types of Information Security policesand their hierarchy.(RTP N-12+N-08)+MTP M-15+(asked in nov-13+11exams) 2.What are the key components of a good security policy? Explain in brief(RTP N-08)(or)major components of a good information security policy(RTP M-16+N-14+N-13+N-12)+MTP M-15+AUG- 12+F-12(or) State themajor points required to be stated by a good security policy.(RTP M-11) (asked in NOV-2015 EXAMS+nov-13 exams+may-12 exams) 3.The Information Security Policy of an organization has been defined and documented as given below: “Our organization is committed to ensure Information Security through established goals and principles. Responsibilities for implementing every aspect of specific applicable proprietary and general principles, standards and compliance requirements have been defined. This is reviewed at least once a year for continued suitability with regard to cost and technological changes.” Discuss Information Security Policy and also identify the salient components that have not been covered in the above policy. 4.Discuss five interrelated components of Internal Controls.(RTP N-14+N-11)+MTP S-14+A-14+asked in nov-12 exams 5.What do you mean by Preventive Controls?(MTP M-15)+RTP N-09Explain with the help of examples. Also discusstheir broad characteristics in brief.(RTP M-14)+MTP S-13 6.What do you mean by Corrective Controls?(RTP M-15+N-12+M-11)Explain with the help of examples. Also discuss their broad characteristics in brief.(RTP N-13+N-12)+MTP O-13+F-13+AUG- 12(asked in may-15 exams) 7.Whatdo you understand by Financial Controls? Explain major financial control techniques in brief.(RTP N-10)+MTP O-14+asked in may 14 exams 8.Whatdo you understand by Boundary Controls? Explain major Boundary Control techniques in brief.(RTP M-16+N-14+M-12)+MTP F-15+M-13(asked in may-15+13exams about report)+ only Cryptography(RTP M-15+M-14+N-13+N-12) 9.Brieflyexplain major update and report controls with reference to Database Controls in brief(RTP M-14 ONLY REPORT) 10.Whatdo you understand by classification of Information? Explain different classifications of Information.(or) As a member of IS Steering Committee, how do you classify the information for better integrity and security.(asked in nov-15 exams) 11.Brieflyexplain major Data Integrity Policies.(RTP N-14+N-10)+MTP M-15+M-13+asked in nov- 14+10exams(or)once the information is classified onvariouslevels, the organization has to decide about the implementation of different data integritycontrols. Do you agree? If yes, explain about dataintegrityand its policies. 12.Writeshort notes on the following: (I) TimeBomb(RTP N-11)+MTPA-14+O-13+M-13 (ii)LogicBomb(RTP N-11)+MTP A-14+O-13+M-13 (iii)Trojan(RTP M-13+N-14+M-14+M-13) (iv)Worms(RTP N-12+N-11) 13.Whatdo you understand by Asynchronous Attacks? Explain various forms of Asynchronous Attacks in brief.(RTP N-14+N-12) 14.Explainsome of the key ways to control remote and distributed data processing applications in brief.(RTP M-14+M-13+N-11)+asked in may 15 exams 15.Discussthe three processes of Access Control Mechanism, when a user requests for resources. 16.Discuss Locks on Doors with respect to physical access controls in brief(RTP N-08).(or)Discuss different means of controlling physical access in an organization.(RTP M-15+M-10)(SM PG NO 3.21) 17.Discuss major dimensions under which the impact of cyber frauds onenterprises can be viewed. 18.Discuss major techniques to commit cyber frauds in brief.(RTP M-16+M-15)+MTP S-14 19.Discuss any three Internetworking devices 20.Discuss major General Controls within an enterprise in brief.(RTP N-15-ONLY SHORT NOTE) (i)Organizational Controls (ii)Management Controls (iii)Financial Controls (iv)BCP (Business Continuity Planning) Controls (v)Operating System Controls(asked only operating system security in nov-14 exams) (i)major tasks (ii)components (iii)remedies (vi)Data Management Controls (i)Access Control (ii)Backup Control(MTP F-15) (vii)System Development Controls (viii)Computer Centre Security and Controls (i)Physical Security(or)Discuss the arrangements a company XYZ should emphasize in order to tighten its Physical Security for protecting its IT assets(RTP N-15) (ii)Software & Data Security (iii)Data Communication Security (ix)Internet and Intranet Controls (x)Personal Computers Controls(security measures only asked in nov-14 exams) 21.Whatdo you mean by Detective Controls?(MTP S-14)+RTP M-11Explain with the help of examples.(RTP M-12)Also describe their main characteristics in brief.(RTP M-12+M-11)+MTP F-14 22.DiscussApplication Controls and their categories in brief. (i)Boundary Controls (ii)Input Controls (iii)Communication Controls (iv)Processing Controls(ONLY DATA PROCESSINGCONTROLS–RTP M-11+N-10)+virtual memory controls(RTP M-10) (v)Database Controls (vi)Output Controls(MTP S-14)+asked in may-13 exams 23.‘There are various general guidelines, with reference to ‘Segregation of Duties’, which may be followed in addition with the concepts like, ‘maker should not be the checker’. Explain those guidelines. 24.What is ‘Data Integrity’? Explain six categories of integrity controls in brief. 25.Explain some of the key logical access controls in detail with the help of suitable examples.(RTP N-15)+only computer crime exposures(or)Crimes are committed by using computers and can damage the reputation, morale and even the existence of an organisation’. What are the problems do you think that any organization can face with the result of computer crimes?(RTPN-13+N-12+N- 11)+MTP O-14.(asked in nov-15 exams+may 14 exams) 26.Describemajor controls over environmental exposures.(RTP M-10)(or)Discuss different controls for environmental Exposures.(MTP F-15) 27.What is Cyber Fraud? Differentiate between pure cyber frauds and cyber enabled frauds. 28.Explain major cyber-attacks reported by various agencies in recent years. 29.Discuss Managerial Controls and their categories in brief.(MTP S-15) (i).Top Management and Information Systems Management Controls (ii).Systems Development Management Controls(RTP N-15) (iii).Programming Management Controls (iv).Data Resource ManagementControls(RTP N-15) (v).Quality Assurance Management Controls(RTPM-16) (vi).Security Management Controls(RTP M-16) (vii).Operations Management Controls 30.Write short notes on the following: (i)Need for protection of Information Systems (ii)Compensatorycontrols(MTP O-14) (iii)BCP controls (iv)Cyber Frauds (v)TopologicalControls (vi) Backup Controls 31 (combination question of 6+21) just differences(RTP M-16) 32.Impact of Technology on Internal Controls(RTP M-16)+MTP S-15+O-14(SM PG NO 3.11)+ only Segregation of Duties(RTP M-15) 33.Discuss InformationSystem Security and its objectives.(RTP M-15+N-13+M-13+N-12+M-12+N-10) (SM PG NO 3.3)(asked in may 14 exams) 34.Whatare the aspects that should be evaluated by an IS Auditor while reviewing the adequacy of data security controls?(RTP N-11+N-10)(SM PG NO 3.73).+ MTP A-14+M-12 35.‘The objective of controls is to reduce or if possible, eliminate the causes of the exposure to potential loss. Exposures are potential losses due to threats materializing. All exposures have causes’. Discuss some categories of exposures in brief and also discuss some critical control considerations in a computerized environment.(RTP M-11)(SM PG NO 3.9)(asked in nov-14 exams) 36.Describe various groups of management, comprised by security policy.(RTP N-10)(SM PG NO 3.6(3.4.3)) 37.Differentiate between Physical AccessControls and Logical AccessControls.(MTP F-15) 38. Whatare the issues that should be covered by a security policy? Explain in brief.(RTP N-11)(or) For appropriate implementation of information security at various levels, organizations require security policies, which should cover various issues.’ What are these issues that should be covered by a security policy? Explain in brief.(MTP A-14+AUG-12+MAR-13)(SM PG NO 3.6)(asked in may-13 exams) 39.‘Information systems can generate many direct and indirect risks. These risks lead toa gap between the need to protect systems and the degree of protection applied’. What are the main reasons of this gap?(RTP M-11+M-10)(sm pg no 3.2) (Note:-For control over 3rdchapter please referGiridhar’sflow chart in caclubindia and it is divided into 3 parts). CHAPTER-4:BusinessContinuity Planning and Disaster Recovery Planning(BCPDRP). 1.Discussthe objectives of Business Continuity planning.(RTP M-16+N-14)(or)what are the objectives and goals of BCP?(MTP O-14+A-14)+RTP M-12+N-11+M-11+N-10+asked in nov-13+12 exams 2.Describethe methodology of developing a Business Continuity Plan. Also enumerate its eight phases.(or)Discuss the different phases involved in the development of a Business Continuity Plan.(or)Name the different phases of methodology for developinga BCP. What are the major points on which a methodology mainly emphasizes upon?(RTP M-16+N-13+M-13+N-12+M-12+M- 11)+MTP S-14+O-13+F-13(asked in may 14 exams) 3.Whiledeveloping a Business Continuity Plan, what are the key tasks that should be covered in the second phase ‘Vulnerability Assessment and General definition of Requirement’?(RTP N-14+N- 13+N-10)+MTP O-13+S-13+M-13 4.Whatare the major documents that shouldbe the part of a Business Continuity Management system? Explain in brief.(or)Why documentation is required in Business Continuity Management (BCM)? Whichdocuments are classified as being part of the BCM system?(RTP M-16) 5.Discussthe maintenance tasks undertaken in the development of a BCP in brief.(RTP N-14) 6.Brieflyexplain various types of system’s back-up for the system and data together.(OR)Explain briefly data back-up techniques.(MTPF-12)(Or)Explain briefly various types of data back-ups(RTP N-15)+MTP M-15+Discuss different types 0f back-up plans used in BCP?MTPS-14(asked in nov-14 exams+nov-11exams) 7. Explainbriefly the following terms with respect to business continuity and disaster recovery planning.(or)various kinds of plans that need to bedesigned for BCM.(asked in nov-15 exams) (I)Emergencyplan(RTP N-15+N-09) (ii)RecoveryPlan(RTP M-16+N-15+M-13+N-11)+MTP F-15+asked in may-12 exams (iii)Testplan(RTP N-14+N-13) (iv)Backup plan.(MTP F-15) (or)‘Different types of plans are used in BCP namely, EmergencyPlan, Back-up Plan, Recovery Plan, and Test Plan’. Discuss recovery plan in brief.(RTP M-12)(or)differential backup technique in detail.(RTP N-10) 8.Explainbriefly the following terms with respect to alternate processing facility arrangements in business continuity and disaster recovery planning.(RTP M-13)+(asked in may-15 exams+may-11 exams)(or)discuss the various backup options considered by a security administrator when arranging alternate processing facility. (i)Cold site(RTP N-15+N-12+M-12+N-09)+MTP F-14 (ii)Hot site(RTP N-15+N-12+M-12+N-09)+MTP F-14 (iii)Warm site(RTP N-09) 9.A company has decided to outsource its recovery process to a third party site. What are the issues that should be considered by the security administrators while drafting the contract?(ASKED IN NOV-15+may-10EXAMS)(RTP N-15+N-14+M-13+M-11)+MTP M-12 10.Describe contents/componentsof a Disaster Recovery and Planning Document.(RTP N-08)(OR) Discuss the major areas that form a part of Disaster Recovery Planning (DRP) Document.(RTP N- 15+M-14+N-10)+MTP O-15+asked in nov-11 exams 11.Explain theobjectives of performing BCP tests while developing a business continuity plan.(RTP N-10) 12.Briefly explain the maintenance tasks undertaken in the development of a business continuity plan. 13.What are the key aspects that should be verified during audit/self-assessment of an enterprise’ BCM program while reviewing BCM arrangements?(asked in may-15 exams) 14.Differentiate between Incremental Backup and Differential Backup(or)Differential Backup and Full Backup(RTP N-14)(or)Incremental Backup and Mirror Backup(RTP M-13+M-10)(or)Full backup and Incremental Backup(RTP N-12)(or)Differential Backup(RTP N-11) 15.Write short notes on the following: (i)BCP Manual(MTP S-15) (ii)Discussdifferent stages of Business Continuity Management (BCM) Process.(MTP F-15)(SM PG NO 4.11) (iii) Back-up Plan (iv) BCM Maintenance 16.Differentiate between Cold Site and Hot Site.(RTP N-13) 17.Discuss Business Impact Analysis (BIA).(RTP M-16) 18.What is meant by Business Continuity Planning? Explain the areas covered byBusiness Continuity.(RTP M-16+M-13+N-12+M-12+M-10)+asked in nov-10 exams 19.Explain the advantages of Business Continuity Management (BCM)(RTP N-15) 20.What are the objectives of Business Continuity Management (BCM) Policy?(MTP M-15)(SM PG NO 4.4)(asked in nov-14 exams) 21. Whatare the tasks thatshould be undertaken in Business Impact Analysis? Explain in brief.(MTP A-14+F-14+M-13+AUG-12)+RTP N-11+M-11(SM PG NO 4.14)(asked in may-13+nov-11+09exams (or)In the development of a business continuity plan, there are total eight phases;Business Impact Analysis is the third importantphase. Discuss various tasks which are to be undertaken in this phase.(RTP N-10) 22.What do you understand by the term ‘Disaster’? What procedural plando you suggest for disaster recovery?(MTP F-12)(SM PG NO4.24) 23.While auditing aDRP for information technology(IT) assets, what concerns are required to be addressed?Briefly explain.(asked in may-14 exams)(sm pg no 4.27 point no XX) 24.What are the elements to be included in the methodology for the development of disaster recovery/business resumption plan?.(asked in nov-12 exams)(sm pg no 4.25) CHAPTER-5:Acquisition, Development and Implementation of InformationSystems(ADIIS) 1.Discuss the key characteristics of Waterfall Model in brief. Also explain its major weaknesses(MTP F-14+M-12)only weakness+(RTP N-13+N-12+M-12+N-10) 1A.‘Waterfall approach is oneof the popular approaches for system development’.Explain the basic principles/key characteristics of this approach.(RTP M-13+M-11)(SM PG NO 5.9) 2.Briefly explainweaknessesPrototyping approach.(RTP M-14+M-11)+MTP S-13 3.Describe major strengths ofPrototyping model.(RTP N-14+M-11)+MTP F-12 3A.Discuss basic principles/Generic phasesof Prototyping Model in brief.(RTP M-12)(sm pg no 5.11) 4.Explain major strengths and weaknesses of Spiral model(RTP M-14)+RTP N-13(ONLY WEAK)+asked in nov-10 exams(or)as a person in-charge of system developmentlife cycle, you are assigned a job of developing a model for a new system, which combines the features of a prototyping model and the waterfall model.Whichwill be the model of your choice and what are its strengthsand weaknesses?. 4A.XYZ Ltd., primarilyengaged in games development is in the process of automation of its various business processes. After considering all the relevant factors, the technical consultantof the company recommended tofollow a combination of prototyping and waterfall model forthe project implementation. Identify the model and explain its basic principles.(RTP M-13)+(MTP O-13+M- 13)(SM PG NO 5.15) 5.What do you understand by agile model of software development? Also explain its major strengths(RTP M-16+N-14+M-13)+MTP O-14+AUG-12(asked in nov-14 +nov-13 exams)and weaknesses in brief.(RTP M-13)+(MTP F-15+S-14) 6.State and briefly explain the stages of System Development Life Cycle (SDLC).(nov-15 exams) 7.The top management of company has decided to develop a computer information system for its operations. Is itessential to conduct the feasibility study of system before implementing it? If answer is yes, state the reasons. Also discuss three different angles through which feasibility study of the system is to be conducted.(MTP S-15) 8.What are the possible advantages of SDLC from the perspective of IS Audit?(RTP N-14+N-13+N- 10)+MTP F-14+asked in nov-12+10exams 9.What are the major aspects that need to be kept in mind while eliciting information to delineate scope?(or)‘While eliciting information to delineate to scope, what are the aspects that are needed to be kept in mind during preliminary investigation of a project under SDLC’?(RTP N-13+N-12+N- 11+N-10) 10.Discuss in detail, how the analysis of present system is made by the system analyst?(or)A Company is offering a wide range ofproducts and services to its customers. It relies heavily on its existing information system to provide up to date information. The company wishes to enhance its existing system. You being an information system auditor, suggest how the investigation of the present information system should be conducted so that it can be further improved upon.(or) discuss in brief the various functional areas to be studied by a system analyst for a detailed investigation of the present system.(MTP AUG-12)+asked in nov-11+may-11exams 11.Explain two primary methods, which are used for the analysis of the scope of a project in SDLC.(RTP N-15+N-14+M-13+N-12)+MTP O-14+asked in may-10 exams 12.Explain two primarymethods, which are used for the analysis of the scope of a project in 13.If you are the Project Manager of a Software Company with the responsibility for developing a break-through product, combining state of the art hardware and software; will you opt for typing as a process model for a product meant for the intensely competitive entertainment market? 14.Describe briefly four categories of major tools that are used for system development(or)Discuss majorly used System Development Tools(RTP M-16)+ ONLY DATA FLOW DIAGRAM+Structured English+Flowcharts(RTP N-15+N-14+N-09) 15.Bring out the reasons as to why organizations fail to achieve their Systems Development Objectives?(RTP N-14+N-11+N-10)+MTP A-14+F-12(or)List down some notable issues because of which an enterprise at times fails to achieve the objectives of the system development.(MTP F-15) (or)It is observed that sometimes, organizations fail to achieve their systemsdevelopment objectives. What may be the possible reasons for the same in your opinion? Give any five.(RTP N- 12)(asked in may-15 exams) 16.Discuss major characteristics of a good coded program in brief(RTP N-15+N-13+N-12+N-11+N- 10)+MTP S-14+asked in nov-12 exams 17.What is Unit Testing?Explain five categories of tests that a programmer typicallyperforms on a program unit.(asked in NOV-15 Exams+MAY 15 EXAMS+nov-14exams)+MTP O-15+RTP M-13(or) What is Unit Testing? Discuss its benefits and limitations.(RTP N-09)+asked in may-10 exams 18.Explain the following testing techniques: (i)Black Box Testing(RTP N-14+N-13+N-08)+MTP O-14+Asked in N-09exams (ii) White Box Testing(RTP N-14+N-13+M-13)+MTP O-14+AUG-12+asked in J-09 exams (iii) Gray Box Testing(RTP N-13) 19.Explaindifferent changeover strategies used for conversion from old system to new system.(ONLY PHASED(MTP AUG-12)+PILOT)(RTP N-15+N-12) 20.Discussbriefly, various activities that are involved for successful conversion with respect to a computerized information system.(RTP N-12+N-10)+asked in may-13 exams 21.Explain corrective and adaptive maintenance in brief.(MTP A-14+O-13+M-13)+RTP N-11 22.What is waterfall model of system development? Also discuss its major strengths.(RTP M-12+N- 10)+asked in may 2014 exams only strengths. 23.What is Rapid Application Development? Discuss its strengths(RTP M-12)and weaknesses in brief.(RTP N-11) 24.Agile methodology is one of the popular approaches of systemdevelopment. What are the weaknesses of this methodology in your opinion?(RTP M-14)+MTP M-15(or)As per recent industry trends, Agile methodology has become a good choice for software development community. There is no doubt to say that it has various strengths aswell but on the other hand, it has certain weaknesses too. Briefly explain the weaknesses of this methodology.MTPF-13+RTP M-13 24A.what is agile methodology? Explain its basic principles/featuresin brief.(RTP N-13+N-12)(SM PG NO 5.18) 25.What do you understand by feasibility study? Explain various types of feasibility studies in detail.(RTP N-14+M-14+N-08)(or)Differentiate between “Economic Feasibility” and “Operational Feasibility”.(MTP M-15)(or)What issues would you like to raise during the technical feasibility of new proposed system?(RTP M-13+N-12)+(MTP M-15)(SM PG NO 5.24)(asked in nov-13+J-09 exams)+Discuss various dimensions under which the phase feasibility study of SDLC is evaluated.(MTP O-14+RTP N-11)+Operational Feasibility(MTP M-12+RTP N-13+N-12)+Technical Feasibility(MTP F-12)+RTP M-12+N-09+Feasibility study of a system is accomplished under various dimensions such as technical, financial, economical, operational, legal etc. Out of these, explain technical feasibility in brief.(RTP N-12)+Economic Feasibility(RTP N-09) 26.System Analysts use various fact-finding techniques for determining the needs/ requirements of a system to be developed. Explain these techniques in brief.(RTP M-14+N-11)+MTP S-14+A-14(ANY TWO ONLY)+MTP O-13+AUG-12(or)Discussany two fact finding techniques with reference to requirements phase of SDLC? 27.What do you understand by “Requirement analysis”?(RTP N-14)+MTP O-13+F-13What is the significance of analyzing the present system and how is it carried out? Explain briefly. 28.What is SDLC? Explain the key activities performed in the Requirements Analysis phase.(RTP M- 16+N-14+M-14+M-13+M-12)+MTP O-13+F-13(or)‘Requirements Analysis phase includes a thorough and detailed understanding of the current system, identificationsof the areas that need modifications to solve the problem, the determination of user/managerial requirements and to have fair idea about various systems development tools’. Briefly discuss the activities, which are performed in this phase.(RTP M-11)+(asked in may-13+11exams) 29. Discuss the roles of the following with reference to SDLC: (i) Steering Committee(OR)Mention different functions of steering Committee under SDLC(RTP N- 15+M-14) (ii) System analyst(RTP M-14)+asked in nov-11 exams (iii) Database Administrator(RTP M-14)+asked in nov-11 exams (iv) IS auditor(RTP M-16+M-14)+asked in nov-11 exams 30.Discuss Final Acceptance Testing in brief.(RTP M-14+N-13+M-12) 31.Write short notes on the following: (i) data dictionary(MTP O-13+F-13+F-12)+RTP N-13+asked in may-12+10exams (ii) static testing (iii) Regression Testing(asked in nov-10 exams) (iv)system testing(RTP M-11)+asked in nov-13 exams (v)Preventive Maintenance(MTP F-13)(or)Preventive and Perfective Maintenance(MTP M-12) (vi)AdaptiveMaintenance(RTP M-14)+MTP S-13 Orhowcan ‘SystemMaintenance’ underSystem Development Life Cycle (SDLC) be categorized?OR ‘’maintaining the system is an important aspect of SDLC” considering this statement list out various categories of system maintenance in SDLC.(RTP M-16)(RTP N-15+M-11)+asked in nov-10 exams (vii)Strengths(RTP M-11)&Weaknesses of IncrementalModel(RTP M-16)(Or)forthe development of software, various techniques/models are used e.g. waterfall, incremental, spiral etc; in which, each has some strengths and some weaknesses. Discuss the weaknesses of the incremental model.(RTP N-11) (viii)Auditors’ involvement in development work (ix)Parallel RunningImplementation(RTP M-14) (x)Discuss Integration Testing and its types.(MTP F-15)+What is Integration testing? Explain bottom-up and top-down integration.(RTP M-12) 32.Importantfactorsshould be considered by the system analyst while designing userinput forms.(asked in nov-15 exams) 33.ProgramDebugging and Program Testing(RTP M-16) 34.Explain the various user related issues in achieving the system development objectives.(RTP N-15) 35.According to youas an IS Auditor, what are the validation methods for approving the vendors‟ proposals?(RTP N-15+N-14+M-14)(or)Large organizations would naturally tend to adopt a sophisticated and objective approach to validate the vendor’s proposal’. What arethe validation methods that may be used for this purpose?(RTP M-11) 36.With reference to the conversion from existing information system to a new system, explain the file conversion in brief.(RTP M-14)+MTP F-14 37.The company appoints an Accountant forhis active involvement during the development work of the proposed system. Discuss some of the aspects on which anaccountant can play a vital role during proposed system’s development.(MTP S-15)(SM PG NO 5.7)(CONCEPT NO 5.3.3) 38.What do youunderstand by “System Development Methodology”?(MTP S-15)(SM PG NO 5.8) 39.Differentiate between Hardware Acquisition and Software Acquisition.(MTP M-15)(SM PG NO 5.45) 40.Management should establish acquisition standards that address the same security and reliability issues as development standards. What are the issues that should be focused by Acquisition standards?(RTP M-13+N-11+M-11)+(MTP O-13+F-13)(SM PG NO 5.44) 41.Describe major design principles with reference to SDLC in brief.(MTP M-13)(SM PG NO5.42) 42. CASEtools(MTP F-12)+RTP N-09 43.At the end of the analysis phase of SDLC, the system analyst prepares a document called ‘Systems Requirements Specifications (SRS)’. Briefly explain the contents of a SRS.(RTP N-10)(SM PG NO 5.36)(asked in may-14 exams+nov-11 exams)(sm pg no 5.59) 44. Brieflyexplain about various categories of software maintenance used in system development life cycle.(SDLC)(asked in may 2014 exams) 45.What are the majoractivities involved in design of database.(asked in may-12 exams) CHAPTER-6:Auditing of InformationSystems(AIS) 1.Discuss the issues relating to the performance of evidence collection and understanding the reliability of controls.(RTP N-14)+MTP M-15+(asked in may 2015 exams+nov-14 exams) 2.Explain the set of skills that is generally expected ofan IS auditor.(MTP A-14+F-13+AUG-12)+RTP N-11+N-10+asked in nov-12 exams 3.Explain major types of IS Audits in brief.(or)Discuss the variouscategories of IS Audit?(MTP S- 14)+RTP N-10+asked in nov-12 exams) 4.Explain major stages of IS Audits in brief(or)The company appoints an auditor toconduct audit of the existing Information System. What are the steps an auditor would follow to conduct the audit of Information Systems?(MTP F-15)(or)Discuss in brief various steps involved in information systems audit?(MTP O-14)(asked in may-15 exams+may-12) 5.An important task for the auditor as a part of his/her preliminary evaluation is to gain a good understanding of the technology environment and related control issues. Explain major aspects that should be considered in this exercise.(asked in may 2015 exams) 6.What are the key steps that can be followed for a risk-based approach to make an audit plan? Explain in brief. 7.Write short notes on the following: (i) Snapshots(RTP N-14) (ii) AuditHooks(RTP N-14) 8.What do you understand by SCARFtechnique? Explain various types of information collected by using SCARF technique in brief.(RTP N-12)OrDiscuss the System Control Audit Review File (SCARF) technique used in the audit of Information Systems.(RTP M-16+N-15+N-14)+asked in may-13+11 exams 9.Describe major advantages of continuous audit techniques.(MTP S-15+M-15+S-14+A-14+S- 13+AUG-12+M-12)+RTP N-13+N-12+N-11(asked in nov-15+11exams+may 14+10exams) 10.Describe major disadvantages(asked in may 14+nov-11exams)and limitations of Continuous Audit techniques.(RTP M-14+M-12)+MTP O-15+F-15+F-14+O-13+F-13 11.Explainthree major ways by which audit trails can be used to support security objectives.(OR) What objectives are achieved when audit trails are maintained?(RTP M-11)(MTP S-15+M-15+S-14) (SM PG NO 6.22)+asked in nov-11+may-10exams 12.Discuss major audit issues of operational layer withreference to application security audit. 13.What are the factors that influence an organization towards controls and audit ofcomputers? (asked in nov-15 exams) 14.Discuss the points relating to ‘Legal Considerations and Audit Standards’ to be considered by an IS auditor as a part of his/her preliminary review.(or)Being an IS Auditor, what are the critical factors that you will consider as a part of your preliminary review which are going to be critical for your effective audit review?(MTP S-15) 15.Discuss Integrated Test Facility (ITF) technique of continuous audit in detail with the help of examples.(asked in nov-13 exams) 16.Describe major tasks performed by an Operating System in brief.(MTP O-14)(asked in may-15 exams) 17.What are the major aspects that should be thoroughlyexamined by an IS Auditor during the audit of Environmental Controls? Explain in brief.(or)An enterprise ABC plans to conduct audit in its enterprise. List down some points for audit of Environmental controls that an auditor would consider in his/her checklist while conducting the audit.(or)As an IS auditor, What are the environmental controls verified by you, while conducting physical inspections.(MTP F-15)(asked in nov-15 exams)(SM PG NO 6.24) 18.Discuss major audit issuesof Tactical Layer with reference to Application Security Audit. 19.Write short notes on the following: (i)Basic Plan with reference to IS Audit (ii) Continuous Audit (iii)Continuous and Intermittent Simulation (CIS) technique (iv)Strategic Layer with reference to application security audit. 20.Functions of IS Auditor(RTP M-11) +(asked in nov-15 exams+NOV 2014 EXAMS) 21.Discuss the Accounting and Operations Audit Trails with respect to Communication Controls.(RTP N-15) 22.Inherent Risk and Detection Risk(RTP N-15) 23.Differentiate between Control Risk and Detection Risk.(MTP F-15) 24.Discuss the impact of information systems audit on organizations(or)Factors influencing an organization toward controls and audit of computers and the impact of the information systems audit function on organizations(MTP O-14+A-14)(sm pg no 6.2)(Only objectives askedasked in nov- 2015 exams) CHAPTER-7:Information Technology Regulatory Issues(ITRI) 1. Explain the objectives of the Information Technology Act 2000.(RTPN-14)(asked in may 2012 exams) 2.Explain ‘Authentication of Electronic Records’ with reference to Section 3 of Information Technology Act 2000.(Or)howdoes the Information Technology Act 2000 enable the authentication of records using digital signatures?(Or)To ensure that no unauthorized disclosure of the information will be made, proper authentication mechanism needs to be implemented. How Information Technology (Amendment) Act 2008 addresses this issue with reference to its Section 3? (RTP M-13+N-11)+MTP M-15+F-14+AUG-12+F-12+(asked in nov-13+N-09exams+may 2011 exams) 3.Discuss the main provisions provided in Information Technology Act 2000 to facilitate e- Governance. 4.Discuss the ‘Use of Electronic Records in Government and its agencies’ in the light ofSection 6 of Information Technology Act 2000.(RTP N-14+M-14+M-11) 5.Describe the ‘Power to make rules by Central Government in respect of Electronic Signature’ in the light of Section 10 of Information Technology Act 2000.(RTP M-16+M-14+N-13)(ASKED INNov-15 EXAMS+May 2012exams) 6.Describe the ‘Tampering with Computer Source Documents’ in the light of Section 65 of Information Technology Act 2000.(OR)‘Tampering with Computer Source Documents’ is a common threat for automated business modules. HowInformation Technology (Amendment) Act 2008 addresses this issue with reference to its Section 65?(RTP M-14) 7.Discuss ‘Punishment for sending offensive messages through communication service etc.’ in the light of Section 66A of Information Technology Act2000.(RTP M-15+N-14+N-10)+asked inmay-13 exams As per the decision of theSupreme Courtdated 24.03.2015; Section 66A of Information Technology Act, 2000 (Punishment for sending offensive messages through communication service, etc.) has been declaredUnconstitutionalas itis violative of Article 19(1)(a) related to freedom of speech and expressions. Now comments on social networking sites will not be offensive unless they come under the provisions of the Indian Penal Code, 1860. 8.Discuss ‘Power of the Controller to givedirections’ under Section 68 of Information Technology Act 2000.(RTP M-15+N-13) 9.Discuss ‘Power to issue directions for interception or monitoring or decryption of any information in any computer resource’ under Section 69 of Information Technology Act 2000. 10.Discuss ‘Penalty for publishing Electronic Signature Certificate false in certain particulars’ under Section 73 of Information Technology Act 2000. 11.What is the vision of National Cyber Security Policy 2013? Also explain its major objectives. 12.Discuss PDCA cyclic process under ISO27001.(MTPO-15+M-15+S-14)+asked in nov-14 exams) 13.Write a short note on ‘Service Strategy’ of IT Infrastructure Library (ITIL) framework. (Or) Discuss Information Technology Infrastructure Library (ITIL) Service Lifecycle.(RTP N-15)(asked in nov-15 exams).+only library (asked in may-12 exams) 14.What are the major provisions on ‘Retention of Electronic Records’ with reference to Information Technology Act 2000? Explain in brief.(RTP M-15)+MTP S-15+F-15+O-13+F-13+asked in may 2012 exams+may 2011 exams. 15.Briefly explain the following with respect to the Information Technology Act 2000: (i) [Section 66B] Punishment for dishonestly receiving stolen computer resource or communication device(RTP M-15+N-14)+asked in may-13 exams (ii) [Section 66C] Punishment for identity theft (iii) [Section 66D] Punishment for cheating by personation by using computer resource (iv) [Section 66E] Punishment for violation of privacy(RTP N-14)+asked in may-13 exams (v) [Section 66F] Punishment for cyberterrorism(RTP M-14)(asked in may-15 exams) 16.Explainthe ‘Power to issue directions for blocking public access of any information through any computer resource’ under Section 69A of the Information Technology Act 2000.(RTP N-15)+MTP O- 15 17.Explain the ‘Power to authorize to monitor and collect traffic dataor information through any computer resource for Cyber Security’ with reference to Section 69B of the Information Technology Act 2000.(RTP M-12+M-11)+MTP AUG-12 18.Write short notes on the following: (i) [Section 4] Legal Recognition of Electronic Records (ii) [Section 5] Legal Recognition of Electronic Signature 19.Write short notes on the following: (i) System Controls with reference to the requirement of RBI/IRDAfor System Control and Audit (ii)Requirements of SEBI for System Controls & Audit(asked in nov-14 exams)(sm pg no 7.33) (iii) Auditor Selection Norms with reference to the requirement of SEBI for System Control andaudit (RTP N-15)(asked in may-15 exams) 20. DiscussITIL Framework.(RTP M-14–ONLY SERVICE OPERATION)+MTP S-15+ (MTP F-14Service TransitionONLY).+SERVICE DESIGN (MTP S-13) 21.Discuss the guidelines recommended by Securities and Exchange Board of India (SEBI) to conduct audit of systems.(RTP M-16) 22.To retain their electronic records for specified period, what are the conditions laid down by Section 7, Chapter III of Information Technology Act, 2000?(RTP N-15+N-13+M-13+N-12+M- 11)+MTP O-14+F-12(asked in may-14exams+ may2010 exams) 23.Explain the penalty for failure to furnish information return under Section 44 of IT Act, 2000.(RTP N-15) 24.Whatare the powers of a Police Officer under the Information Technology (Amendment) Act, 2008 to enter and searchetc. (SECTION 80)?(RTP M-15+N-14+M-10) 25.Describe ‘Recognition of Foreign Certifying Authorities’ in the light of Section 19of Information Technology (Amendment) Act, 2008.(RTP M-14+M-12+N-11)+ MTP F-14+M-12+asked in may 13 exams. 26.Describe ‘Secure Electronic Signature’ in the light of Section 15 of Information Technology (Amendment) Act, 2008.(RTP N-13+M-11)+asked in nov 2010 exams 27.Discuss the ‘Acceptance of Digital Signature Certificate’ under Section 41 of Information Technology (Amendment) Act, 2008.(RTP N-13+N-12)+MTP M-12+asked in nov-2010 exams 28.Discuss the major functions, which may be performed by the Controller of CertifyingAuthorities under Section 18 of Information Technology (Amendment) Act, 2008.(RTP M-13)+(asked in nov-13 exams) 29.Power of State Government to make rules in the light of Section 90 of InformationTechnology (Amendment) Act, 2008.(RTP M-13+N-11)+MTP M-13 30.Discuss the Duties of Certifying Authorities under Section 30 of the Information Technology (Amendment) Act 2008 to facilitate e-Governance.(RTP N-12+M-12+M-11+N-08)+MTP M-13+asked in nov-12+may-11exams. 31.Discuss the composition of a Cyber Appellate Tribunal under Section 49 of Information Technology (Amendment) Act, 2008.(RTP N-12) 32.What is the procedure to apply for a license to issue electronic signature certificates, under Section 22, Information Technology (Amendment) Act, 2008?(RTP N-12)+MTP O-13+F-13+asked in may-13 exams+nov 2010 exams) 33.Discuss the Electronic Signature under Section 3A of Information Technology(Amendment) Act, 2008.(RTP M-12) 34.Describe “license to issue electronic signature certificates” with respect to the Section 21 of Information Technology (Amendment) Act, 2008.(RTP N-11) 35.Discuss “Appeal to Cyber Regulations Appellate Tribunal” under Section 57 of Information Technology (Amendment) Act, 2008(RTP N-11)+MTP A-14 36.Define the following terms with respect to Information Technology (Amendment) Act, 2008: (i)Access(RTP M-11) (ii)AppropriateGovernment(RTP M-11) (iii)ComputerNetwork(RTP M-11+N-10) (iv)SecureSystem(RTP M-11) (v)ElectronicSignature(RTP N-10+M-10+N-08) (vi)Electronic SignatureCertificate(RTP N-10+M-10) (vii)Intermediary+ chapter-XII(RTP N-10)(asked in may-15 exams+ may 14 exams) (viii)Computer SourceCode(RTP N-10) (ix)Electronicform(RTP N-08)+asked in may 2010 exams (x)Keypair(RTP N-08) (xi)Asymmetric cryptosystem(RTP N-08)+asked inmay 2010 exams (xii)Adjudicating officer.(RTP N-08) 37.Discuss the Delivery of Services by Service Provider with respect to the Section 6A of Information Technology (Amendment) Act, 2008.(RTP N-10) 38.Discuss National nodal agency with respect to theSection 70A of Information Technology (Amendment) Act, 2008.(RTP N-10) 39.Explain the power of Controller to make regulations under Section 89 of the Information Technology (Amended) Act 2008.(RTP M-10) 40.Briefly explain the Punishment forpublishing or transmitting of material containing sexually explicit act, etc. in electronic form as per Section 67 A of the Information Technology (Amended) Act 2008.(RTP M-10) 41.Discuss ‘Publication of rules, regulation etc. in Electronic Gazette’ with reference to Section 8 under Information Technology (Amendment) Act 2008.(MTP F-14) 42. In informationTechnology (Amended) Act2008, what do section 25 and 26 say about suspension of licence to issue electronic signature certificate.(asked in nov-12 exams) 43. Constitution of CRAC u/s 88.(asked in nov-12 exams+nov-11exams) 44.SA 402(MTP O-14) CHPATER-8: EmergingTechnologies(ET)(ADDED FROM NOV-14 EXAMS) 1.What is Cloud Computing? Explain some pertinent similarities and differencesbetween Cloud and Grid computing.(RTP N-15)+MTP S-15 2.Discuss the major goals of Cloud Computing in brief.OR pertinent objectives in order to achieve the goals of cloud computing.(RTP N-14)(MTP S-14)(Askedin nov-14 exams) 3.Describe Front end and Backend architecture with reference to Cloud Computing.(RTP M-15) 4.What do you understand by Public cloud? Also discuss its major advantages in brief.(RTP N-14) 5.What is Private cloud? Also explain its major advantages in brief. 6.Explain the following withreference to cloud computing: (I)Infrastructure as a Service (IaaS)(MTP M-15) (II)Platform as a Service (PaaS)(RTP M-15) + (MTP O-14) (III)Software as a Service (SaaS)(RTP M-15) (iv)Network as a Service (NaaS) (v) Communication as a Service (CaaS). 7.Explain, in brief, the characteristics of CloudComputing(MTP F-15) 8.Briefly discuss the advantages of Cloud Computing.(MTP O-14)(Askedin nov-15 exams) 9.Discuss any fivechallenges to Cloud Computing in brief.(RTP N-14)(Askedin may-15 exams) 10.Explain some of the tangible benefits of mobile computing.(MTP S-14+M-15+O-15) 11.Write short notes on the following: (i) Hybrid Cloud (ii) Mobile Computing (iii)BYOD(MTP S-15) (iv) Web 2.0 (v) Green ITbestpractices(MTP O-15) (asked in may15 exams) 12.‘The work habits of computer users and businesses can be modified to minimize adverse impact on the global environment’. Discuss some of such steps, which can be followed for Green IT.(Or) what are your recommendations for efficient use of computer and IT resources to achieve the objectives of ‘Green Computing’?(RTP N-14)+ (MTP F-15)(asked in nov-14 exams) 13.Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are two of the three main categories of cloud computing. What's thethird category? Explain in brief. 14.Explain Web 2.0 with their applications. 15.ExplainMobile Computingand BYOD with an example. 16. What is Green Computing? Discuss security issues of Green computing in brief. 17.If you consider Web 2.0 as anideal platform for implementing and helping social networks to grow, what are the major components of Web 2.0?(RTP N-15) 18.What are the emerging threats under “Bring Your Own Device (BYOD)?(RTP M-16)+MTP S-15) (asked in nov-15 exams)(or)if theemployees of the company are allowed to use personal devices such as laptop, smart phones, tablets connect and access the data, what could be the security risks involved? Classify and elaborate such risks. 19.Life Cycle of SocialNetworks(MTP S-15) 20.Discussthe issues ‘Threshold Policy’ and ‘Interoperability’ in Cloud Computing.(MTP O-15) KEY TERMS: MTP = MOCK TEST PAPER O=OCTOBER A=APRIL F=FEB S=SEP AUG=AUGUST RTP = REVISION TEST PAPER M=MAY N=NOVEMBER

Trending Downloads

Trending Tags