Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Are Important For Exam Purpose. This Question Bank and Questions Marked Important Herein Are Just

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Dear Students,

This question bank has been designed to help you out for last minute preparation. Question given in bold
are important for exam purpose. This question bank and questions marked important herein are just
for revision purpose and student must cover complete syllabus. Also questions marked important herein
is purely based on my judgment and analysis and no assurance about exams.
Students can also use my ISCA LMR notes which covers complete ISCA in just 80 pages for revision
purpose.
1) What do you understand by GEIT? Also explain its key benefits
2) Discuss key governance practices for evaluating Risk Management.
3) Briefly explain various risk management strategies
4) Discuss the areas, which should be reviewed by internal auditors as a part of the review
of Governance, Risk and Compliance
5) What are key management practices for IT compliances
6) Discuss Various Key Management Practices for assessing and evaluating the system of
internal control.
7) Explain COBIT 5 reference model
8) What are components of COBIT 5
9) Discuss CoBIT 5 enablers.
10) What do you understand by TPS? Briefly discuss the components of TPS
11) Discuss major misconceptions about MIS
12) What do you understand by EIS? Discuss major characteristics of an EIS
13) ‘There are various constraints, which come in the way of operating an MIS’. Explain any
four such constraints in brief.
14) What are Pre-requisites of an Effective MIS.
15) What is OFFICE AUTOMATION SYSTEM (OAS)? Explain any 4 function of it.
16) Explain Components ERP.
17) Discuss benefits of ERP.
18) Discuss important characteristics of Computer based Information Systems.
19) What are the major characteristics of an effective MIS
20) What are the key components of a good security policy? Explain in brief.
21) Discuss five interrelated components of internal controls.
22) What do you understand by Boundary Controls? Explain major boundary control
techniques in brief.
23) Briefly explain major update and report controls with reference to database controls
in brief
24) Briefly explain major data integrity policies
25) What do you understand by asynchronous attacks? Explain various forms of
asynchronous attacks in brief

Prepared by CA. Kunal Agrawal :: Visit kunalsir.in for more updates


26) Discuss the three processes of Access Control Mechanism, when a user requests for
resources
27) While developing a Business Continuity Plan, what are the key tasks that should be
covered in the second phase ‘Vulnerability Assessment and General definition of
Requirement’?
28) Briefly explain advantages and disadvantages of various types of back-up
29) Discuss the goals BCP.
30) What are maintenance tasks undertaken in development of BCP
31) What are various phases of BCP
32) Explain in short BIA
33) Explain the set of skills that is generally expected of an IS auditor
34) What are the key steps that can be followed for a risk-based approach to make an audit
plan? Explain in brief
35) Describe major advantages of continuous audit techniques
36) Briefly explain CIS
37) Explain Snapshot technique. What are important considerations in this
38) Discuss accounting & operations audit trail in respect of Input Control
39) What do you mean by audit trail? Discuss objectives
40) Discuss need for audit of Information Systems
41) Discuss the objectives of Business Continuity planning.
42) How does the Information Technology Act 2000 enable the authentication of records
using digital signatures?
43) Discuss the ‘Use of Electronic Records in Government and its agencies’ in the light of
Section 6 of Information Technology Act 2000.
44) What is the vision of National Cyber Security Policy 2013? Also explain its major
objectives
45) What are the documents on this IT Act (Amendment), 2008 is not applicable.
46) What is ISO-27001? Discuss its benefits in brief.
47) Discuss the objectives of Information Technology Act, 2000
48) Discuss the major goals of Cloud Computing in brief.
49) Write threats emerging from BYOD
50) Explain implementation issues in cloud computing.
51) Differentiate between on-premises & outsourced private cloud.
52) Explain security issues in cloud computing.
53) Explain mobile computing benefits
54) Discuss benefits and challenges for social network using Web 3.0
55) Explain green IT best practices.
56) What are detective control? Discuss its characteristics.
57) Discuss section of Systems Requirement Specification (SRS) document.
58) Discuss the major concerns that an auditor should address in evaluating the
interpretation of programming management control.

Prepared by CA. Kunal Agrawal :: Visit kunalsir.in for more updates


59) Discuss audit report norms setup by SEBI for system control and audit.
60) Explain types of feasibility study in SDLC.
61) Discuss accounting and operations trails [chapter 6 full topic important]
62) Discuss major limitations of mobile computing.
63) Discuss various system changeover strategies under system implementation phase of
SDLC.
64) Discuss various issues that should be considered while designing system input.
65) Discuss various validation methods for approving the vendors’ proposal.

Prepared by CA. Kunal Agrawal :: Visit kunalsir.in for more updates

You might also like