Are Important For Exam Purpose. This Question Bank and Questions Marked Important Herein Are Just
Are Important For Exam Purpose. This Question Bank and Questions Marked Important Herein Are Just
Are Important For Exam Purpose. This Question Bank and Questions Marked Important Herein Are Just
This question bank has been designed to help you out for last minute preparation. Question given in bold
are important for exam purpose. This question bank and questions marked important herein are just
for revision purpose and student must cover complete syllabus. Also questions marked important herein
is purely based on my judgment and analysis and no assurance about exams.
Students can also use my ISCA LMR notes which covers complete ISCA in just 80 pages for revision
purpose.
1) What do you understand by GEIT? Also explain its key benefits
2) Discuss key governance practices for evaluating Risk Management.
3) Briefly explain various risk management strategies
4) Discuss the areas, which should be reviewed by internal auditors as a part of the review
of Governance, Risk and Compliance
5) What are key management practices for IT compliances
6) Discuss Various Key Management Practices for assessing and evaluating the system of
internal control.
7) Explain COBIT 5 reference model
8) What are components of COBIT 5
9) Discuss CoBIT 5 enablers.
10) What do you understand by TPS? Briefly discuss the components of TPS
11) Discuss major misconceptions about MIS
12) What do you understand by EIS? Discuss major characteristics of an EIS
13) ‘There are various constraints, which come in the way of operating an MIS’. Explain any
four such constraints in brief.
14) What are Pre-requisites of an Effective MIS.
15) What is OFFICE AUTOMATION SYSTEM (OAS)? Explain any 4 function of it.
16) Explain Components ERP.
17) Discuss benefits of ERP.
18) Discuss important characteristics of Computer based Information Systems.
19) What are the major characteristics of an effective MIS
20) What are the key components of a good security policy? Explain in brief.
21) Discuss five interrelated components of internal controls.
22) What do you understand by Boundary Controls? Explain major boundary control
techniques in brief.
23) Briefly explain major update and report controls with reference to database controls
in brief
24) Briefly explain major data integrity policies
25) What do you understand by asynchronous attacks? Explain various forms of
asynchronous attacks in brief