Friday, 6 September 2013

Probable Question Paper

Question No. 1 is compulsory.
Attempt any five questions from the remaining six Questions.

1.          XYZ Ltd. is a leading company in FMCG sector and has a large number of coffee chains across India. The company uses ERP system for all its business operations and for recording sales at each outlet. The company has customized ERP, which is connected to a central server. The company’s new business models and new methods presume that the information required by the business managers is available all the time; it is accurate, it is reliable and no unauthorized disclosure of the same is made. Further, it is also presumed that the virtual business organization is up and running all the time on 24×7 basis. However, in reality, the technology-enabled and  technology-dependent organizations are more vulnerable to security threats in this highly connected world.

         Read the above carefully and answer the following:

a)     ‘What are the tasks that are required to be performed by XYZ ltd after implementation of ERP Package?
b)     ‘Access Control plays a key role in the implementation of information security policies’. What are the points to be taken into consideration while implementing such controls?

c)      What are the duties of certifying authorities as per Section 30 of Information Technology (Amendment) Act, 2008.

d)     What are the fundamental factors that must be considered while deciding type of storage backup media.  (5 × 4 = 20 Marks)

Question 2 :

a)     A Company is offering a wide range of products and services to its customers. It relies heavily on its existing information system to provide up-to-date information. The company wishes to enhance its existing system. You being an  information system auditor, suggest how the investigation of the present information system should be conducted so that it can be further improved upon.                       (8 Marks)

b)     State different categories of IS Audits?  (4 Marks )

c)      What is Digital Signature? How does the Information Technology (Amendment) Act 2008 enable the authentication of records using digital signatures? (4 Marks)


Question 3

a)     What are the major issues that should be addressed by an Information Security Policy. (4 Marks)
b)     Discuss the major strengths of agile methodologies. (4 Marks)
c)      What is Scarf ? What types of information is collected by using Scarf by the auditors ? (8  Marks)

Question 4
a)     Explain the term Systrust & Web trust along with the criteria’s specified by AICPA for practitioners engaged in such certifications ? ( 6 Marks)

b)     State the charters tics of Computer based information systems?  ( 5 Marks )

c)      Discuss the categories under which various strategies are made to manage the risk  ( 5 Marks)

Question 5
(a)   What is hacking? How does Hackers hack ? (6 Marks )
(b)   Discuss Final acceptance testing? (6 Marks)
(c) What does Single point failure mean? State the significance of Single point failure analysis?   (4 Marks )

Question 6
(a)   State the fundamental concepts related to CMM Model? (5 Marks)
(b)   What are the components of Expert System? (5 Marks)
(c)   What is meant by Asynchronous attacks? State different forms of Asynchronous attacks?    (6 Marks)

Question 7
Write short notes on any four of the following:  ( 4 x 4 = 16 M)
(a)   Objectives of BCP (4 Marks)
(b)   Powers of CAT        (4 Marks)
(c)   Compensatory control (4 Marks)
(d)   Delphi Technique ( 4 Marks)
(e)   HIPPA (4 Marks)

No comments:

Post a Comment

chapter 8

Download link :    Chapter 8     (password : isca)