100% found this document useful (1 vote)
94 views3 pages

IT Governance and Audit Question Bank

This document provides a question bank to help students prepare for their exam. Questions marked in bold are important for the exam. The questions provided cover topics like GEIT, risk management strategies, areas reviewed by internal auditors, COBIT 5, business continuity planning, information system auditing, management information systems, information technology act, and cyber security. However, students are advised to cover the complete syllabus and not focus only on the questions marked as important.

Uploaded by

Rishab Maloo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
94 views3 pages

IT Governance and Audit Question Bank

This document provides a question bank to help students prepare for their exam. Questions marked in bold are important for the exam. The questions provided cover topics like GEIT, risk management strategies, areas reviewed by internal auditors, COBIT 5, business continuity planning, information system auditing, management information systems, information technology act, and cyber security. However, students are advised to cover the complete syllabus and not focus only on the questions marked as important.

Uploaded by

Rishab Maloo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Dear Students,

This question bank has been designed to help you out for last minute preparation. Question given in bold
are important for exam purpose. This question bank and questions marked important herein are just
for revision purpose and student must cover complete syllabus. Also questions marked important herein
is purely based on my judgment and analysis and no assurance about exams.
Students can also use my ISCA LMR notes which covers complete ISCA in just 80 pages for revision
purpose.
1) What do you understand by GEIT? Also explain its key benefits
2) Briefly explain various risk management strategies
3) Discuss the areas, which should be reviewed by internal auditors as a part of the review
of Governance, Risk and Compliance
4) What are key management practices for IT compliances
5) Explain COBIT 5 reference model
6) What are components of COBIT 5
7) Explain area to be reviewed by internal auditors for GRC
8) While developing a Business Continuity Plan, what are the key tasks that should be
covered in the second phase ‘Vulnerability Assessment and General definition of
Requirement’?
9) Briefly explain advantages and disadvantages of various types of back-up
10) A company has decided to outsource its recovery process to a third party site. What
are the issues that should be considered by the security administrators while drafting
the contract?
11) Discuss the goals BCP.
12) What are maintenance tasks undertaken in development of BCP
13) What are various phases of BCP
14) Explain in short BIA
15) Explain the set of skills that is generally expected of an IS auditor
16) What are the key steps that can be followed for a risk-based approach to make an audit
plan? Explain in brief
17) Describe major advantages of continuous audit techniques
18) Briefly explain CIS
19) Explain Snapshot technique. What are important considerations in this
20) Discuss accounting & operations audit trail in respect of Input Control
21) What do you mean by audit trail? Discuss objectives
22) Discuss need for audit of Information Systems
23) What do you understand by TPS? Briefly discuss the components of TPS
24) Discuss major misconceptions about MIS
25) What do you understand by EIS? Discuss major characteristics of an EIS

Prepared by CA. Kunal Agrawal :: Visit kunalsir.in for more updates


26) ‘There are various constraints, which come in the way of operating an MIS’. Explain
any four such constraints in brief.
27) What are Pre-requisites of an Effective MIS.
28) What is OFFICE AUTOMATION SYSTEM (OAS)? Explain any 4 function of it.
29) Explain Components ERP.
30) Discuss the objectives of Business Continuity planning.
31) What are the key components of a good security policy? Explain in brief.
32) Discuss five interrelated components of internal controls.
33) What do you understand by Boundary Controls? Explain major boundary control
techniques in brief.
34) Briefly explain major update and report controls with reference to database controls
in brief
35) Briefly explain major data integrity policies
36) What do you understand by asynchronous attacks? Explain various forms of
asynchronous attacks in brief
37) Discuss the three processes of Access Control Mechanism, when a user requests for
resources
38) How does the Information Technology Act 2000 enable the authentication of records
using digital signatures?
39) Discuss the ‘Use of Electronic Records in Government and its agencies’ in the light of
Section 6 of Information Technology Act 2000.
40) What is the vision of National Cyber Security Policy 2013? Also explain its major
objectives
41) What are the documents on this IT Act (Amendment), 2008 is not applicable.
42) What is ISO-27001? Discuss its benefits in brief.
43) Discuss the objectives of Information Technology Act, 2000
44) Discuss the major goals of Cloud Computing in brief.
45) Write threats emerging from BYOD
46) Explain implementation issues in cloud computing.
47) Differentiate between on-premises & outsourced private cloud.
48) Explain security issues in cloud computing.
49) Explain mobile computing benefits
50) Discuss benefits and challenges for social network using Web 3.0
51) Explain green IT best practices.
52) Discuss important characteristics of Computer based Information Systems.
53) What are detective control? Discuss its characteristics.
54) Discuss section of Systems Requirement Specification (SRS) document.
55) Discuss the major concerns that an auditor should address in evaluating the
interpretation of programming management control.
56) Discuss audit report norms setup by SEBI for system control and audit.
57) Discuss key governance practices for evaluating Risk Management.

Prepared by CA. Kunal Agrawal :: Visit kunalsir.in for more updates


58) Discuss benefits of ERP.
59) What are the major characteristics of an effective MIS
60) Explain types of feasibility study in SDLC.
61) Discuss accounting and operations trails [chapter 6 full topic important]
62) Discuss major limitations of mobile computing.

Prepared by CA. Kunal Agrawal :: Visit kunalsir.in for more updates

You might also like