📣 ISCA Important Revision Questions for Nov 2018
Note that these questions are only for second revision and students must not entirely rely on them and try covering full syllabus.
Also have a quick look at May 2018 and Nov 2016 RTPs.
Chapter 1:
#Benefits of GEIT
#Sources of IT Risk
#Clause 49
#Key Functions of IT Steering Committee
#Business Value from Use of IT
#Risk Management Strategies
#Five Principles of COBIT
#Seven Enablers of COBIT
Chapter 2:
#Transaction Processing System
#Explicit Vs Tactical Knowledge
#Any Four Characteristics of MIS
#Components of DSS
#Core Banking Systems
Chapter 3:
#Components of a Good Security Policy
#Impact of Technology on Internal Controls
#Preventive Vs Detective Controls
#Computer Crime Exposures
#Short note on Firewall, Encryption
#Backup Controls
#Boundary Controls
#Data Processing Controls
#Impact of Cyber Frauds on Enterprise
Chapter 4:
#Components of BCM Process
#Business Impact Analysis Matrix
#Reviewing BCM Arrangements
#Back Up Vs Recovery Plan
#Mirror Vs Incremental Backup
#Hot Site Vs Cold Site
Chapter 5:
#Strengths of the Prototyping Model
#Weaknesses in Waterfall Model
#Feasibility Study Dimensions in implementing SDLC
#Fact Finding Techniques
#Methods of Validating a Proposal in SDLC Implementation
#Characteristics of a Good Coded Application
#Black Box Vs White Box Testing
#Types of System Maintenance
#Auditor Role in SDLC
Chapter 6:
#Skill set of IS Auditor
#Risks in IT Audit
#ITF
#SCARF
#Audit of Environmental Controls
#Operational and Tactical Layers Issues in IT Audit
Chapter 7:
#PDCA
#Service Strategy in ITIL
#SEBI Annual System Audit
#Four Phases of ISMS
#Electronic Records Retention
#Short Note on 66D and 66F
Chapter 8:
#Cloud Computing Architecture
#Public Vs Private Cloud
#Advantages of Cloud Computing
#Demerits of Mobile Computing
#Advantages of BYOD
#Web 3.0
🔥 Join @cafinal_p6
Note that these questions are only for second revision and students must not entirely rely on them and try covering full syllabus.
Also have a quick look at May 2018 and Nov 2016 RTPs.
Chapter 1:
#Benefits of GEIT
#Sources of IT Risk
#Clause 49
#Key Functions of IT Steering Committee
#Business Value from Use of IT
#Risk Management Strategies
#Five Principles of COBIT
#Seven Enablers of COBIT
Chapter 2:
#Transaction Processing System
#Explicit Vs Tactical Knowledge
#Any Four Characteristics of MIS
#Components of DSS
#Core Banking Systems
Chapter 3:
#Components of a Good Security Policy
#Impact of Technology on Internal Controls
#Preventive Vs Detective Controls
#Computer Crime Exposures
#Short note on Firewall, Encryption
#Backup Controls
#Boundary Controls
#Data Processing Controls
#Impact of Cyber Frauds on Enterprise
Chapter 4:
#Components of BCM Process
#Business Impact Analysis Matrix
#Reviewing BCM Arrangements
#Back Up Vs Recovery Plan
#Mirror Vs Incremental Backup
#Hot Site Vs Cold Site
Chapter 5:
#Strengths of the Prototyping Model
#Weaknesses in Waterfall Model
#Feasibility Study Dimensions in implementing SDLC
#Fact Finding Techniques
#Methods of Validating a Proposal in SDLC Implementation
#Characteristics of a Good Coded Application
#Black Box Vs White Box Testing
#Types of System Maintenance
#Auditor Role in SDLC
Chapter 6:
#Skill set of IS Auditor
#Risks in IT Audit
#ITF
#SCARF
#Audit of Environmental Controls
#Operational and Tactical Layers Issues in IT Audit
Chapter 7:
#PDCA
#Service Strategy in ITIL
#SEBI Annual System Audit
#Four Phases of ISMS
#Electronic Records Retention
#Short Note on 66D and 66F
Chapter 8:
#Cloud Computing Architecture
#Public Vs Private Cloud
#Advantages of Cloud Computing
#Demerits of Mobile Computing
#Advantages of BYOD
#Web 3.0
🔥 Join @cafinal_p6