*******CA FINAL ISCA GUESSWORK……… DEAR STUDENTS….I HAVE ALREADY MAILED U THE GUESS OF ISCA AROUND 1 MONTH BACK….. OUT OF THOSE…. U MUST REVISE…..*************
PUT MAXIMUM{{{{{{{{ 3-3.5 }}}}}} HOURS ON RTP, MODEL TEST PAPER AND FOLLOWING………..
NOTE- ****** DO WHATSOEVER U WOULD BE DOING****** BESIDES THIS********
Ch-1
(1) 5 characterstic of EIS
2)HOW CAN U DESIGN ( CHAPTER- 2) AND IMPLEMENTATION OF DATABASE ( CH-1) UNDER DSS
3) Types of System (4) Transaction Processing System (TPS)? Explain important features of a TPS.
misconceptions about MIS (5) set of principles to guide the design of measures and indicators to be included in an EIS
chapter-2
(1) Agile Vs Waterfall (2) feasibility study of preliminary investigation (3) Design- Dataflow (4) Case Tool / Data Flow Diagram (5) where source code is examined/ not examined ( unit testing)
Chapter- 3
(1) Logical access control/issues and path
(2) Control objective
a. Data integrity/ privacy policy & methods
b. Internal control audit concepts
c. PCI Policies / DES / Antivirus method.
d. auditor’s role in authorization controls
e. Corrective Controls
CHAPTER:4
a. CIS Advantage/ disadvantage
b. IS Audit effectiveness & control
c. Resources of LAN
d. continuous auditing techniques, advantage and disadvantage.
CHAPTER: 5
(1) RISK
a. Risk management cycle – 5 strategies in risk development ( revised in Nov 12)
b. Delphi approach of risk evaluation
CHAPTER: 6
a. Methodology & methods of disaster recovery / Business continuity plan
b. ERP post implements- Dilues, expectation, Fear / Risk & issues
c. tasks to be undertaken in ‘Vulnerability assessment and definition of requirement’ phase of a Business Continuity Plan
d. Risk issues and governance
CHAPTER: 8
(1) COBIT 5 – benefit, Enables, principles / SA 402 / COCO / ISMS/ISO 27001, infrastructure liability- version 3
CHAPTER: 9
(1) Information protection rules methods & IS AUDIT REPORT
CHAPTER: 10
(1) DIGITAL SIGNATURE SECTIONS
Sec 3,7,10,14,15
Penalties- sec 43,44,45
Offences- sec 66 to 72
SHORT NOTES
(a) Weaknesses of Spiral Model
(b) Data Dictionary
(c) Cryptosystem
(d) Test Plan
(e) Cold Site and Hot Site
(f) Final Acceptance Testing
(h) Level 1- Initial Level of CMM