Wednesday, September 17, 2008

CA Final - MICS - MAY 2008 - Question Paper - Solved

Question No. 1 is Compulsory. Answer any four questions from the remaining six questions (Answers in ICAI MICS Study Material Page No are given at the end of each question)

1(a) Discuss various factors that render manual audit method ineffective in IS Audit? - 17.2
1(b) Briefly explain the components of an analysis and design work bench? - 19.9
1(c) Briefly discuss any five database control features? - 13.8; 13.9
1(d) Discuss briefly the powers of Central Government under Section 87 to make rules in respect of Information technology Act, 2000? - 16.19 (5 x 4 = 20 Marks)

2(a) What is Work-in-Process Control System? Describe briefly the system interfaces, files and inputs and reports involved in this system? (10) - 11.40
2(b) Describe the main prerequisites of a MIS which makes it an effective tool. Explain the major constraints in operating? (10) - 3.6

3(a) Discuss in detail, how the investigation of present system is conducted by the system analyst? (10) - 7.25; 7.26
3(b) Briefly explain various kinds of controls that can be incorporated in the system to make frauds difficult to perpetrate? (10) - 15.13

4(a) Briefly explain the characteristics and features of an Enterprise Resource Planning? (5) - 12.5
4(b) Briefly discuss four basic components of Decision Support System? (5) - 5.5
4(c) Define the following computer fraud and abuse technique: (10)
o War dialing - 15.11
o Scavenging - 15.10
o Cracking - 15.9
o Internet Terrorism - 15.9
o Masquerading - 15.10

5(a) Discuss various issues that should be considered while designing system input? (5) - 8.14
5(b) Briefly explain the risks associated with client/server model? (5) - 6.9
5(c) “Personnel Information System deals with flow of information relating to people” Explain? (5) - 4.24
5(d) Briefly describe various steps involved in system testing? (5) - 9.21

6(a) Briefly explain the best approach to implement information security policy? (5) - 18.12
6(b) What is the purpose of System Evaluation? How is it performed? (5) - 10.9
6(c) Discuss, how a controlled source program library environment can help to deter unauthorized changes to program? (5) - 13.20
6(d) Briefly explain the role of Information Security Administrator? (5) - 18.20

Question 7: Write short notes on the following: (4 x 5 = 20 Marks)
7(a)
Closed and Open Systems - 1.5
7(b) Programmed Decisions - 3.13
7(c) Program Documentation - 9.16
7(d) Firewalls - 13.30

No comments: