Saturday, January 29, 2011

ISCA - Chapter 5 : Scan of Past Questions with reference to Study Material - CA Final - Group II - Paper 6






CHAPTER
5

RISK
ASSESSMENT METHODOLOGIES APPLICATIONS

Scan
of Past Exam Questions:


Year

Marks

Questions

Answers in ICAI-ISCA Study Material Page
No:

N 08

10

5(a) Explain the following terms with
reference to Information Systems: (i) Risk, (ii) Threat, (iii)
Vulnerability, (iv) Exposure, (v) Attack

5.1-5.3

5

5(b) “There always exist some
common threats to the computerized environment”. Explain
these threats

5.3-5.4

5

5(c) What do you understand by
“Risk Assessment”? Discuss the various areas that
are to be explored to determine the risk?

5.5-5.7

J 09

5

3(c) “Always, there exists
some threats due to Cyber Crimes”. Explain these threats

5.4, 5.5

5

4(b) State and explain four commonly
used techniques to assess and evaluate risks

5.10, 5.11

N 09

5

2(b) Explain the threats due to Cyber
Crimes.

5.4, 5.5

5

3(b) Describe Risk Management Process

5.8

M 10

5

2(a) What are the common threats to the
computerized environment other than natural disasters, fire and power
failure?

5.3

5

5(a) What are the two primary questions
to consider when evaluating the risk inherent in a business function in
the context of the risk assessment methodologies? Give the purposes of
risk evaluation.

5.10





No comments: