CHAPTER
5
5
RISK
ASSESSMENT METHODOLOGIES APPLICATIONS
ASSESSMENT METHODOLOGIES APPLICATIONS
Scan
of Past Exam Questions:
of Past Exam Questions:
Year | Marks | Questions | Answers in ICAI-ISCA Study Material Page No: |
N 08 | 10 | 5(a) Explain the following terms with reference to Information Systems: (i) Risk, (ii) Threat, (iii) Vulnerability, (iv) Exposure, (v) Attack | 5.1-5.3 |
5 | 5(b) “There always exist some common threats to the computerized environment”. Explain these threats | 5.3-5.4 | |
5 | 5(c) What do you understand by “Risk Assessment”? Discuss the various areas that are to be explored to determine the risk? | 5.5-5.7 | |
J 09 | 5 | 3(c) “Always, there exists some threats due to Cyber Crimes”. Explain these threats | 5.4, 5.5 |
5 | 4(b) State and explain four commonly used techniques to assess and evaluate risks | 5.10, 5.11 | |
N 09 | 5 | 2(b) Explain the threats due to Cyber Crimes. | 5.4, 5.5 |
5 | 3(b) Describe Risk Management Process | 5.8 | |
M 10 | 5 | 2(a) What are the common threats to the computerized environment other than natural disasters, fire and power failure? | 5.3 |
5 | 5(a) What are the two primary questions to consider when evaluating the risk inherent in a business function in the context of the risk assessment methodologies? Give the purposes of risk evaluation. | 5.10 |
No comments:
Post a Comment