DOWNLOAD LINK
SKIP AD AFTER 5 SEC AND PROCEED TO DOWNLOAD PAGE
INSERT YOUR E-MAIL ID ON TOP RIGHT OF THE PAGE TO GET UPDATES DIRECTLY IN YOUR MAIL BOX
DOWNLOAD LINK
SKIP AD AFTER 5 SEC AND PROCEED TO DOWNLOAD PAGE
INSERT YOUR E-MAIL ID ON TOP RIGHT OF THE PAGE TO GET UPDATES DIRECTLY IN YOUR MAIL BOX
SKIP THE AD IN 5 SEC TO GO TO DOWNLOAD PAGE
ENTER YOUR EMAIL ID IN TOP RIGHT COLUMM TO RECEIVE UPDATES AND NOTES DIRECTLY ON YOUR MAIL BOX
DOWNLOAD LINK
Skip the after 5seconds to reach download page
INSERT YOUR E-MAIL ID ON TOP RIGHT OF THE PAGE TO GET UPDATES DIRECTLY IN YOUR MAIL BOX
Chapter 1 : Concepts of Governance and MIS [ Probable weight age : 8-12 Marks ]
- Governance dimensions
- What is IT Governance and explain its benefits .
- 5 Internal control components [ COSO framework ] – V.imp .
- Steps to be followed for aligning IT Strategy with Enterprise Strategy
- Definitions of Risk ,Threat , Vulnerability , Threats likelihood , Exposure , Countermeasure .
- 5 Risk management strategies .
- COBIT 5.0 , Benefits of COBIT , 5 Principles of COBIT [ V.IMP] and
- 7 Enablers of COBIT .
Chapter 2 : IS Concepts [ Probable weight age : 10-15 Marks ]
- Types of System .
- Information and its Attributes .
- Components of CBIS
- Charters tics of CBIS .
- What is TPS and explain its features .
- What is MIS ,
- Misconceptions of MIS ,
- Characteristics of MIS ,
- Constraints in operating MIS
- limitations of MIS .
- Characteristics of Decision support system ?
- Contents of EIS / Guidelines to Design the EIS .
- Explain the features of email .
- Benefits of expert system
- Properties that a potential system should possess to qualify for an Expert system ?
- Knowledge which an manager should possess to operate IS effectively and efficiently? [ V. IMP ]
Chapter 3 : Protection of IS [ Probable weight age : 10-15 Marks ]
- What is Risk and why do Gap arise ?
- Objectives of IS Security [ June 2014 - 4 Marks]
- What is IS Policy and what are its contents [ Imp ]
- Types/ Hierarchy of IS Policy
- Effect of Computer / technology in Internal control
- What is meant by compensatory control
- What is Boundary control and explain different boundary control techniques .
- Explain Control over Data Integrity [ Information classification , categories and policies ] – imp.
- Logical access paths
- What are the different types of
- Technical exposures if logical access controls are absent
- Computer crime exposures if logical access controls are absent
- Asynchronous attacks
- Techniques to commit cyber frauds . [ Short question ]
Chapter 4 : BCP & DRP [ Probable weight age : 6-10 Marks ]
- What is meant by BCM ? Explain the terms associated with BCM .
- BCP Manual ?
- Advantages of Business continuity .
- BCP Policy ? Objectives of BCP policy ? [ V. Imp]
- What is meant by BCP ? Areas covered by BCP .
- Objectives and Goals of BCP ?
- What is BIA ?
- Discuss Test plan ?
- Alternate processing facilities arrangements ? [ Imp ]
- Types of Backup
Chapter 5 : Acquisition , development and implementation of IS [ PW : 15-20 Marks ]
- Reasons for failure of System development activity ?
- Discuss System development methodology ?
- 6 approaches for System development [ Most imp : Prototype , RAD & Spiral ]
- What are the points to be addressed in Delineation of Scope ?
- Fact finding technique ? [ Hint : Phase 2 ]
- What are Points to addressed while analyzing Present system ? [ V. Imp]
- What is meant by SRS ? Explain its contents ? [ June 2014]
- What is meant by Data Dictionary ?
- Designing System output & System Input ? [ V. Imp]
- 4 Design Principles ? [ Short note ]
- Methods for Validation Vendors Proposal ? [ Hint : 5 Methods discussed in Phase 4 ]
- Characteristics of good Coded Program ? [ Imp ]
- Total testing phase [ Phase 5 ] is important . [ Contains Unit
testing , Integration testing ,System testing and User acceptance
testing]
- What are the activates involved in System conversion ? [ Hint : 4 activities discussed in Phase 6 ]
- System implementation conversion strategies ?
- What is PIR ? Methods ?
- System maintenance and its types [ June 2014 ]
Chapter 6 : Auditing of IS [ Probable weight age : 10-15 Marks ]
- Need for Audit of IS ?
- Effect of computers on Audit ?
- Skill set that an IS auditor should possess for Auditing IS environment ? [ V. Imp]
- Categories of IS Audit ?
- Steps in IT Audit ?
- Categories of Risk [Hint : Inherent Risk , Control Risk , Detection Risk ] – [ V. Imp]
- 4 different types of Audit tools [Hint : Snapshot , ITF , SCARF , CIS ] – [ V. Imp]
- Advantages and disadvantages of Continuous Auditing ?
- Audit trial and its Objectives ?
- What are the task performed by OS or Importance of OS ? – [ V. Imp]
- Discuss Various Backup Strategies ?
- Discuss System development Control [ Hint : 4th General control ]
- Internet and Intranet control ?
- Processing Control ? [ Hint : 2nd Application control ]
Chapter 7 : Information Technology Regulatory Issues [ Probable weight age : 10-15 Marks ]
- Objectives of IT Act , 2000
- Exceptions to Cyber law
- Section 3 , 4 , 5 , 6, 7 , 8, 9 [ Section 7 - V. IMP ] 4. Section 43 , 66A , 66F , 69 , 76 , 75 , 85
- Requirement criteria for System Audit [ IRDA , RBI , SEBI ]
- Cyber Forensic Audit
- 4 Phases of ISMS
- Key benefits of ISO 27001
- Reasons why a company should adopt ISO 27001 [ V.IMP ]
- ITIL [ V.IMP ]
Chapter 8 : Emerging Technologies [ Probable weight age : 10-15 Marks
- What is Cloud computing , Issues with Cloud computing [ V.IMP] ,
Goals and Objectives , Cloud computing environment , IAAS , PAAS , SAAS ,
Characteristics of Cloud computing , and Challenges relating to cloud
computing . [ In short : All questions of cloud computing are important ]
- BYOD and emerging BYOD Threats ?
- What is Web 2.0 and what are its components ?
- Green IT ? Steps to be followed for effective utilization of computing resource