Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Ics2403:Distributed Systems Question Paper

Ics2403:Distributed Systems 

Course:Bachelor Of Information Technology

Institution: Meru University Of Science And Technology question papers

Exam Year:2011




a. Briefly explain the functions of ISACA in IS auditing. (4 Marks)
b. of an IS auditor. (10 Marks)
c. Explain the concept of IT governance stating areas of great concern covered therein. (6 Marks)
d. Explain the following terms as used in IT auditing: (4 Marks) i. Materiality ii. Self assessment audit iii. Work papers iv. Service legal agreement
e. While designing the Business Continuity Plan (BCP) for a university system there are some appropriate method of data transfer/backup of an offsite would be: (6 Marks) i. Electronic vaulting ii. Hard disk mirroring iii. Hot site provisioning
Discuss each and give an example where possible
2
QUESTION TWO – 20 MARKS
a. Discuss five situations which may require the use of computer forensics when performing IS audit. (5 Marks) b. Briefly state the difference between Risk Analysis and Risk Management. (4 Marks) c. Explain the term COBIT as used in IS audit. Briefly explain the four domains with relevant examples. (7 Marks) d. List any four benefit of IS audit. (4 Marks)
QUESTION THREE – 20 MARKS
a. Briefly state three characteristics of an information system auditor. (3 Marks) b. Discuss the concept of control self assessment (CSA) and state why it is relevant to IS audit. (5 Marks) c. You have been appointed as the head auditor in an organization that has a scandal. Assuming computer systems were used when committing the crime, outline an acceptable evidence gathering process you would adopt maintaining all acceptable guidelines. (5 Marks) d. Explain what internal control is? Name three objectives of internal controls. (5 Marks) e. Describe the significance of risk analysis to an IT auditor. (2 Marks)
QUESTION FOUR – 20 MARKS
a. Describe four of the main categories of computer crimes. (4 Marks) b. Outline the steps which an IS auditor may perform to ascertain that companies comply with external operations statues as outlines by the government or international bodies. (5 Marks) c. Discuss the term fraud and outline how an IS auditor can detect frauds within an organization. (5 Marks) d. Briefly explain the roles of an auditor would play in the various levels of system development. (6 Marks)
QUESTION FIVE – 20 MARKS
a. State five reasons why auditors use audit samples. (5 Marks) b. Discuss the three common forms of ownership for intellectual property listed below: (6 Marks) i. Copyright ii. Patents iii. Trade secrets c. Biometric system are broadly classified under two categories: physiological and biological characteristics. Discuss any three of each of the categories and how they apply in IT environment. (9 marks)






More Question Papers


Popular Exams



Return to Question Papers