You are on page 1of 2

EXTRA ATTEMPT, NOVEMBER 2013 EXAMINATIONS

Tuesday, the 26th November 2013


ICMA. INFORMATION SYSTEMS AND
I.T. AUDIT – (ML-303)
Pakistan SEMESTER- 3

Time Allowed: 02 Hours 45 Minutes Maximum Marks: 90 Roll No.:

(i) Attempt all questions.


(ii) Answers must be neat, relevant and brief.
(iii) In marking the question paper, the examiners take into account clarity of exposition, logic of arguments,
effective presentation, language and use of clear diagram/ chart, where appropriate.
(iv) Read the instructions printed inside the top cover of answer script CAREFULLY before attempting the paper.
(v) DO NOT write your Name, Reg. No. or Roll No. anywhere inside the answer script.
(vi) Question No.1 – “Multiple Choice Question” printed separately, is an integral part of this question paper.
(vii) Question Paper must be returned to invigilator before leaving the examination hall.

MARKS
SECTION – “A”
Q.2 (a) Modern E-commerce architectures consist of a variety of complex integrated 06
components. Explain four significant components of e-commerce architecture.

(b) E-businesses use a variety of computer hardware architectures. These computers are 09
used both at client and service provider end. Explain any three types of computers
based on their processing power, size, and architecture.

Q.3 (a) There are three major forms of organizational alignment for project management 06
within a business organization. Discuss each.

(b) Problem management is one of the key functions of information system operations. 09
Discuss three important duties of IS manager with respect to the problem
management function.

Q.4 (a) Information system development may involve developing a new system or modifying 05
the existing one. In either case, IS management is required to prepare various types of
feasibility studies. What are the five important functions of IS auditor while analyzing
these feasibility studies?

(b) There exists a variety of models of databases used in information systems today. 10
Explain any five key features of network database model and relational database
model.

SECTION – “B”
Q.5 (a) A risk-based audit approach is usually adopted to develop and improve the continuous 10
IS audit process. Explain five stages of risk-based audit approach.

(b) Steering Committees play a strategic role in information systems management and 05
ensure that IS department is in harmony with the corporate mission and objectives.
List five primary functions performed by the Steering Committee.

PTO

1 of 2 ISITA/E-Attempt.2013
MARKS

Q.6 (a) Data conversion is a significant activity in information system development life cycle. 05
Explain five significant points to be considered in a data conversion project.

(b) System development life cycle (SDLC) approach doesn’t guarantee successful 06
completion of IS development project. This involves a magnitude of risk that needs to
be controlled. Explain six responsibilities of IS auditor to control risks of inadequate
system development life cycle.

Q.7 (a) Firewalls generally act as a first line of defence in securing corporate internal networks 09
from external threats. List six general features of firewalls. Also list three problems
faced by organizations after implementing firewalls.

(b) The IS processing insurance policy is usually a multi-tiered policy designed to provide 10
various types of IS risk coverage. Explain five types of coverage provided in IS
processing insurance policy.

THE END

2 of 2 ISITA/E-Attempt.2013

You might also like