FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download GTU MBA 2019 Summer 4th Sem 2840401 Information System Audit And Control Question Paper

Download GTU (Gujarat Technological University) MBA (Master of Business Administration) 2019 Summer 4th Sem 2840401 Information System Audit And Control Previous Question Paper

This post was last modified on 19 February 2020

GTU MBA Last 10 Years 2010-2020 Question Papers || Gujarat Technological University


FirstRanker.com

Firstranker's choice

Seat No.: Enrolment No.

--- Content provided by​ FirstRanker.com ---

Subject Code: 2840401

GUJARAT TECHNOLOGICAL UNIVERSITY

MBA — SEMESTER 4 EXAMINATION - SUMMER 2019

Subject Name: Information System Audit and Control

Time: 10:30 AM To 01:30 PM

--- Content provided by⁠ FirstRanker.com ---

Date: 04/05/2019

Total Marks: 70

Instructions:

  1. Attempt all questions.
  2. Make suitable assumptions wherever necessary.
  3. --- Content provided by‌ FirstRanker.com ---

  4. Figures to the right indicate full marks.

Q.1 (a) Answer the following multiple choice questions: 06

  1. IT access is not controlled or regulated though password it indicates
    1. Poor security control
    2. High risk of system getting hacked
    3. High risk of the system getting breached
    4. --- Content provided by⁠ FirstRanker.com ---

    5. All of the above
  2. Which is not the purpose of Risk analysis?
    1. It supports risk based audit decisions
    2. Assists the Auditor in determining Audit objectives
    3. Ensures absolute safety during the Audit
    4. --- Content provided by‌ FirstRanker.com ---

    5. Assists the Auditor in identifying risks and threats
  3. Which phase of hacking performs actual attack on a network or system?
    1. Reconnaissance
    2. Maintaining Access
    3. Scanning
    4. --- Content provided by⁠ FirstRanker.com ---

    5. Gaining Access
  4. While reviewing the network management and control the IT auditor is required to
    1. Review the security and controls in non-financial systems
    2. Review the security and controls in financial system
    3. Either (a) or (b) depending-upon scope of audit and SAT’s mandate
    4. --- Content provided by⁠ FirstRanker.com ---

    5. None of the above
  5. CAN is known as .
    1. Campus Area Network
    2. Canteen Acre Network
    3. Campus Authorization Node
    4. --- Content provided by​ FirstRanker.com ---

    5. None of the above
  6. A higher risk of system violation happens where
    1. The audit module is not operational
    2. The audit module has been disabled
    3. The audit module is not periodically reviewed
    4. --- Content provided by‍ FirstRanker.com ---

    5. All of the above

Q.1 (b) Define following terms briefly: 04

  1. Testing
  2. Information System
  3. --- Content provided by‌ FirstRanker.com ---

  4. Check Digit
  5. QA

Q.1 (c) Briefly explain the benefits of Business Process Reengineering. 04

Q.2 (a) Explain Personal Identification Number (PIN) in detail. 07

(b) What is database integrity? Explain how to maintain database integrity. 07

--- Content provided by‌ FirstRanker.com ---

OR

(b) Describe the need for control & audit of computers. 07

Q.3 (a) What are major information security threats and what are remedial measures? 07

(b) Write short note on various utility software. 07

OR

--- Content provided by​ FirstRanker.com ---

(a) Explain Program Development Life Cycle. 07

(b) Write down short note on: Programme Testing 07

Q.4 “Generalized audit software is less effective then specific software”- Explain this sentence and also write brief note on generalized audit software. 07

Q.5 (a) Explain digital signature in detail. 07

OR

--- Content provided by FirstRanker.com ---

(b) Write Short notes on:

  1. Wide area network topologies
  2. Local area network topologies

What is access control? Explain functions and mechanism and policies of access control. 07

Discuss the given case study with answers of following questions. 14

--- Content provided by‌ FirstRanker.com ---

Data Mining tool @ Pandora Radio

With more than 80 million registered users, Pandora Radio is a personalized Internet radio service that helps you find new music based on your past and current favorites (The service is also available to mobile devices- as an app for Blackberry or the iPhone).

The success of Pandora Radio’s business model derives from applying data-mining tools to the Music Genome Project, which is a vast database of songs that a team of experts has broken down into their various components: melody, rhythm, vocals, lyrics, and so on. Listeners begin by entering their favorite songs, artists, or genres, creating customized “stations”. Then, Pandora Radio mines its database to find songs that are similar.

Another data-mining tool that Pandora users is the like/dislike (thumbs up/thumbs down) option that accompanies each song the site suggests. These responses are also factored into which songs the Web site decided to play for the user.

Questions:

--- Content provided by‌ FirstRanker.com ---

(a) How are listeners able to create their own customized stations?

(b) What are some variables that Pandora Radio uses to recommend a song?

OR

Discuss the given case study with answers of following questions. 14

Cereal products & BPR

--- Content provided by‍ FirstRanker.com ---

The process of transforming food into cereal products begins on the farm with the harvest. This is followed by primary processing, packing and transportation to the processing plants (depending on the grain).

This large company analyzed its process and discovered a serious logistical problem. It lost almost 20% of the grains harvested during transportation from farms to the factories, located near the biggest consumption centers, due to the precariousness of the roads.

After a study, this Business Process Reengineering case came to the conclusion that it would be more profitable to move the factories nearer to the farms. Afterwards, they transport final products to large centers with much fewer losses.

Questions:

(a) According to you, what were list of problems associated with the operations of above said company?

--- Content provided by FirstRanker.com ---

(b) If you were the manager of the firm, discuss how business process reengineering can be benefited to above company? List out various options to overcome problems with implementation of BPR.



This download link is referred from the post: GTU MBA Last 10 Years 2010-2020 Question Papers || Gujarat Technological University

--- Content provided by‌ FirstRanker.com ---