CA Inter - EIS - Hemang Doshi
CA Inter - EIS - Hemang Doshi
com/read/enterprise-information-system
CA - Intermediate
1
More practice questions available at www.caintereis.blogspot.com
Complete book is available at https://notionpress.com/read/enterprise-information-system
TABLE OF CONTENTS
PREFACE 5
INFORMATION SYSTEMS 57
COMPONENTS OF INFORMATION SYSTEMS 58
INFORMATION SYSTEMS’ CONTROLS 66
CLASSIFICATION OF INFORMATION SYSTEM CONTROLS 66
INFORMATION SYSTEMS AUDITING 75
AUDIT TRAIL 78
ORGANIZATION STRUCTURES & RESPONSIBILITIES 79
SEGREGATION OF DUTIES 81
MCQ TYPE QUESTIONS 82
ANSWER TO MCQS (CHAPTER-3) 90
3
More practice questions available at www.caintereis.blogspot.com
PREFACE
To get the good score in EIS, 2 things are very important. First is to understand the concept and second is to
present the same in the exam. This book takes care of both the aspects.
Following features of the book makes it unique study guide for EIS:
Aligned as per ICAI Module.
Covers revised syllabus of ICAI.
Simple & lucid language.
Question-Answer format as per ICAI expectations.
More than 200 MCQs as per revised exam pattern.
Use of SmartArt for Memory Aid.
Topics have been profusely illustrated with diagrams and examples to make the concept more
practical and simple.
We will highly appreciate the feedback and suggestions for further improvement of the book. Contact us at
career@infosec-career.com. To practice more MCQ questions please visit www.caintereis.blogspot.com
About Authors
CA.Hemang Doshi
Hemang is an associate member of ICAI. He has about 10 years of experience in the field of system
controls, audit and risk management. He is a CISA (Certified Information System Auditor) from ISACA and
DISA (Diploma in Information System Auditor) from ICAI. He is a fellow member of the Insurance Institute
of India.
Madhukara HS, CISA, CISM, CRISC, ISO 27001 LA and LI
Madhukara HS is an audit and information security professional with over 10 year experience in BFSI and
manufacturing industries. He has industry recognized certifications like CISA, CISM, CRISC, ISO 27001 Lead
Auditor and Lead Implementer from various professional bodies like ISACA, IRCA and PECB.
Acknowledgment:
CA.Hemang Doshi
I would like to express my gratitude to:
My parents (late) Hasmukh Doshi and Jyoti Doshi for their blessings & guidance in every phase of
my life.
My wife Namrata Doshi for her constant support, suggestion and encouragement in every aspect of
my life. My darling daughter, Jia for allowing me to complete this book.
My sister Pooja Shah and brother-in-law Hiren Shah for their invaluable advice and motivation and
nephew Phenil for always enhancing my knowledge-base.
Madhukara H S
I would like to express my gratitude for:
My parents Mr. Shrungeshwara and Mrs. Gayathri for their blessings.
My wife Mrs. Madhura for inspiring always, and my one-year-old daughter Pranamya for allowing
me to contribute for this book.
5
More practice questions available at www.caintereis.blogspot.com
(2) What are the objectives of Business Process Automation? / Recognize the parameters based on which
success of business process automation (BPA) can be evaluated?
Answer: The success of any business process automation shall only be achieved when BPA
ensures the following:
Confidential
Integrity
(1) Confidentiality: To ensure confidentiality of data. Only authorized person can access the data.
(2) Integrity: To ensure integrity (i.e. correctness) of the data. No unauthorized changes can be done.
(3) What are the benefits of automating business processes? (May 19)
Automation eliminates unnecessary tasks and improves operational performance and reduces the
turnaround times for processes.
(6) Reduced Cost:
Automation ensures optimum utilization of resources and hence costs associated with processes
are reduced. Comparatively, manual task is performed at a slower rate and costlier.
Answer: Following are the steps involved in implementing business process automation:
Steps Details
Step 1: Justify the Requirement First step is any automation process is to justify the requirement
for BPA (i.e. why BPA?) of automation.
Automation may be required to reduce errors or improving TAT
or streaming the process or to improve customer service or
combination of all.
Step 2: Understand various Organisation need to ensure that BPA adheres to the
regulations applicable to the requirement of all application laws and regulations.
organisation. (i.e. Which
regulations?)
Step 3: Document the current In third step, it is required to document current process (which
process. is to be automated).
Documentation provides clarity on the process and helps to
focus on desired result with automation.
Step 4: Define goals of BPA. In fourth step, organisation needs to determine key objectives
and goals.
Goals should be SMART in the sense that it should be specific,
measurable, achievable, realistic and time-bound.
Step 5: Appoint an expert i.e. Expert consultant for automation to be engaged after due
business process consultant consideration.
Capability, expertise and experience of consultant to be
evaluated before engagement.
Step 6: Calculate ROI for the ROI to be calculated and communicated to senior management
project. for approval of automation.
All the stakeholders to be engaged and involved to ensure that
Complete book is available at https://notionpress.com/read/enterprise-information-system
(8) Monitoring:
ERM system should be monitored and modified, if required.
Answer:
Risks
(9) Define Risk?
Answer:
Risk is defined as an event that may have impact on the business objective.
Degree of risk is determined on the basis of probability of the occurrence and severity of the
impact.
In simplest form, Risk is the product of Probability & Impact i.e. Risk= P * I
11
More practice questions available at www.caintereis.blogspot.com
(11) How the inherent risks involved in BPA can be classified? Discuss any four. (Nov 19 - 2 Marks)
Answer: Following are some of the risks associated with business process automation:
(3) Inaccurate Processing: Risk of inaccurate processing due to program error or bug.
(5) Unauthorized Data Access: Risk of unauthorised modification of master data due to weak access
control.
(6) Inappropriate Infrastructure: Risk of data loss in absence of proper back-up arrangement.
(1) Strategic Risk: Risk that prevents organisation to achieve its strategic objectives.
(2) Financial Risk: Risk that have impact of financial losses i.e. loss of assets.
(3) Operational Risk: Risk that disrupts the efficient and effective operations of the organisation.
(4) Regulatory/Compliance Risk: Risk that amount to non-compliance with laws and regulation and results
into fines and penalties.
(5) Reputational Risk: Risk that have impact of negative publicity of the organisation.
Answer:
Internal Control System means all policies and procedure put in place by management to ensure
that objective of the organisation is achieved.
Internal Control System aims to ensure adherence to management policies, efficient conduct of
business, safeguarding of assets, prevention and detection of fraud and error and accurate
accounting and financial records.
Answer: The five components of Internal Control (as per SA 315) are as follow:
Answer: Internal control systems are subject to certain inherent limitations which are listed below:
(1) Cost of Internal Control: Absence of relevant data to ensure that cost of control do not exceed cost of
expected benefit.
(2) Human Error: Chances of human errors such as mistakes, negligence, carelessness and
misunderstanding.
(3) Unusual transactions: Internal controls do not tend to address unusual transactions.
13
More practice questions available at www.caintereis.blogspot.com
(4) Collusion: Collusion within employees or other parties can override internal controls.
(5) Abuse of Responsibility: Abuse of responsibility by staff responsible for exercising an internal control.
(16) Discuss risks and relevant control objectives for Procure to Pay (P2P) process?
Answer: Procure to Pay (P2P) is the process of obtaining and managing the raw materials needed for
manufacturing a product or providing a service.
Following are the risks and control objectives for Procure to Pay:
Complete book is available at https://notionpress.com/read/enterprise-information-system
(17) Discuss risks and relevant control objectives for Order to Cash (OTC) process?
Answer: Order to Cash (OTC or O2C) is a set of business processes that involve receiving and
processing customer requests for goods or services. An order to cash cycle consists of multiple sub-
processes including:
(1) Customer order is documented;
(2) Order/ service is scheduled;
(3) Order is shipped to customer or service is performed;
(4) Invoice is created and sent to customer;
(5) Customer sends payment /Collection; and
(6) Payment is recorded in general ledger.
Following are the risks and control objectives for Order to Cash process:
15
More practice questions available at www.caintereis.blogspot.com
(18) Discuss risks and relevant control objectives for Inventory Cycle?
Answer:
The Inventory Cycle is a process of tracking the inventory levels for an enterprise. An inventory system
should maintain accurate record of all stock movements to calculate the correct balance of inventory.
The typical phases of the Inventory Cycle for Manufacturers are as follows:
(1) The ordering phase: The amount of time it takes to order and receive raw materials.
(2) The production phase: The amount of time it takes to convert the raw material finished
goods.
(3) The finished goods and delivery phase: The finished goods that remain in stock and the
delivery time to the customer.
Following are the risks and control objectives for Inventory Cycle:
Complete book is available at https://notionpress.com/read/enterprise-information-system
(19) Discuss risks and relevant control objectives for Human Resources?
Answer: Typical stage of HR cycle includes the following:
17
More practice questions available at www.caintereis.blogspot.com
Career planning is the stage at which the employee and her supervisors work out her long-term
career goals with the company.
(3) Career Development:
Career development includes professional growth and training to prepare the employee for
more responsible positions with the company.
(4) Termination or Transition:
In case of termination or retirement, the role of HR in this process is to manage the transition by
ensuring that all policies and procedures are followed.
Following are risks and control objective for Human Resources process:
(20) Discuss risks and relevant control objectives for Fixed Assets?
Answer: Fixed assets process ensures that all fixed assets are tracked and fixed asset record maintains
details of location, quantity, condition, and maintenance and depreciation status
Transactions:
Risks Control Objectives
Fixed asset acquisitions - Not All fixed asset acquisitions are recorded.
recorded.
Fixed asset acquisitions - Not Fixed asset acquisitions are accurately recorded.
accurately recorded.
Fixed asset acquisitions - Not Fixed asset acquisitions should be recorded in the appropriate
recorded in the appropriate period.
period.
Depreciation charges - Not Depreciation charges are accurately calculated and recorded.
accurately calculated and
recorded.
Depreciation charges - Not All depreciation charges are recorded in the appropriate period.
recorded in the appropriate
period.
Fixed asset transfer/disposal - All fixed asset disposals/transfers should be recorded.
Not recorded.
19
More practice questions available at www.caintereis.blogspot.com
Fixed asset transfer/disposal - Fixed asset disposals/transfers should be accurately calculated and
Not accurately recorded. recorded.
Fixed asset transfer/disposal - Fixed asset disposals/transfers should be recorded in the
Not recorded in the appropriate appropriate period.
period.
Unrestricted System Access System access to process fixed asset transactions has been
restricted to the authorized users.
(21) Discuss risks and relevant control objectives for General Ledger?
Answer: General Ledger (GL) process refers to the process of recording the transactions in
the system.
Typical steps in general ledger process flow are as follows:
(1) Entering financial transactions into the system
(2) Reviewing Transactions
(3) Approving Transactions
(4) Posting of Transactions
(5) Generating Financial Reports
Flow Charts
(22) Explain Flowcharts?
Answer:
Flowcharts are used in preparing and documenting flow of different processes. They are generally
used in designing and documenting simple processes or programs.
Flowcharts help to visualise flow of processes and also helps to understand flaws, bottlenecks and
other features within it.
The two most common types of boxes in a flowchart are as follows:
− a processing step, usually called activity, and denoted as a rectangular box.
− a decision, usually denoted as a diamond.
Answer: Following are the steps for creating flowcharts for business processes:
(1) Identification of Process: First step will be to identify the business processes that are to be documented
with a flowchart.
(2) Understanding of Process: Next step will be to have complete understanding of process flow.
(3) Rough Diagram: Create a rough diagram and confirm understanding of the process with business
owner.
(4) Obtain Additional Information: Additional information to be obtained from the people involved in each
step.
(5) Identification of Activities: In this step, activities involved in each step to be identified along with
person responsible for each activity.
(6) Identification of Starting Point: Identify the starting point of the process. Starting points generally fall
into one of several categories:
21
More practice questions available at www.caintereis.blogspot.com
(7) Identification of inter-connected steps: Identify each individual step in the process and how it is
connected to the other steps.
(8) Define each step: Determine which action or activity completes each step. It is required to clarify who
or what performs each step.
(24A) Business processes are documented/designed using flowcharts to understand the process in
visualized form. Being a business advisor what advantage of flowcharts will you suggest to represent the
business processed in diagrammatic form? (Nov 19 - 6 Marks)
23
More practice questions available at www.caintereis.blogspot.com
(May 18 - 6 Marks)
Answer:
Complete book is available at https://notionpress.com/read/enterprise-information-system
Answer:
Data Flow Diagrams (DFD) indicates the flow of data or information from one place to another.
DFD shows that how processes are linked together through data stores and how the processes are
related to the users and the outside world.
DFD provides an overview of:
− What type of data is processed by system?
− What types of transformations are performed?
− What results are produced and where they flow.
− What type of data is stored?
In DFD, processes are identified to the function using “swinlanes”. Each lane is represented by
process owner who is responsible for implementing appropriate controls and to mitigate the risks.
(29) What are the main symbols used in data flow diagrams (DFD)?
Answer: Following are the main symbols used in data flow diagrams:
Answer: Two important Sections i.e. Section 134 and Section 143 of Companies Act, 2013 have direct
impact on corporate governance structure of the organisations. Following are the some of salient features
of them:
(i)Section 134:
Directors’ Responsibility Statement shall state that ‘the Directors had taken proper and sufficient
care for the maintenance of adequate accounting records in accordance with the provisions of this
Act for safeguarding the assets of the company and for preventing and detecting fraud and other
irregularities;
Complete book is available at https://notionpress.com/read/enterprise-information-system
the directors, in the case of a listed company, had laid down internal financial controls to be
followed by the company and that such internal financial controls are adequate and were
operating effectively.
the directors had devised proper systems to ensure compliance with the provisions of all applicable
laws and that such systems were adequate and operating effectively.
(ii)Section 143:
Section 143(3) contains the auditor’s report which states: “whether the company has adequate
internal financial controls system in place and the operating effectiveness of such controls”;
“Adequacy and effectiveness of controls” refers to the adequacy of the control design and whether
the control has been working effectively during the relevant financial year. The impact of this
statement is that it involves continuous control monitoring during the year.
Answer:
Following are some of the advantages of cyber law from the perspective of e-commerce transactions in
India:
(5) E-governance:
The Act allows web based notification by Government thus promoting e-governance.
The Act enables the companies to file any form, application or any other document in electronic
form as may be prescribed by the appropriate Government.
(6) E-Commerce:
The IT Act also addresses the important issues of information security to promote e-commerce.
(32) What are some of the computer related offences that can be prosecuted under IT Act?
27
More practice questions available at www.caintereis.blogspot.com
Answer: Following are some of the common cyber-crime scenarios which can attract prosecution as per
the penalties and offences prescribed in IT Act:
Answer: Rule 2(i) defines personal information as “information that relates to a natural person which
either directly or indirectly, in combination with other information available or likely to be available with a
body corporate, is capable of identifying such person.”
Passwords
Financial information
Physical/physiological/mental health condition
Sexual orientation
Medical records and history; and
Biometric information
(34) List out the rules and procedures that constitute corporate governance framework? (May 19)
explicit and implicit contracts between the company and the stakeholders for distribution of
responsibilities, rights, and rewards.
procedures to address conflicting interests of stakeholders in accordance with their duties,
privileges, and roles, and
procedures for proper supervision, control, and information-flows to serve as a system of checks-
and-balances.
Answer:
Any crime in which computer or network is used to commit the crime is known as cybercrime or
computer crime.
Cyber Crime is not different than the traditional crime. The only difference is that in Cyber Crime
the computer technology is involved.
The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber-
crimes.
Following are some of the example of cybercrimes:
Harassment via fake public profile on social networking site
Email Account Hacking
Credit Card Fraud
Web Defacement
Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, Bugs
Cyber Terrorism
Theft of Confidential Information
29
More practice questions available at www.caintereis.blogspot.com
(c)Risk Assessment
(d)Infrastructure
31
More practice questions available at www.caintereis.blogspot.com
(22) Which of the following is not considered as sensitive personal information as per IT Act?
(a)Medical Reports
(b)Biometric Information
(c)Address.
(d)Passwords
(23) Which of the following Business Process Module includes the software designed specifically for
production planning and management?
(a)Production Planning
(b)Material Management
(c)Finance Module
(d)Supply Chain Module
(25) Mr. Yagnik ordered material for manufacturing of products and delivery was fixed “within 10 days from
the date of order”. State the subsequent stage of order to cash cycle:
(a)Collections
(b)Invoicing
(c)Delivery Note
(d)Order Fulfillment
(26) Offence of chatting on the internet under the name of some other person is:
(a)Punishable for offence related to web defacement
(b)Punishable for phishing and email scam
(c)Theft of confidential information
(d)Harassment via fake public profile on social networking site
(28) Which of the following is not true about integration of Modules with Financial and Accounting System?
(a)Availability of same master data for all modules.
(b)Sharing of common transaction data with other modules wherever required.
(c)Use of Common Voucher types for each module.
(d)Use of Separate Voucher types for each module for easy identification of department recording it.
(29) Sharing of personal data without consent is violation of which rule of Sensitive Information and
Personal Data Rules, 2011.
(a)Rule 6
(b)Rule 7
(c)Rule 8
(d)Rule 9
(32) Which voucher type is to be used for writing off amount which is not to be recovered from
customer?
(a)Journal
(b)Sales
(c)Purchases
33
More practice questions available at www.caintereis.blogspot.com
(d)Contra
(33) Which of the following control is not available in Enterprise Resource Planning (ERP) systems:
(a)General Controls
(b)Application Controls
(c)Management Controls
(d)Business Continuity Controls
(34) Which module of ERP system, shall deal with Inventory Valuation as per AS-2 on "Inventory
Valuation"?
(a)Supply Chain
(b)Controlling
(c)Production
(d)Human Resources
(35) Which report indicates increasing cash sales over a period of time?
(a)Management Information Systems (MIS)
(b)Receipt and payment
(c)Cash and fund flow
(d)Balance Sheet and Profit/Loss Account
(36) Under which IT Offence, punishment is given for statement given below: "Whoever
fraudulently or dishonestly make use of electronic signature, password or any other unique identification
feature of any other person."
(a)Section 66- B
(b)Section 66- C
(c)Section 66- D
(d)Section 66- E
Complete book is available at https://notionpress.com/read/enterprise-information-system
35
More practice questions available at www.caintereis.blogspot.com
A system can be defined as a set of detailed methods, procedures and routines created to carry out
specific activity or to perform a duty or to solve a problem.
All systems generally have:
a. inputs, outputs and feedback procedures,
b. consistent steady state inspite of changing external environment,
c. boundaries as defined by system observer.
Within a larger system, there may be few sub-systems.
(2)What is a process?
Answer:
A process is defined as a sequence of events that processes inputs for desired outputs.
In business terms, a process is standard flow of activities performed by people or machines to
achieve a business objective.
Process creates value for customers i.e. internal or external.
Example of process is sequence of activities starting from taking customer order, filling that order
and issuing customer invoice.
(3)What are the types of data in Financial and Accounting Software? Differentiate between them.
Complete book is available at https://notionpress.com/read/enterprise-information-system
(4)Discuss types of Master Data in financial & accounting systems. (May 19)
Answer: Master data is relatively permanent data that is not expected to change again and again.
Following are some of the master data in financial & accounting systems:
37
More practice questions available at www.caintereis.blogspot.com
Out of above 7 steps, first 2 steps (i.e. transactions and voucher entry) require human
intervention. However, there can be few instances where voucher entry may be automated and
can be performed through system.
Remaining five steps are mechanical steps and can be performed by software with high speed and
accuracy.
Also, last five steps, (i.e. Posting, Balancing, Trial Balance, Profit & Loss Account and Balance Sheet
preparation) requires huge amount of time and efforts, if performed manually.
(6A) Explain the significance of front end and back end in a software. (May 18 - 2 Marks)
Complete book is available at https://notionpress.com/read/enterprise-information-system
Answer: Following are important aspect of front end and back end in a software:
Front End: Front end of the software interacts with the user. Front end takes request from the user and
pass on the back end for processing.
Back End: Back end of the software do not directly interact with the user. In interacts with the front end.
For example, when user want to generate a particular report, he will request front end for the same. Front
end passes the request to back end. Back end generates the required report and pass it on to front end.
Front end then display the information to the users.
Today’s ERP systems can cover a wide range of functions and integrate them into
one unified database.
Ability to customize an organization’s requirements.
Ability to integrate business operations with accounting and financial modules.
Ability to automate manual processes thus reducing errors.
Ability to process huge volumes of data within short time frames.
Enhanced data security and application controls.
Enhanced access controls and segregation of duties controls.
Enhanced reporting capabilities for management.
(8A) A manufacturing company is implementing an ideal ERP software, where a single database is
utilized and it contains all the data for various software modules. Identify the modules of an ideal ERP
software along with their functions. (May 18)
An Ideal ERP System satisfies all types of needs of an organization and provides right data and right
point of time to right users for their purpose.
An ideal ERP system is that system where a single database is used and stores all data for various
modules.
Following are some of the modules used in an ideal ERP system:
39
More practice questions available at www.caintereis.blogspot.com
(9) List down the risks & controls applicable in an ERP environment.
(9A) Central database is the main feature of an ERP system. As the complete data is stored at one place,
ensuring safety of the data and minimizing the risk of loss of data is a big challenge. As an IT expert,
discuss the risks associated with various aspects of ERP. (Nov 19 – 6 Marks)
Answer: Following are applicable risks and relevant controls for an ERP environment:
Complete book is available at https://notionpress.com/read/enterprise-information-system
− Does the system process according to GAAP (Generally Accepted Accounting Principles)
and GAAS (Generally Accepted Auditing Standards)?
− Does the system ensure confidentiality of information?
− Does the system ensure integrity of information?
− Does the system ensure availability of information?
− Does the system ensure regulatory requirements?
− Is there a problem-escalation process?
(i)Auditing of Data:
Access Control: To ensure that system access is given on “need to know” and “need to do basis”.
(ii)Auditing of Processes:
Functional Audit: To ensure that different functions / features in the system are working properly and
testing of the overall process. E.g. Purchase Process, Sales Process etc.
Input Validations: This stands for checking of rules for input of data into the system. E.g. backdating not to
be allowed, amount field must not be zero, stock item field shall not be empty, etc. Input validations shall
change according to each data input form.
(11) Major features of an ERP system is central database. Which are the options possible to different
users while assigning access to it? (May 19)
(12) Describe Role – based Access Control (RBAC) mechanism in ERP systems?
41
More practice questions available at www.caintereis.blogspot.com
Answer:
(13) Data warehouse extracts the data from one or more of the organization’s database and loads it into
another database for storage and analysis purpose. As a data warehouse manager, determine the design
criteria, which should be met while designing data warehouse? (May 18 - 6 Marks)
Data must be pulled from original database on a regular and scheduled basis.
Data should be time stamped, whenever data is loaded into data warehouse. This helps in
comparing different time period.
Process of Extraction- Transportation-Load (ETL) should be followed to ensure data coming from
different source is stored in one standard format.
Data warehouse can be designed either using bottom up approach and top down approach.
In bottom up approach, small data warehouses are created first. This is known as data mart.
Different data marts are merged into larger data warehouse.
In top down approach, enterprise wide data warehouse is created and then as and when needed
smaller data marts are created for specific business needs.
Answer: Business process may change per type of business. Hence different modules are possible in an
integrated system. Following are some of the modules that may be part of ERP system:
(vi) Inventory management before delivery of goods to ensure that goods are ready
and available for delivery.
(vii) Billing – This is a transaction of raising an invoice against the delivery of material to
customer.
(viii) Receipt from Customer – Transaction involving receipt of money from customers
against sales invoice. This shall have a linking with sales invoice.
Single Module for all HR This module takes care of various HR related task such as
functions recruitment, performance evaluation, managing promotions,
compensations, handling payroll and other related activities.
Employee Database This module maintains total employee database.
No integration with other This module exchanges very few information with other
modules modules.
Capturing Attendance (i)Important function of this module is to capture attendance of
every employee.
(ii)Usage of magnetic card or finger print recognition devices will
help to improve the attendance system and discard proxy
attendance.
Holiday list From Holiday master provided with the module the user could
feed all possible holidays at the beginning of a year, so leave
related information can be automated.
Employee Advances Financial entries like advance or loan to employees are also
captured in this module.
Authorized Access Details in the module will be password protected. Only
authorized person will be eligible to access information from
this module.
(15) What are the key benefits of CRM module? (May 19)
45
More practice questions available at www.caintereis.blogspot.com
By using CRM, all dealings with customer for servicing, marketing, and selling can be carried out in
an organized and systematic way.
This in turn helps in increasing customer loyalty and decreasing customer agitation.
(2) Better internal relations & communication:
CRM helps in building up better communication within the company.
The sharing of customer data between different departments will enable them to work as a team.
And thus help in increasing the company’s profitability and enabling better service to customers.
(3) Optimize marketing:
CRM helps to understand most profitable customer groups, ideal marketing timing and correct
product.
In this way, marketing resources can be optimized efficiently and time is not wasted on less
profitable customer groups.
(4) Maximize up-selling and cross-selling:
Up-selling and cross-selling can be improved by interacting with the customers and getting an idea
about their wants, needs, and patterns of purchase.
Up-selling is the practice of giving customers premium products that fall in the same category of
their purchase.
Cross selling is the practice of offering complementary products to customers, based on their
previous purchases.
(5) Increase in revenues:
By using a CRM strategy for any business, the revenue of the company can be increased.
Using the data collected, marketing campaigns can be popularized in a more effective way.
Answer: Following criteria need to be followed for making information most useful:
(1) Relevant:
Information should be relevant to the business area they address.
This is important because a report that includes unnecessary information might be ignored.
(2) Timely:
Many times old information may not be relevant in current time.
Managers need to know what’s happening now or in the recent past to make decisions about the
future.
(3) Accurate:
Accuracy of the information is of utmost importance.
Managers and others who rely on MIS reports can’t make sound decisions with information that is
wrong.
(4) Structured:
Structured Information helps management understand what the report is saying.
Try to break long passages of information into more readable blocks or paragraphs and give theme
meaningful headings.
Complete book is available at https://notionpress.com/read/enterprise-information-system
Answer:
Data Analytics is the process of examining data sets to draw conclusions about the information
they contain.
Data Analytics is done with the aid of specialized systems and software.
Data analytics technologies and techniques are widely used in commercial industries to enable
organizations to make more-informed business decisions.
Data Analytics initiatives can help businesses with following advantages:
rise in revenues,
improve operational efficiency,
improve marketing campaigns,
improve customer services,
act more rapidly to emerging market trends and gain a competitive edge over rivals.
47
More practice questions available at www.caintereis.blogspot.com
(19) What do you understand by term ‘Business Intelligence’? Explain with examples. (May 18 - 2 Marks)
Answer: Business Intelligence (BI) is a technology-driven process for analysing data and presenting
meaningful information to help users make more informed business decisions. BI data supports both
strategic and tactical decision-making processes. BI programs also include advanced analytics such as data
mining, predictive analytics, text mining, statistical analysis and big data analytics.
Answer:
Business Reporting includes (i) public reporting of operating and financial data by a business
enterprise (ii) regular input of information to decision-makers within an organization to help them
for their work.
Reporting helps in improved business intelligence and knowledge management.
Implementation involves Extract, Transform, and Load (ETL) procedures in coordination with a data
warehouse and then using one or more reporting tools.
Wide range of reporting is conducted such as financial, regulatory and environmental, social, and
governance (ESG) reporting, integrated reporting etc.
Reports with high quality promote more effective and better internal decision-making. High-quality
information is essential to the successful management of the business, and is one of the important
factors of sustainable organizational success.
(21) What is the purpose of ‘XBLR’ and what are the features of ‘XBLR’?
Answer:
XBRL (eXtensible Business Reporting Language) is a freely available and global standard for
exchanging business information.
XBRL is used in more than 50 countries. XBRL helps in creating more useful, more effective and
more accurate digital versions replacing older, paper-based reports.
XBRL ensures information move between organizations rapidly, accurately and digitally. XBRL is a
standards-based way to communicate and exchange business information between business
systems.
These interactions are defined by metadata set out in taxonomies.
The language is XML-based and uses the XML syntax and related XML technologies such as XML
Schema, XLink, XPath, and Namespaces.
Following are important features of XBLR:
Clear Definition: XBRL allows the creation of reusable, authoritative definitions, called
taxonomies. Taxonomies are developed by regulators, accounting bodies, government
agencies and other groups that need to clearly define information that needs to be
reported upon.
Testable Business Rules: XBRL allows the creation of business rules. Business rules can be
logical or mathematical, or both.
Multi-lingual Support: XBRL allows concept definitions to be made available in different
languages. Translations of definitions can also be added by third parties. These
automatically open up reports to different communities.
Strong Software Support: XBRL is supported by a very wide range of software and thus can
be acceptable by all size of the organization.
Answer:
The international XBRL consortium is supported by more than 600 member organizations, from
both the private and public sectors.
XBRL is used for different purpose and by different entities including by:
(i) Regulators:
Financial regulators that manage complex performance and maintains risk
information about the institutions that they regulate.
Securities regulators and stock exchanges that need to monitor the compliance of
listed companies and securities.
Business registrars that need to maintain and publish a range of corporate data to
general public.
Tax authorities that need financial and other compliance information from
companies to monitor their corporate tax affairs.
49
More practice questions available at www.caintereis.blogspot.com
Answer:
XBRL Tagging is the process by which any financial data is tagged with the most relevant element in
an accounting taxonomy (a dictionary of accounting terms).
As all XBRL reports use the same taxonomy, information is comparable irrespective of how they are
described by those releasing the financial statements.
Due to same taxonomy, information in reports prepared using the XBRL standard is
interchangeable between different information systems. This allows for the exchange of business
information in entirely different organizations.
XBRL has the capability to allow the tagging of transactions that can themselves be consolidated
into XBRL reports.
Answer: Following table shows pros & cons of having single system for accounting & tax compliance:
Particulars Combined Accounting & Tax Software Only Tax Compliance Software
Ease of software Relatively less ease due to integration More ease of operation.
operation of two different module.
Complete book is available at https://notionpress.com/read/enterprise-information-system
System features Tax module will have relatively less More system features will be there as
system features as this is not exclusive this will exclusive and specifically
system for tax compliance. designed system for tax compliance.
Time & Efforts Less time and efforts are required for More time and efforts are required for
transfer of information due to transfer of information from
integration. accounting system to tax system.
Accuracy More accurate information as systems Comparatively less accurate as
are integrated. possibility of mismatch between
accounting and tax system is always
there.
Cost More costly as two different systems Comparatively less costly is required.
are integrated.
(15)Which of the following module is somehow connected with all other modules?
(a) Human Resource Module
(b)Purchase Module
(c)Financial accounting module
(d) Sales & distribution module
53
More practice questions available at www.caintereis.blogspot.com
(29) For recording physical receipts of goods purchased from a vendor,which Voucher type shall be used?
(a)Delivery Note
(b)Receipt Note
(c)Debit Note
(d)Credit Note
(30) Voucher Type "Contra" of the Accounting System does not include:
(a)Cash deposit inbank
(b)Cash withdrawal from bank
(c)Cash transfer from one location to another
(d)Credit Sales
Complete book is available at https://notionpress.com/read/enterprise-information-system
(31) Mr. Yagnik hacks the data of valuable customers of a company and then sold the same to its
competitor. This act is known as:
(a)Source code theft
(b)Theft of confidential information
(c)Phishing
(d)Hacking
(33) In case of a single system and database, which of following is required to protect business?
(a)Single system can be controlled and monitored by having proper and updated backup of data as well as alternate
hardware/internetarrangements.
(b)Single can be controlled by removing redundant data, using techniques like data warehousing and updating
hardware on a continuous basis.
(c)Proper access rights to be implanted.
(d) Proper staff training system should be given.
(34)In case of a large database speed of operations is reduced. Which of following is required to protect
business?
(a)This can be controlled and monitored by having proper and updated backup of data as well as alternate
hardware/internetarrangements.
(b)This can be controlled by removing redundant data, using techniques like data warehousing and updating
hardware on a continuous basis.
(c)Proper access rights to be implanted.
(d) Proper staff training system should be given.
(36) In case of disaster, an entity not having a proper back-up of data is faced with huge business risk.
The same (risk) is dealt in which accounting standard issued by ICAI, New Delhi.
(a)AS - 2
(b)AS - 1
(c)AS - 9
(d)AS – 28
55
More practice questions available at www.caintereis.blogspot.com
Information Systems
(1) Define the term ‘Information’?
Answer:
57
More practice questions available at www.caintereis.blogspot.com
In systems, data are used as the input for a process that creates information as an output.
Five components of a generic system include Input, Process, Output, Feedback and Control.
Answer:
People
Data Hardware
Informati
on
Systems
Communicat
Software
ion Devices
(1)Addressing User needs: Main advantage of application software is that it addresses exact requirements
of the user. Application Software is designed for specific purpose considering user requirements.
59
More practice questions available at www.caintereis.blogspot.com
(2)Addressing control against virus: Organization using the applications can design appropriate control to
protect against virus.
(3)Providing regular updates: Licensed application software gets regular updates from the developer for
security reasons. Additionally, developer provides support for system functionality as and when required.
(2) Malware Infection: If application software is placed online, it carries a threat of infection by a computer
virus or other malicious programs.
Answer: Following are some of the areas of applications of Computer based Applications:
(3)Manufacturing:
The objective of this application is to support manufacturing activities by optimally deploying man,
machine and material to maximize production or service.
Complete book is available at https://notionpress.com/read/enterprise-information-system
The system generates production schedules and schedules of material requirements, monitors the
product quality, plans for replacement or overhauling the machinery and helps in overhead cost
control and waste control.
(4)Inventory Management:
The objective of this application is to keep the track of materials in the stores.
The system is used to determine the maximum and minimum level of stocks, to give timely alert
for re-ordering of materials and to calculate optimal re-order quantity.
This application also provides important information for production schedule and marketing/sales
strategy.
61
More practice questions available at www.caintereis.blogspot.com
This model views all records in sets. Each set is made up of an owner record and one or more
member records.
The network model can bring out redundancy in data more efficiently than in the hierarchical
model.
Unlike the hierarchical mode, the network model permits a record to be a member of more than
one set at one time. This allows for many-to-one and the many-to- many relationship types.
Network databases directly address the location of a record on disk. This gives excellent retrieval
performance.
(1)Data Sharing:
DBMS allows availability of same information to multiple users.
(2)Data Security:
Rules can be built to give access to sensitive data.
Using access control techniques like passwords, data access can be restricted to only authorised
users.
(3)Data Integrity:
Single database ensures data integrity by having accurate, consistent, and up-to-date data.
Any updates or modification to the data must be made in one place in DBMS ensuring Integrity.
(4)Data Independence:
In a DBMS, data does not reside in applications but databases program & data are independent of
each other.
(5)Data Redundancy:
DBMS reduces data redundancy (duplication) which helps in reducing the cost of data storage and
also improves operational efficiency.
(8)User-friendly:
DBMS is user friendly which makes the data access and updation easier for the user.
63
More practice questions available at www.caintereis.blogspot.com
DBMS also reduce the reliance on computer experts as normal user can also operate systems with
the help of DBMS.
(1)Cost:
Cost and time for development of DBMS can be on higher side especially in large enterprises.
Training requirements for user can also be quite costly.
(2)Security:
In absence of stringent controls, it may be possible for some unauthorized users to access the
database.
Data security is major challenge in DBMS environment.
Centralized View:
Data warehouse helps in centralized view of all data being collected.
It also provides a means for determining inconsistent data.
Complete book is available at https://notionpress.com/read/enterprise-information-system
Data Consistency:
Consistent data helps in generating correct and accurate information
This is important when the company wants to report consistent statistics such as revenue or
number of employees.
Historical Records:
Data warehouse helps in capturing snapshots of data over time.
It creates a historical record of data which helps in analysis of trends.
New Information:
Data warehouse helps in combining various data.
This provides new information and analysis.
(1)Distribution of Information:
Due to geographical spread, information may be required at different location.
Example: In case of bank, information of various customers is required to be with each branch and
also to make Consolidated Balance Sheet, information would be required from all branches at
centralised location.
(2)Resource Sharing:
Networking helps in sharing of resources.
Data could be stored at a central location and can be shared across different systems.
Example: In the case of a CBS, bank data is stored at a Central Data Centre and could be accessed
by all branches as well as ATMs.
For example: processing in an ATM machine in a bank is distributed between ATM machine and the
central Computer System in a Bank, thus reducing load on both.
(4)Reliability:
Computer network improves reliability of the critical applications.
Example: In a city, there could be multiple ATM machines so that if one ATM fails, one could
withdraw money from another ATM.
(5)User communication:
Computer Networks allow users to communicate using e-mail, video conferencing etc.
Answer: Some of the critical control lacking in a computerized environment are as follows:
(2)Lack of awareness and knowledge of IS risks and controls amongst the employees.
(i)Preventive Controls:
Preventive Controls are designed to prevent an error, omission or malicious act occurring.
Some of the examples of preventive controls include employing qualified personnel, segregation of
duties, authorization of transaction, firewalls, anti-virus software, passwords etc.
(ii)Detective Controls:
Complete book is available at https://notionpress.com/read/enterprise-information-system
Detective controls are designed to detect an errors, omissions or malicious acts that occur and
report the occurrence.
Thus detective controls detect errors or incidents that escape preventive controls.
Some examples of detective control includes bank reconciliation, audits, hash totals, echo control
in telecommunications, Intrusion Detection System etc.
(iii)Corrective Controls:
Corrective controls are designed to correct errors, omissions, or incidents once they have been
detected.
Corrective controls are designed to reduce the impact or correct an error once it has been
detected.
Some examples of corrective controls are a business continuity plan (BCP), contingency planning,
backup procedure, rerun etc.
(i)Environmental Controls:
Environmental controls are designed to minimize the risk of environmental hazards and exposures.
These are the controls relating to IT environment such as power, air-conditioning, Uninterrupted
Power Supply (UPS), smoke detection, fire-extinguishers, dehumidifiers etc.
(ii)Physical Controls:
These are the controls relating to physical security of IS resources.
Physical controls include security guards, access control doors, Security guards, door alarms etc.
(iii)Logical Controls:
Logical access controls are implemented to ensure that access to systems, data and programs is
restricted to authorized users.
Logical access includes operating systems controls, application software boundary controls,
networking controls, access to database objects, encryption controls etc.
(i)Managerial Controls:
Managerial controls helps in development, implementation, operation and maintenance of
information systems in a planned and controlled manner in an organisation.
(ii)Application Controls:
The objective of application controls is to ensure that data remains complete, accurate and valid
during its input, update and storage.
Any activity that aims processing accuracy of the application can be considered an application
control.
Application control includes form design, source document controls, input, processing and output
controls etc.
67
More practice questions available at www.caintereis.blogspot.com
(i)User Registration:
User registration process includes some questions like who has authorized the access, has the data
owner approved the access and other relevant aspects.
The de-registration process is also equally important.
(iv)Privilege management:
Access to be given solely on the basis of job requirements.
For example, employee of the operations department should not have access to application
development procedure.
(2)User Responsibilities:
(i)Password use:
Strong password policy is required to maintain confidentiality.
Complete book is available at https://notionpress.com/read/enterprise-information-system
(i)Network Policy:
Network usage policy applicable to internet service should be available.
Selection of appropriate services and approval to access them should be part of this policy.
(ii)Network Segregation:
Based on the sensitive information handling function, internal network (Intranet) should be
isolated from external network (internet).
(iii)Network Security:
The techniques of authentication and authorization policy should be implemented across the
organization’s network.
(v)Enforced path:
Based on risk assessment, appropriate network controls should be in place e.g., internet access by
employees will be routed through a firewall and proxy.
(vi)Firewall:
A Firewall is a system that enforces access control between two networks. Firewall rules to be
defined to protect the sensitive information.
(vii)Encryption:
Encryption is the conversion of data into a secret code so no one can read or understand the data.
Two general approaches are used for encryption viz. private key and public key encryption.
69
More practice questions available at www.caintereis.blogspot.com
If the caller is authorized, the call back device dials the caller’s number to establish a new
connection.
This helps to avoid the call forwarding and man-in-the middle attack
(i)Terminal identification:
This will ensure that only approved terminal can initiate a specified session.
(iii)Event logging:
All system access should be recorded in a transaction log.
The log should be reviewed at regular interval.
(v)Clock synchronization:
It is to be ensured that clock timing should be synchronized for all the devices in the network. This
will help in analyzing the events.
(6)Mobile Computing:
Mobile devices carry high risk of data theft. It is important to have both physical and logical access
to these systems.
71
More practice questions available at www.caintereis.blogspot.com
Information is to be encrypted and access identifications like fingerprint, eye-iris, and smart cards
are necessary security features.
(1)Field Interrogation: It examines the characters of the data in the field. Some common types of field
interrogation are as follow:
Answer: Output Controls ensure that the confidentiality and integrity of the output is maintained and that
the output is consistent. Various Output Controls are as follows:
(3) Spooling/Queuing:
Spool (Simultaneous Peripherals Operations Online) is a process used to ensure that the user can
continue working, while the print operation is in process.
In spool environment, intermediate storage of output could lead to unauthorized access.
Proper control should be place for such operations.
73
More practice questions available at www.caintereis.blogspot.com
Access restrictions may be placed on the workstations that can be used for printing.
User training is also important for usage of printer.
(18) List down various phases and their controls during program development life cycle? (May 19)
Answer:
Phase Controls
Planning Control techniques like Gantt Charts, PERT, Work Breakdown Structures
(WBS), can be used to monitor progress against plan.
Answer: Two major type of data coding errors are transcription error and transposition error. Transcription
error and transposition error can corrupt the data code and cause the processing error.
Transcription Error: Transcription error can be either in form of addition error, truncation error or
substitution errors. These errors are common type of error made by human beings or by OCR (optical
character recognition) technology.
Transposition Error: In transposition error, two digits are reversed while posting a transaction. They are
data entry error. For example, 17 is entered as 71. Two types of transposition error are single transposition
or multiple transposition errors.
Answer: Line error occurs due to attenuation, distortion or noise in communication line. These line error
must be detected and corrected.
Error Detection: Line error can be detected by using loop check (echo check) or building some form of
redundancy into the message transmitted.
Error Correction: Once the line errors are detected, it must be corrected either using forward error
correcting codes or backward error correcting codes.
Answer: Following are some of the factors influencing need for audit of Information Systems:
Factors Particulars
Cost of Data Due to various regulations, cost of data lost is very high. Data is a
Loss critical resource of an organization and it should be protected.
Cost of Incorrect Data accuracy is very important to make quality decisions. Incorrect
Decision Making data may impact operational efficiency of the organization.
Cost of Unauthorized access to computer systems may impact confidentiality,
Computer integrity and availability (CIA) of the systems.
Abuse
Cost of Data error may have huge impact in a computerized environment
Computer Error where many critical business processes are performed.
Value of Computer infrastructure includes hardware, software and personnel.
Computer These are critical resources of an organization which is to be
Infrastructure protected.
75
More practice questions available at www.caintereis.blogspot.com
(22) Explain briefly the objective of information system audit? (May 2018 - 4 Marks)
Answer: Following are some of the major objectives for audit of Information Systems:
Objectives Particulars
Safeguard of Assets Objective of IS audit is to determine that IT assets such as
hardware, software, data etc. are protected from unauthorised
data.
Integrity of data Objective of IS audit is to determine that data used by the
organization is correct, complete and accurate.
System Objective of IS audit is to determine that system is effective in
effectiveness meeting the user requirements.
System efficiency Objective of IS audit is to determine that system is efficient in
terms of cost effectiveness and environmental impact. There
should be optimum use of IT resources.
(1)Snapshots:
In this technique, snaps (pictures) are taken of the transactions as transaction moves through
various stages in the application system.
Both before -processing and after -processing images of the transactions are captured.
Complete book is available at https://notionpress.com/read/enterprise-information-system
Auditor can verify the correctness of the processing by checking before-processing and after-
processing images of the transactions.
In this technique, three important considerations are (i)location where snaps to be taken (ii)time of
capturing snaps and (iii) reporting of snapshot data captured.
(5)Audit Hooks:
When audit hooks are employed, auditors can be informed of suspicious transactions as soon as
they occur.
This approach of real-time notification displays a message on the auditor’s terminal.
Criteria for suspicious transactions are designed by auditors as per their requirement.
For example, internal auditors at Insurance Company determined that their policyholder system
was vulnerable to fraud every time a policyholder changed his or her name or address and then
77
More practice questions available at www.caintereis.blogspot.com
subsequently withdrew funds from the policy. They devised a system of audit hooks to capture
such suspicious transactions.
Audit Trail
(24) What are the objectives of Audit Trail?
Answer: Audit trails can be used to support security objectives in three ways:
Reconstructing Events:
Audit trail helps to reconstruct the steps that led to events such as system failures or application
processing errors.
This knowledge can be used to assign responsibility and to avoid similar situations in the future.
Personal Accountability:
Audit trails helps in monitoring user activity.
This prevents user to do any unauthorised activities.
(25) Discuss the key activities, which require special attention for auditing the user access provisioning.
(May 19)
Answer: Following special attention for auditing the user access provisioning is required:
Complete book is available at https://notionpress.com/read/enterprise-information-system
Access
Review
Access
• including SoD
Approval
Access
Request
• including new
employee
(i)Process for Access Request: The IS auditor should verify process of access request and determine if these
processes are used consistently throughout the organization.
(ii)Process for New employee provisioning: The IS auditor should verify how a new employee’s user
accounts are initially set up. The auditor should determine if manager’s authorization is obtained.
(iii)Process for Access approvals: The IS auditor needs to verify process for approval and by what authority
they are approved.
(iv)Periodic Access reviews: The IS auditor should determine if periodic reviews are performed for access
provided. This may include termination reviews, internal transfer reviews, SOD reviews, and dormant
account reviews.
(v)Segregation of Duties (SOD): The IS auditor should determine whether proper segregation of duties
exists.
Answer: Following table depicts roles and responsibilities of various titles in IT:
79
More practice questions available at www.caintereis.blogspot.com
Complete book is available at https://notionpress.com/read/enterprise-information-system
Segregation of Duties
(27) Explain the examples of Segregation of Duties Controls? (Nov 19 - 4 Marks)
(1)Transaction Authorization:
Maker-checker concept requires two (or more) persons to approve certain transactions.
In IT applications, transactions meeting certain criteria (exceeding normally accepted limits or
conditions) may require a manager’s approval to be able to proceed.
(3) Workflow:
In workflow type systems, extra management approval is required for administrative privileges.
81
More practice questions available at www.caintereis.blogspot.com
(4)Identify the one which is not a functional unit of Central Processing Unit (CPU):
(a)Output devices
(b)Arithmetic and Logic Unit
(c)Registers
(d)Control Unit
(9)Which of the following is not one of the controls lacking in a computerised environment?
(a)Lack of management support and understanding of IS risks and related controls.
(b)Lack of awareness and knowledge of IS risks and controls amongst the employees.
(c)Absence or inadequate IS control framework.
(d)Ease of implementation of controls in network environments.
(11)Which of the following is the process of conversion of data into a cipher text for storage in databases
and transmission over networks?
(a)Networking
(b)Decryption
(c)Encryption
(d)Logging
(12)Which of the following is the process of re-conversion of cipher text into plain text?
(a)Networking
(b)Decryption
(c) Encryption
(d)Logging
(14)Which of the following error occurs when an extra digit or character is added to the code?
(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error
(15)Which of the following error occurs when one digit is replaced with another digit?
(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error
(16)Which of the following error occurs when two digits are reversed?
(a)Transposition Error
(b)Substitution Error
83
More practice questions available at www.caintereis.blogspot.com
(c)Addition Error
(d)Truncation Error
(17)Which of the following refers to the ability of a network to recover from any kind of error like
connection failure, loss of data etc.?
(a)Bandwidth
(b)Resilience
(c)Contention
(d)Routing
(18)Which of the following refers to the amount of data which can be sent across a network in given
time?
(a)Bandwidth
(b)Resilience
(c)Contention
(d) Routing
(19)Which of the following refers to the process of deciding on how to communicate the data from
source to destination in a network?
(a)Bandwidth
(b)Resilience
(c)Contention
(d) Routing
(20)Which of the following refers to the situation that arises when there is a conflict for some common
resource in a network?
(a)Bandwidth
(b)Resilience
(c)Contention
(d) Routing
(21)Which of the following application controls, maintains the chronology of events that occur when a
user attempts to gain access to and employ systems resources?
(a)Boundary Controls
(b)Input Controls
(c)Communication Controls
(d)Processing Controls
(22)Which of the following application controls maintains the chronology of events that occur either to
the database definition or the database itself?
(a)Boundary Controls
(b)Input Controls
(c)Database Controls
(d)Processing Controls
(23)Which of the following application controls, maintains the chronology of events from the time data
and instructions are captured and entered into an application system until the time they are deemed
valid and passed onto other subsystems within the application system ?
(a)Boundary Controls
(b)Input Controls
(c)Database Controls
Complete book is available at https://notionpress.com/read/enterprise-information-system
(d)Processing Controls
(24)Which of the following application controls, maintains a chronology of the events from the time a
sender dispatches a message to the time a receiver obtains the message?
(a)Boundary Controls
(b)Input Controls
(c)Database Controls
(d)Communication Controls
(25)Which of the following technique involves embedding audit software modules within a host
application system to provide continuous monitoring of the system’s transactions?
(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)
(27) In which technique, picture are taken of the transactions as transaction moves through various
stages in the application system?
(a)Audit hooks
(b)Snapshots
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)
(28)Which of the following technique can be used whenever the application system uses the database
management system (DBMS)?
(a)Audit hooks
(b)SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)
(29)In which of the following technique, auditor enters dummy or test transactions and verify the
processing and results of these transactions for correctness?
(a)Audit hooks
(b)SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)
85
More practice questions available at www.caintereis.blogspot.com
(33)Who among the following is responsible for organization’s overall technology strategy?
(a)Chief Security Officer (CSO)
(b)Chief Technical Officer (CTO)
(c)Chief Information Security Officer (CISO)
(d)Chief Privacy Officer (CPO)
(34)Who among the following is responsible for the overall information systems architecture in the
organization?
(a)Systems Architect
(b)Systems Analyst
(c)System Developer
(d)System Programmer
(35)Who among the following is responsible for developing logical and physical designs of data models
for applications and also designs an organization’s overall data architecture?
(a)Systems Architect
(b)Database Architect
(c)Database Administrator
(d)System Programmer
(36)Who among the following is responsible for designing data and voice networks and designs changes
and upgrades to the network as needed to meet new organization objectives?
(a)Systems Architect
(b)Database Architect
(c)Database Administrator
(d)Network Architect
(38) Which of the following is a data entry errorwhen two digits that were either individual or part of larger
sequence of numbers were reversed when posting a transaction?
(a)addition Error
(b)Truncation Error
(c)Substitution Error
(d)Transposition Error
Complete book is available at https://notionpress.com/read/enterprise-information-system
(39) Which of the following controls will not fall under the purview of Input Controls?
(a)Source Document Controls
(b)Data Coding Controls
(c)Boundary Controls
(d)Batch Controls
(40) Which type of controls can be exercised by the IT Team in case of existence of numerous accounts
numbers of inactive accounts in their usage data of active customers?
(a)Corrective Controls
(b)Detective Controls
(c)Preventive Controls
(d)Compensatory Controls
(41) Which of the following controls are designed to prevent unauthorized individual from viewing,
retrieving, computing or destroying the entity's data in any organization?
(a)Access
(b)Backup
(c)Concurrency
(d)Quality
(44) Which of the following is not a type of Data Resource Management Controls under Managerial
Controls?
(a)Existence Control
(b)Concurrency Controls
(c)Production Controls
(d)Quality Controls
(45) Which of the following does not fit into best practices while dealing with passwords in order to avoid
system failures?
(a)Periodic change ofpasswords
(b)Unlimited number of entry attempts
(c)Minimum password length
(d)Hashing of passwords
(46) Which risk refers to the data lost from stolen or lost devices in case of BYOD?
(a)Financial Risk
87
More practice questions available at www.caintereis.blogspot.com
(b)Application Risk
(c)Device Risk
(d)Integration Risk
(48) Which control is not verified during audit of logical access control?
(a)Access Controls
(b)Intrusion Detection andPrevention
(c)Backup Power
(d)password management
(51) Which of thefollowingriskis not applicable when it adopts Bring Your Own Device (BYOD)?
(a)Availability Risk
(b)Confidentiality Risk
(c)Integrity Risk
(d)Implementation Risk
(54) In case of conflict for some common resource, computer resource has capacity to recover. This is
known as:
(a)Routing
(b)Bandwidth
(c)Resilience
Complete book is available at https://notionpress.com/read/enterprise-information-system
(d)Contention
(56) While defining RISK, the person is not likely to refer to which terms in its definition.
(a)Vulnerability
(b)Threats
(c)Impact
(d)Asset
89
More practice questions available at www.caintereis.blogspot.com
91