MICS
MICS
System providing information to help the management to launch a new product shall be best
classified as
Ans: Strategy
2. the student of institute are usually required to create a document like chart, graphs, handouts
preparing document detections and editing of text. which of the information system suitable for
carrying out these activities?
a) MICS
b) Transaction processing
c) Management system
d) System management
6. A software developer informed the project manager that a portion of application development
is going to take 5 additional days to complete.
a) The project manager should inform to other project participate of the schedule changes ,
b) change the project schedule to reflect the new time create project request
c) adjust the resource budget to account for schedule change
7. Cloud computing also a good option when the cost of infrastructure and management is third
management
a) Low
b) High
c) Moderate
d) None of the above
8. An organization want to reduce the number of user id & password that its employee need to
remember. What is the available best solution to the problem?
a) Password vault for storing user id & password
b) Token authentication and
c) single signing
d) reduce signing
9. While reviewing roles and responsibility IS experts discovered that some IT staffs are serving
multiple roles, which of the following are the greatest concern for IT auditors
a) Networking engineering are performing for quality assurance sake
b) Security administrators are also responsible for system programming
c) IT’s 1st line of support team are responsible for system
d) ABC
10. EDI requires the information of common document computer readable forms
a) Value entry operator by receivers
b) Special value-added networks
c) Special how the company operating business premises
d) Representation of common business document computer develop form
11. When an auditing the purposed acquisition of new computer system an IS audit 1 st
a) There business case has been approved by management
b) Corporate security standard system will be made
c) User will be involved in the implementation plan
d) New system will be the all required user’s function
13. Cause and effect analysis perform in which of the following phase of system
development(system testing phase ma cause & effect test garxam)
a) Definition
b) Requirement analysis
c) Design
d) Cause & effect
14. A primary benefit derived from organization in flowing control self-assessment techniques,
identify risk areas might need the details review
a) Reduce audit cost
b) Reduce audit time
c) Increase audit accuracy
15. Which of the following may be deployed in computer network as lower cost surveillance in early
warning tools?
a) Honeypot
b) Hardware id
c) Estate full inspection
d) Faithfull login id
17. Which business model allows the customer name their own price for product & services
a) C2C
18. Which of the following is not an enterprise management practice required in aligning IT Strategy
with enterprise definition?
a) Defining the target IT capability
b) Assessing the current environment capability & performance
c) Communicating the IT strategy & director
d) Mitigating the risk
21. Which category of computer-based information system are concerned with improving the
efficiency by applying information technology to common administrative task such as
a) Creating business
b) Auto machine system
c) Expert teams
d) Strategic information system
Ans : Office automation bhane point auxa
22. Electronic data interchange (EDI) software consists of following layers
a) Business application internal format conversion, edi translator, edi envelop
b) Transport layer
c) Application layer
d) Internal format conversion
e) Network translator
26. What personal should be involved in the requirement phase of project development
a) System
b) Relation operating development
c) Developer, Analysis, architect and uses
28. While auditing the input control in an enterprise ABC, which of the following control will not fall
under preview of input control
a) Source document control
b) Data coding control
c) Boundary control
d) Batch control
33. Which is the most valuable electronic commerce to the individual customer in log run
a) C2C
b) B2C
34. Which is the best way to ensure that the organization policy is compile with legal requirement
a) Periodic review of policy batch
b) Annual meeting of senior manager to discuss whether the policy is complete to legal
requirement
c) Updating the policy regularly
d) Regular conduct compliance test
35. A Makalu Pvt Ltd is facing problem trouble paying incentive to sale representative, the incentive
is paid on the basis of sale turnover achieve , the company has appointed as you as a consultant
to asking you , which type of system they need to create to solve the problem
A) MICS system
B) Transaction processing system
C) Executive information system
D) Executive support system
36. The accountability for the maintenance of appropriate security measures over information
assets
a) With security administrator
b) System administrator
c) Data and system owner
39. An organization has discovered the some of its employee has criminal records, what is the best
course of action for organization to take
a) Immediately perform the background checks including criminal history of all the employee
b) Immediately perform the background checks including criminal history of all new the
employee
c) On those with criminal records
40. An organization that has the experience certain increase in its long-distance charges has asked
the auditor to investigate what activities likely to suspect
a) Malfunction
b) Employee taking long distance call
41. In the interview with a candidate was asked to mentioned about all the component of
enterprises resources planning more that can be implement, identify the correct answer
a) Software component
b) Process flow
c) Customer mindset change
42. An auditor has reviewed the excesses privileged of sum employee and has discovered the
employee with longer term of service has exercised the privileged , what can the auditor
conclude from this
a) Employee privileged are not been removed when they are transferred from one position to
another
b) Long term employee are able to successfully gain others users password and
c) Long term employee are free to check the others password frequently
43. The IT department of XYZ Co. organization wants to make sure of ……. Resources (22)
a) The organization that is under taking business
b) Hybird cloud testai xa
44. The programmer is updating an application that saves password in plain text, what is the best
method to storage the pw encrypt with publicly
a) Each user publicly
b) Encrypt private vako point xa
45. A critically application is backed up once per day , the recovery point for this system is
a) 12 hr
b) 24 hr
c) Artalis hr
46. Nabil manufacturing co. is a manufacturing co. having worth of 500 million , world developing
business continuity plan the company setup a community for providing direction and guidance
to whole project team and responsible to make a all the decision relate to recovery planning
effort, which of the following is BCP community working
a) Replanning activities
b) Business impact analysis
c) Vulnerability adjustment
d) Plan development
47. Mr. B want to invest more money for future but he has no idea where to invest and how much
to invest, he is seeking help us from specialized system which is helping him to find the answer
of all queries such as how much money can be invested in portfolio which securities would be
better for him , identify the special file software system is use in such
a) Core Banking system
b) Expert system
c) Financial system
d) Knowledge system
49. The business information system which provide the answer to semi structured problem and use
for handling for structured problem is
a) Trans
b) Executive support system
c) Structure
Ans: MIS
50. All the 5 branches of hospital in delhi are incorporated to each other with center database, the
patient may visit any of these 5 branches with no passport , the medical history of patient is
available in any branches
a) Reading
b) clouding
51. Which of the following intrustment is not correct with respect of organizations management
a) Management level develop develop tactical plan
b) Senior manager is responsible for strategic planning and objectivesThe course in lien in
business the company will pursue
c) The number of management levels are fixed to three irrespective of size and structures:
d) supervisor management will oversee an control the daily activities an d function of tactical
plan
53. Auditor has discovered several …… user account management where there are many
indeterminate employee accounts that are still active, what is the best course of action
a) Improve the employee termination
b) Audit the termination process more frequently
54. As per electronic transfer act which is the maximum period the it is decide to use certificate to
issue digital subsection 2
a) 7
b) 15
c) 25
d) 21
55. What is the most important consideration for site selection of what site
a) Natural result
b) Time zone
c) Geographical location relation to primary set
d) Proxima
56. An organization experience frequent malware function infection in user workstation that are
receive through email despite the fact that the office have antivirus software what are the best
of measure to
a) Firewall
b) Antivirus on email
c) Web Browser
d) Increase in prevention system
57. During system testing in system development life cycle the software and other system element
are tested as whole , which of the following is not the type of system testing
a) Performing testing
b) System testing
c) Alfa testing
d) recovery security
58. An auditor is examining key management process and has found that IT department not
following the split custody procedure, what is the likely result
a) Two or more employee are sharing administrative account
b) One or more individual are in the process of entire password encryption
c)
59. Which section of electronic transfer act deals with the damage to any computer and information
system and punishment covered by its 1 st conviction
a) Imprisonment upto 3 yrs and fine upto 2000 sec 46
b) Imprisonment upto 5 yrs and fine upoto5000
60. Which of the following requires system development method that use the data orientation and
is concerned with understanding relationship among data can be excess and summarized in
variety of
a) MICS
b) Expert system
c) Transaction processing
d) Decision support system
61. The task of identifying and expressing system requirement is perform in which phase
a) System analysis
Ans: requirement phase
62. The document standard for EDI which 1 st developed by large business house during 1970s are
now control over
a) ISO
b) ANSI
c) ITUI
d) IEE