Enterprise Information Systems: Ntermediate Ourse
Enterprise Information Systems: Ntermediate Ourse
PAPER : 7A
Enterprise Information
Systems
BOARD OF STUDIES
THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA
All rights reserved. No part of this book may be reproduced, stored in a retrieval
system, or transmitted, in any form, or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without prior permission, in writing, from
the publisher.
Revised Edition : January, 2022
Website : www.icai.org
E-mail : bosnoida@icai.in
ISBN No. :
Price : `
Printed by :
iii
(c) Financial
(d) Reputational
15. A bank shares financial data of its borrowers with third-party without
consent of borrowers. Identify the rule of Sensitive Information and
Personal Data Rules, 2011 that bank has violated.
(a) Rule 3
(b) Rule 4
(c) Rule 5
(d) Rule 6
16. As an internal auditor of a steel company, Mr. Ajay observed that the
vendor supplying the material to manufacture steel has begun to
supply the damaged material. He reported this issue to the company’s
top management. Which of the following risk management strategy
would be followed by top management of company, if they decided to
seek for more capable supplier and leave the current supplier?
(a) Accept the Risk
(b) Transfer the risk
(c) Terminate the Risk
(d) Treat the risk
17. In the bi-annual meeting of DEF Hotel Group, the senior officials are
discussing risks that could impact hotel’s effective working in relation
to customer satisfaction and change integration. Which of the
following business risk is being discussed in the meeting?
(a) Financial risk
(b) Compliance risk
(c) Operational risk
(d) Hazard risk
18. Identify from the following controls that does not belong to
Information Technology General Controls.
(d) Godown
22. XYZ Ltd. is an ink manufacturing company that implemented
enterprise-wide information system to coordinate all resources and
activities required to complete various business processes. Choose the
main characteristic of ERP System from following.
(a) Separate data maintenance by each department
(b) Centralized Database
(c) No direct inter department communication
(d) No change in cycle time.
23. To sustain in today’s competitive world and make the business a
success, organizations are implementing ERP system and getting many
benefits from the same. From the following, which is not a benefit of
ERP?
(a) Information integration
(b) Reduction of lead-time
(c) Reduction in Cycle Time
(d) Enhanced Quality Costs
24. Mr. Rajesh has developed Accounting software for a private firm.
While explaining the benefits of software to company’s Management,
he made a false statement about the back end of software. Identify
from the following statements which he would have said about Back
End.
(a) Communicates with user directly
(b) Processes the data
(c) Communicates with front end directly
(d) Generates the report
25. Mr. X works on Financial and Accounting System of a private firm and
maintains different types of master data in the system. Which of the
following master data is not controlled by the user and depends on the
changes recommended by the government time-to-time?
36. JKM Pvt. Ltd. is an apparel manufacturing company well equipped with
ERP. MM group approached JKM Pvt. Ltd. with a requisition of 1000
pieces of female black formal suits. Mr. Y, a senior manager of JKM
Pvt. Ltd. wants to evaluate the current stock position and purchase
order pending position of his company before accepting the
requisition. Which of following module of ERP will help Mr. Y in this?
(a) Sales and Distribution Module
(b) Material Management Module
(c) Production Planning Module
(d) Supply Chain Management Module
37. VV Enterprises is a publication house that publishes kids’ newspaper,
reading and activity books. The management of VV Enterprises from
its R&D department demanded an analysis on consumer behaviour on
purchase of its publications during summer break and exam time.
Which of the following Data Analytical tool would be helpful to R&D
department?
(a) Machine Learning
(b) Predictive Analytics
(c) Data Mining
(d) Qualitative Data Analysis
38. Identify the false statement from the following statements on various
modules of ERP.
(a) Controlling Module evaluates the profit or loss of individuals.
(b) Sales and Distribution Module includes product enquiries,
placing order and scheduling activities.
(c) Plant Maintenance Module involves the process of planning the
production activities.
(d) Human Resource Module deals with financial entries like
advances or loan to employees.
(b) Encryption
(c) Decryption
(d) Logging
47. The data entry operator of GC College is responsible to enter the
amount of fees paid by the students. Accidentally, while making the
entry, the fee amount of Ms. X of the amount ` 9854 was entered as
` 8954 in the software, leading to the reverse of two digits in the
amount. Under Data Coding Control, which of the following error is
made by data entry operator in this case?
(a) Transposition Error
(b) Substitution Error
(c) Addition Error
(d) Truncation Error
48. As a system administrator of a newly established start-up KJL Ltd., Mr.
Kamal sets up its computer network in such a way that enables the
network to recover from any kind of error like connection failure, loss
of data etc. In computer network, which of the following term’s
definition takes care of the said activities?
(a) Routing
(b) Resilience
(c) Contention
(d) Bandwidth
49. Every time when a user attempts to gain access to and employs
system resources in an application, the chronology of each such event
is maintained. Which Application Control is responsible to do so?
(a) Boundary Controls
(b) Input Controls
(c) Communication Controls
(d) Processing Controls of Information Systems
(a) Android
(b) Blackberry OS
(c) Apple OS
(d) Chrome
62. In two-tier network architecture, ______________ is an interface that
allows user to interact with the e-commerce / m-commerce vendor.
(a) Presentation Tier
(b) Database Tier
(c) Physical Tier
(d) Application Tier
63. Ms. Komal a technical product developer at FEGO Ltd. suggested the
company to manufacture a model of self-driving car based on image
and text recognition. This is a good example of ______.
(a) Machine Learning
(b) Expert System
(c) Cloud Computing
(d) Mobile Computing
64. ABC Company as its business policy allows employees of managerial
level to use their preferred computing devices for business purpose.
While working, Mr. Suraj connected his laptop to company’s network
and an application virus infected the company’s database. Which of
the following risks best describes the above situation?
(a) Implementation Risk
(b) Network Risk
(c) Application Risk
(d) Device Risk
65. Mr. X is buying clothes for his kids at Royal’s Showroom. He makes
payment using BHIM (Bharat Interface for Money) App which is an
example of _________.
(iv) Using one of several connecting technologies, the new data are
transmitted from handheld to site’s information system where files
are updated and the new data are accessible to other system
user.
Identify from following the correct sequence.
(a) (i), (ii), (iii), (iv)
(b) (iv), (iii), (ii), (i)
(c) (i), (ii), (iv), (iii)
(d) (i), (iv), (ii), (iii)
69. If an organization wants to start its e-business in India, which of the
following law will regulate its practices that it does not engage in any
predatory practices?
(a) Indian Contract Act, 1872
(b) The Customs Act, 1962
(c) The Competition Act, 2002
(d) The Competition Act, 2004
70. In Cloud Computing, which instance of Software as a Service (SaaS)
allows users to explore functionality of Web services such as Google
Maps, Payroll processing and Credit Card processing services etc.?
(a) Testing as a Service (TaaS)
(b) Communication as a Service (CaaS)
(c) Data as a Service (DaaS)
(d) API as a Service (APIaaS)
71. Mr. Jayesh sets up an online start-up which is like conglomeration of
different shops situated in a convenient location of e-commerce where
customers can buy apparels, footwear, and fitness accessories.
Identify from the following, which type of e-market has he setup?
(a) Buyer Aggregator
(b) e-Mall
(c) e- Shop
(d) Portal
72. Ms. Radha started her business through a website www.tastyfood.com
wherein few food vendors and restaurants are associated with her as
the partner. The customers can place order for the food of his/her
choice of vendor through the website. This is a good example of ____.
(a) e-Auction
(b) Buyer Aggregators
(c) e-Mall
(d) e-shops
73. Taste and tasty, an online tiffin service vendor has started a new
policy wherein it provides certain credit points to customers whose
bills are above ` 1000 per order. Customers can avail these credit
points in the next order they place. Which of the following is taken
care by Taste and tasty tiffin service as an e-commerce vendor?
(a) Privacy Policy
(b) Marketing and Loyalty program
(c) Different Ordering Method
(d) Supply Chain Management
74. PMP Ltd. is a network service provider company that has consolidated
many physical servers into one large physical server to make the
effective use of its processor. Which of the following concept does this
refer to?
(a) Network Virtualization
(b) Grid Computing
(c) Storage Virtualization
(d) Hardware Virtualization
75. Which of the following statement does not belong to security
constraints of Grid Computing?
the company distributed the dividend received against IPO to all its
IPO holders from its bank account. Which of the following service is
used by the company?
(a) Electronic Clearing Services (ECS) Debit
(b) Electronic Clearing Services (ECS) Credit
(c) Advances
(d) Remittances
84. CBS has added many features to service delivery of a bank. Identify
the activity from the following that falls under its purview.
(a) On-line real-time processing
(b) Transactions are posted in batches
(c) Databases are maintained at branch level
(d) Loan processing is done at branch
85. The deployment and implementation of CBS is controlled at various
stages. In which of the following stage, bank should choose the right
solution considering various parameters to meet business objectives?
(a) Approval
(b) Support
(c) Selection
(d) Planning
86. ABC Ltd. is a financial company using the control ‘Logging the access
to sensitive data and regularly being reviewed by the management’ for
Information Security. Identify from the following risk for which this
control is being used by company.
(a) Unauthorized data access due to Trojans.
(b) Lack of Management direction.
(c) User accountability is not established.
(d) Security breaches may go undetected.
87. Which of the following statement best describes the concept of Money
Laundering?
(a) Converting proceeds of crime and projecting it as untainted
property
(b) Tax Planning as per provision of IT Act, 2000
(c) Gifting immoveable property to relatives
(d) Transferring fixed deposit to employees
88. IT Act, 2000 provides the legal recognition for transaction through any
means of electronic communication. Which of the following is not
computer related offence as per IT Act, 2000?
(a) Theft of confidential information in computer systems
(b) Removal, concealment, transfer, or delivery of property to
prevent tax recovery
(c) Credit Card fraud
(d) Source Code theft
89. The key provisions of IT related offences are for the smooth working
of bank. In purview of same, what is the primary objective of SPDI?
(a) Protecting Computer Software
(b) Securing critical Information
(c) Sensitive Personal Information
(d) Identifying sensitive Information
90. Which of the following activity risks is the computer related crime of
the banking sector of India?
(a) Breaking into ATM
(b) Physical theft at branch
(c) Software piracy
(d) Altering name in demand draft
94. KK cooperative bank has its four branches in Pune city. Each branch
confines itself to many key functions as mentioned below. Identify the
option which does not fall under the key functions of branches of KK
cooperative bank.
(a) End of Day (EOD) Operations
(b) Internal Authorization
(c) Quality Assurance
(d) Reviewing reports for control and error correction
95. Mr. Y has a savings account with S&N Bank. He used Internet banking
services of the bank first time with the login id and password as
provided by the bank to him. Immediately after the first login, he
changed his password. Which of the following server would store Mr.
Y’s password for further logins?
(a) Web Server
(b) Application Server
(c) Internet Server
(d) Internet Banking Channel Server
96. Money Laundering is defined as the process by which the proceeds of
the crime and the true ownership of those proceeds are concealed or
made opaque so that the proceeds appear to come from a legitimate
source. This process involves many stages as mentioned below:
i. Layering
ii. Integration
iii. Placement
Choose the correct sequence.
(a) i-ii-iii
(b) iii-ii-i
(c) ii-iii-i
(d) iii-i-ii
101. Mr. X and Mr. Y are employees of XYZ Ltd. In the office during lunch
time when Mr. Y was not on his seat, Mr. X stole the pen drive of Mr. Y
containing some confidential information. Under which of the following
section of Information Technology Act 2000, is Mr. X punishable?
(a) Section 66B
(b) Section 66C
(c) Section 66D
(d) Section 43
102. In case the management of an organization XYZ anticipates that the
impact and probability of occurrence of risk is very low, which risk
management strategy shall then be followed by XYZ?
(a) Tolerate the risk
(b) Terminate the risk
(c) Share the risk
(d) Treat the risk
103. The success of any Business Process Automation (BPA) shall only be
achieved when BPA ensures certain characteristics. Which of the
following is not included in those characteristics?
(a) Diligence
(b) Integrity
(c) Availability
(d) Timeliness
104. Mr. Anil is working with XYZ Company that is under the process of
adopting Enterprise Resource Management (ERM) framework. He
prepared a list of policies and procedures that need to be established
and executed to ensure that the risk responses that management
selected are effectively carried out. Which component of ERM is
referred here during this activity?
(a) Risk Assessment
(b) Control Activities
118. Sneha purchased a new dress for her birthday online from
fashionnpoint.com. She used internet banking facility by using her
username and password to make the payment for her dress. Which of
the following bank server will the transaction be referred to for
verification?
(a) Internet Banking Channel Server
(b) Internet Banking Application Server
(c) Web server
(d) Database Server
119. Identify the full-scale Banking solution which is scalable and integrated
that meets the deployment requirements in traditional and non-
traditional banking environments.
(a) Financle
(b) Flexcube
(c) bankMate
(d) Finnone
120. Money Laundering is commonly used by criminals to make dirty money
appear legitimate. In this context, which stage of Money Laundering
involves the bank transfers between different accounts in different
names in different countries making frequent deposits and
withdrawals?
(a) Placement
(b) Layering
(c) Integration
(d) Financing
Answer Key
Question No. Answer
1 (b) Identify manual processes
2 (b) Deals with the core business and value chain
as untainted property
88 (b) Removal, concealment, transfer, or delivery of
property to prevent tax recovery
89 (c) Securing Personal Information
90 (c) Software piracy
91 (b) Letter of Credit
92 (d) CBS has non-modular structure capable of
being implemented in stages as per bank’s
requirements.
93 (d) i,iii
94 (c) Quality Assurance
95 (d) Internet Banking Channel Server
96 (d) iii-i-ii
97 (b) Section 66D
98 (a) Organization Structure
99 (c) Web Server
100 (b) Compliance Risk
101 (a) Section 66B
102 (a) Tolerate the risk
103 (a) Diligence
104 (b) Control Activities
105 (a) Environmental Controls
106 (c) Installed Application
107 (a) Contra
108 (a) XBRL runs on XML technologies such as XML
schema and ensures that financial and non-
financial data is tagged to form a comparable
reporting format.
109 (a) Management Controls
110 (a) Data Cleaning
111 (a) Application Software
112 (d) Relational Database model
CASE SCENARIOS
1. Ind Milk Dairy is an Indian based Asia’s largest dairy product company
that got established in year 2014-15 that targeted a turnover of
` 50,000/- Crores by 2020-21. By the Financial year 2018-19, the
company had achieved a turnover of ` 33,150/- Crores. The Company
procures milk through various collection centers created at the level of
different villages state-wise. Each collection center is run by co-
operatives created in each district of the state. The total members of
these co-operatives are more than 1.5 Crores as on 31st April 2020.
Other than retail sales, few other major revenue sources of the
company are as follows:
- Department of Defence, Government of India
- Corporate Customers
- Export Customers
To achieve the target company’s turnover of ` 50,000/- Crores by
2020-21; Board of Directors of the company decides a two-prong
strategy - Business Strategy and System Strategy which are as
follows.
The Business Strategy includes the following:
- Launch new products.
- Get into new markets for existing products.
- Increase per capita consumption of products in existing market.
The System Strategy includes the following:
- Company needs to create infrastructure that could cater to ever
changing needs of business. This includes robust network
infrastructure as well as database configuration also.
- The proposed database structure needs to cater to needs of
business and to store complex data like identification of animals
through their images, health-card system etc.
- Creates a system to keep track of target on monthly basis.
(a) i – ii – iii - iv – v – vi
(b) ii – iii – iv – v – vi - i
(c) i – ii – iv – iii – vi – v
(d) ii – iii – v – iv – vi – i
3.3. Which of the following clause will not be a part of the KKLP
Ltd.’s Service Level Agreement (SLA) in case the company opts
to hire the services provided by a Cloud service provider?
(a) The responsibility of the service provider to maintain
data connectivity 24x7.
(b) The responsibility of the service provider for providing
alternative data recovery plan.
(c) The rights and responsibilities of both KKLP and service
provider towards the SLA.
(d) The responsibility of the service provider for storage of
data and data security.
3.4. The management of KKLP requires its IT manager to generate
an exception report on daily basis for those vendors who have
placed orders in excess to their permissible account limits and
to trigger a lock on their accounts from further operations,
which can be unlocked only by remitting funds to the extent of
the excess in limit. This activity can be done by the IT Manager
by ________.
(a) introducing a detective control for monitoring limits
versus order balances at account level for each vendor.
(b) introducing a preventive control for past due accounts
report on each day end basis at account level for each
vendor.
(c) introducing a detective control for variance reporting
and auto emailing system to all exception flagged
vendors.
4. XYZ Ltd. started as a small business company that in its early years;
sold homemade organic soaps, serums, face washes and creams. With
time, the company added more beauty products in its list and
launched its e-business through website. All the business processes of
the company are automated and therefore all the related data is
stored in various database tables are managed at the backend in
database. The company hired more employees to promote and sell its
products across the country and initiated selling its products through
5. PQR Ltd. is a grocery store that has multiple outlets in various cities
across the country. It has automated all its data processing activities
and maintains its entire data in an integrated data center. All data
processing activities, servers, backup, and recovery is managed by IT
department of PQR Ltd. All the devices are connected to company’s
network and communicate with each other using Unique Identification
Number.
The regular customers of grocery store have been provided a
membership number and a membership card. When a purchase is
made by a customer; all the details related to purchase are recorded in
database against that membership number. As a part of promotional
campaign activity, the PQR Ltd. offers various discounts and schemes
to draw attention of new customers and provides satisfactory services
to its existing customers. These schemes are developed by top
management of PQR Ltd. based on purchase patterns, market trends
and association of purchases done by customers. The company is
using software for this which provides the details that enable the top
management in efficient decision making.
PQR Ltd. maintains all the data in common database. The setting of
parameters and menu options to be displayed in the software is done
first time when the software is installed. A specific menu option can be
viewed or activated by authorized employees only. These access
restrictions are applied in software so that no user can access data
which he is not authorized to use. This is done to maintain the security
of the system.
The IS auditor appointed by the management, reviews the information
system, and recommends using real time audit which may help the
company to close the gap between occurrence of transaction and
review of transaction. This real time audit will also help in timely,
comprehensive, and cost-effective audit of the transactions. Based on
the recommendation of IS auditor, the company implements the
concurrent audit technique which tends to review all the updates in
database and replica in the system. It also traps exceptions in the
database management system.
Management of PQR Ltd. establishes the formal mechanisms to
monitor the working of software on regular basis. The company finds
some issues in processing and connectivity in the software. To resolve
these problems, the company modifies the programs according to
various reliable processing requirements. Latest changes made in the
software are according to upgradation of Operating system from
Windows 7 to Windows 10 in all its systems because some of the
modules of software were not compatible with windows 7.
Based on the facts of the case scenario given above, choose
the most appropriate answer to Q. Nos 5.1. to 5.5.
5.1. Which type of maintenance is done by the PQR Ltd. while
upgrading the Operating System from Windows 7 to Windows
10?
(a) Perfective Maintenance
(b) Corrective Maintenance
database which can be accessed online. All data and website of the
company are hosted on a cloud. The performance of the XYZ
insurance company about planning, implementation and monitoring of
computerization process has been reviewed by an IS auditor Mr. Anil
for past 5 years. The audit of Data Centre and Information System
department was conducted with a view to obtain a reasonable
assurance on accuracy and consistency of data. Existence and
adequacy of IT controls and network controls are also reviewed.
The audit was conducted at 12 various branches selected on random
basis. The audit was performed against various frameworks,
standards, laws, guidelines, and policies relevant to insurance business
as well as IT. Audit findings and recommendations of Mr. Anil that
were reported to Management are as follows:
i. All computers should be provided indirect network connections
with other networking services or servers.
ii. There is a need to make huge volumes of data available from
cloud at peak time.
iii. The controls that ensure the availability of system in case of
data loss due to unauthorized access and equipment failure etc.
are not adequate.
iv. There is a need to establish a mechanism to transfer the data
in an encrypted form so that it would be safe and other users
who are not authenticated cannot access that data.
v. Mr. Ajay dishonestly used electronic signature of the branch
manager of Z branch of Company and passed the false claim of
one of the buyers and allowed him to withdraw the funds. The
legal action must be taken against him.
vi. Special audit routines are advised to highlight and notify
suspicious records with frequent change in name and address
so that the system becomes less vulnerable to frauds like funds
withdrawal because of false claims.
9. HAK Systems Private Limited (HAKSPL) has two distinct business lines
– viz. Engineering Services and Cloud-based server solutions. The
Chief Operating Officer (COO) observed that the company is facing
many problems by keeping data on disparate systems which now
needs to be centralized. As a preliminary exercise, he prescribed
following operational rules which are as under:
i. Central database for the engineering business line to be
modelled on a relational database model deploying RDB -
Oracle. This software can be installed on each system to
maintain the database.
ii. The rules pertaining to a sale invoice is written as:
a. Invoice Amount: Primary Key
b. Invoice Date: Attribute
c. Product Name in Invoice: Relation
10. Small Bank Limited (SBL), Bhopal (MP) is registered as a Small Finance
Bank (SFB) with Reserve Bank of India (RBI), New Delhi which was
provided license under the Government of India’s initiative to promote
financial inclusion. SBL has started operations in April 2018 and has
100 branches spread across three states including Madhya Pradesh,
Rajasthan and Tamil Nadu. SBL balance sheet as on 31/03/2020 shows
following key performance parameters.
1. Advances: ` 550/- Crores (75% in category of agricultural
Advances)
2. Gross NPA (In %): 2.5%
3. Net NPA (In %): 0.5 %
4. Deposits under CASA Accounts: ` 1,000/- Crores
5. Number of CASA account holders: ` 2,50,000 Lakhs
6. Number of Employees: 450
ISSUE
SBL started their business operations immediately after getting the RBI
License. They started using a Banking ERP by the name SmlCBS (Small
Core Bank Solution System), launched by a company named VBank
Limited (VBL), Pune (Maharashtra) which has been selling its products
to various co-operative banks across India since 2005.
The software was purchased by SBL bank without going through the
formal process of benchmarking the software to bank’s strategic and
future business needs and launched its operations with lot of publicity
and fanfare. SBL Board had organized a public launch function for the
new software by inviting IT ministers of all three states where bank
has its operation.
Lately an article in a National Daily newspaper got published that
claimed that due to adoption of SmlCBS, there has been miscalculation
of interests on deposits of account holders’ saving bank accounts. The
article highlighted the details of few account holders of bank and
published a detailed report. The key facts published were as follows:
Example 1 Example 2
Name of Customer Mr. X, Mr. J, Salem
Satna (MP) (Tamil Nadu)
The newspaper published the June 2018 July 2018
account statement for month of
___.
Interest credited by bank ` 150.70 ` 3,825.20
Interest as per calculation ` 150.75 ` 3,825.25
called for a high-profile meeting and discussed the matter. At the end
of the meeting, the management took firm decision to get the bank’s
system audited by IS Auditors. Subsequently, Mr. Aman was hired to
conduct the audit which he completed and submitted his report with
following observations:
i. Many important reports like Asset Liability Management (ALM),
Cash Reserve Ratio (CRR), Statutory Liquidity Ratio (SLR)
reports are not being provided by the SmlCBS.
ii. SmlCBS does not have capability to add a new report that may
be needed in future.
ii SmlCBS does not have any disaster recovery plan.
iii SmlCBS does not provide mobile banking facility.
Mr. Aman recommended the management of SBL Bank to procure ne
Core Banking Solution. The board immediately decided to change the
software. SBL this time went through the due process of software
selection and implemented new software.
Based on the facts of the case scenario given above, choose
the most appropriate answer to Q. Nos 10.1. to 10.4.
10.1. The implementation of SmlCBS in SBL did not involve any
formal process whereas the CBS implementation needs to be
controlled and monitored. Which aspect of CBS deployment has
critically been compromised in this situation primarily?
(a) Support
(b) Selection
(c) Planning
(d) Testing
10.2. In purview of above case scenario, the published key facts in
the newspaper represented a fraudulent way of interest
calculation which was due to inherent weakness in system. This
would be classified as a ____________.
(a) Risk
(b) Vulnerability
(c) Threat
(d) Impact
10.3. The newspaper national daily pointed the error in interest
calculation where each account holder loses ` 0.05 (Five Paisa)
each month. It is most likely to be classified as ____.
(a) Spoofing
(b) Bomb
(c) Piggybacking
(d) Rounding Down
10.4. Mr. Aman’s report highlighted that SmlCBS does not have any
disaster recovery plan. In case of disaster, the bank may be
subject to grave risk. These types of risk are addressed through
having _________.
(a) Data Management Control
(b) Programming Management Control
(c) System Development Control
(d) Security Management Control
Answer Key
Question No. Answer
10.1. (c) Planning
10.2. (b) Vulnerability
10.3. (d) Rounding Down
10.4. (d) Security Management Control
(b) Effectiveness
(c) Efficiency
(d) Economy
11.2. The management of LMN Company would like to implement
overall business management systems with common database
to integrate all functional areas within the company and allow
information exchange and collaboration among all parties
involved in business operations. Identify from the following the
most effective system for this application.
(a) A Decision Support System
(b) An Executive Information System
(c) An Office Automation System
(d) An Enterprise Resource Planning System
11.3. ENY Company recommended general controls for successful
implementation of IT Systems in LMN Company Which of the
following statement represents an example of a general control
for a computerized system?
(a) Limiting entry of sales transactions to only valid credit
customers.
(b) Creating hash totals from Unique ID numbers for the
weekly payroll.
(c) Restricting entry of accounts payable transactions to
only authorized users.
(d) Restricting access to the computer center by use of
biometric devices.
11.4. As per the recommendations of ENY Company on Information
Technology General Controls (ITGC), the management of LMN
Co. decided to implement Segregation of Duties (SoD) as one
of the primary ITGC. Which of the following statements best
describes the importance of SoD?
12. Ridonix, a Pune based Data Analytics firm has a workforce of 15 data
scientists and 50 analysts and has been specializing in the field of
Finance and Costing analytics. It has served many major hotel chains
of the country and has been successful since its inception.
Ghoomo Hotels having a chain of 25 hotels all over India, was going
through a huge cash crunch and on the verge of closure. They
approached Ridonix to find solutions to reduce costs and implement
12.3. One of the biggest challenges for Ghoomo Hotel is the situation
where no corresponding update in the systems is occurring in
case of cancellations, thereby leading to huge revenue loss.
Which of the following tool would be best suited to Ghoomo
Hotel in order to keep pace with Ridonix’s advice?
(a) SCARF (System Control Audit Review File)
(b) Audit Hooks
(c) Audit Trail
(d) Integrated Test Facility (ITF)
12.4. With a strong ERP System in place as suggested by Ridonix,
which of the following controls would best curb the confidential
data misuse by its employees?
(a) Server Back Up Arrangement
(b) Network Access Control
(c) Role Based Access Controls
(d) Physical Access Controls
12.5. Mr. Rajesh and Mr. Ajay could gain the confidential data of
Ghoomo’s customers and misused it for profit making purpose.
Under which Section of Information Technology Act 2000 can
they be punished for misusing and selling the confidential data
they had access to?
(a) Section 67
(b) Section 66C
(c) Section 66D
(d) Section 43
Answer Key
The company reported revenue of ` 3.00 crores last year, and with
scale up of operations, it is projected that numbers would cross `
10.00 crores in the coming year.
Based on the facts of the case scenario given above, choose
the most appropriate answer to Q. Nos 13.1. to 13.4.
13.1. To save on IT infrastructure costs, 1K Pvt. Ltd. encouraged
employees its employees to continue working at their owned
devices at work. Which of the following would not be a risk
associated with this practice?
(a) Network Risk
(b) Loss of Device Risk
(c) Reduced IT Support
(d) Application Viruses and Malware
13.2. Referring to the case, which of the following phase in Inventory
Cycle is the pressure point for 1K Pvt. Ltd.?
(a) Production Phase
(b) Ordering Phase
(c) Delivery Phase
(d) Sales Return Phase
13.3. The flow of transactions’ data between the Dhan Bank’s server
and 1K Pvt. Ltd.’s server when a customer initiates a purchase
on the company’s website, include the following steps:
(i) Customer Places Order on Website.
(ii) Request flows to Payment Gateway.
(iii) Request for Bank’s confirmation is generated.
(iv) Order request sent to Merchant’s Server.
(v) Updated status on Merchant’s Server.
(vi) Confirmation sent to Payment Gateway.
14. ABC Ltd., a leading manufacturer of the Water Purifiers all over the
country having customized ERP System, decided to launch a new Wi-Fi
enabled water purifier “Purity” with UltraViolet Filters and advance
technology. The purifier Purity can be connected with the home Wi-Fi
and when the purifying agents deplete, the user may inform the
service agents of the company for which the management has already
outsourced the servicing process and Annual Maintenance Contract
(AMC) to different local agencies.
15. KPL Bank is a new entrant in the banking sector that got established in
2019, after getting approval from the Reserve Bank of India for setting
up a universal bank. The Directors decided to change the regular
banking style by adopting some of the new ideas which will assist in
catering to the market and gain competitive advantage over other
banks.
Act gives the power to the Reserve Bank of India to license new
banks to start operations?
(a) Reserve Bank of India Act, 1934
(b) Banking Regulation Act, 1949
(c) Prevention of Money Laundering Act, 2002
(d) Information Technology Act, 2000
15.2. As a part of risk management, the KPL Bank is deploying a
separate Information Technology organization structure with
proper segregation of duties for different personnel within IT
department. This type of risk management comes under which
control?
(a) Application Control
(b) Internal Control
(c) Semi-Automated Control
(d) Infrastructure Control
15.3. In the purview of the above case, KPL Bank wants to be better
equipped to minimize frauds and control exposure risks. Which
technology will help in examining those data sets?
(a) eXtensive Business Reporting Language
(b) MIS Reporting
(c) Data Analytics
(d) Grid Computing
15.4. As per the above, the application of KPL Bank named “mKPL” is
created to help the customers to perform the transactions at
their convenience. Identify the emerging technology on which
“mKPL” works?
(a) Cloud Computing
(b) Grid Computing
(c) Mobile Computing
Answer Key
Question No. Answer
16.1. (b) Directors of New India Global Healthcare
Private Limited
16.2. (c) Vulnerability
16.3. (b) Infrastructure as a Service (IaaS)
16.4. (d) Password of user should be blocked after
three unsuccessful login attempts.
its own limitation. Which of the following will fall under the list
of limitations of Mobile Computing?
(a) Ensuring reduced travel time for employees.
(b) Ensuring mobile workforce with remote access to work
order details.
(c) Increased information flow enables in improving
management effectiveness.
(d) The users’ disrupted access of information due to
insufficient bandwidth.
17.2. In the given scenario, suppose if there is a leakage of
sensitive/confidential data of any policy holder. Who will be
held liable to pay compensation for failure to protect
policyholder’s data under IT Act, 2000?
(a) Directors of CBZ Singapore Global Insurance Limited
(b) Shareholders of CBZ Singapore Global Insurance Limited
(c) Officer of Telecom Regulatory Authority of India
(d) Agents of CBZ Singapore Global Insurance Limited
17.3. Suppose you are appointed as an IS auditor of CBZ Singapore
Global Insurance Limited. When you are going to audit the
implementation of Physical Access Controls, which of the
following activity is not undertaken by you?
(a) You must check that the risk assessment procedure
adequately covers periodic and timely assessment of all
physical access threats.
(b) You must check whether the physical access controls are
adequately in place.
(c) You must examine the relevant documents such as
security policies and procedures are prepared.
(d) You must develop and document an overall audit plan
describing the expected scope and conduct of the audit.
Answer Key
Question No. Answer
17.1. (d) The users’ disrupted access of information due
to insufficient bandwidth.
17.2. (a) Directors of CBZ Singapore Global Insurance
Limited
17.3. (d) You must develop and document an overall
audit plan describing the expected scope and
conduct of the audit.
18. M/s XTC Ltd., a FMCG company dealing home care, personal care, and
health care products. The company has been seeing drop in sales over
past few years. Company has traditional distribution channels which
include wholesale dealers, retailers, and agents. Company has been
using a legacy integrated system since 2004. To get better
understanding for the reasons for decline in sales, XTC Ltd. decides to
appoint a consultant. The company appoints Ms. Venus Andromida
(Ms. VA) as business consultant.
Ms. VA has more than a decade of experience and is a MBA from IIMA
plus qualified CISA, CISM expert. Ms. VA has been given six months to
analyse the reasons for decline in sales and submit her report for the
same. Ms. VA submits her reports in two parts with Part one dealing
with identification of key reasons for business decline and Part two
proposing the solution to identified problems.
Report’s Part I: Ms. VA finds that Customer order execution
(Turnaround Time: TAT) is twice the market norms. In the present
system, retailers’ orders are accepted by sales representatives who
send the same to HO on email where the Sales head takes the
necessary actions. This process is having many human interfaces
leading to delay in supply of goods to customers once email has been
sent for orders. Many times, the received goods and ordered goods do
not match. All these factors result in untimely delivery of products
thereby leading to dissatisfaction amongst its customers.
Report’s Part II: Ms. VA suggested following solutions:
1. XTC Ltd. needs to implement ERP system that shall integrate all
departments of the company including key departments - Sales
and Distribution, Material Management, Financial Management,
Production and Planning and Costing & Human Resources. This
shall help the company optimize resource utilization and
increase profitability.
2. The proposed system shall have an online mobile APP enabled
system of order acceptance from retailers and wholesalers.
Mobile APP to be installed on all sales representative systems.
3. In the new system, the reorders levels for various products for
each wholesaler shall be preloaded individually to make
inventory management better. As soon as inventory level of a
product will reach reorder level, system will send a purchase
order for Re-order Quantity/Economic Order Quantity to
vendor. This shall significantly reduce the Turnaround Time.
Based on the facts of the case scenario given above, choose
the most appropriate answer to Q. Nos 18.1. to 18.3.
18.1. Ms. VA proposed to implement ERP System in XTC Ltd. with an
objective of getting benefitted in terms of various aspects.
Identify the factor not achieved with ERP implementation.
(a) Reduction in Cycle time
(b) Better utilization of resources
(c) Enhanced decision-making capability
(d) Reduced implementation time
18.2 Ms. VA in first part of her report mentioned the increase in
customer dissatisfaction due to delay in product delivery to
customers. Which type of business risk applies to such event?
(a) Operational Risk
(b) Hazard Risk
(c) Compliance Risk
(d) Technology Risk
18.3. Ms. VA suggested in her report that XTC Ltd. shall implement
ERP system to manage its database in centralized manner.
Identify which amongst the following is not an advantage of
Database Management System.
(a) Minimizing data redundancy
(b) Enhanced Data sharing
(c) Program and file consistency
(d) Independent file formats
Answer Key
Question No. Answer
18.1. (d) Reduced implementation time
18.2. (a) Operational Risk
18.3. (d) Independent file formats
20. KD Health and Medical Care Limited provides a medical health check
and other medical outsource services to its various its
clients/customers that includes pharmacists, physicians, patients,
educational institutions, day care establishments, government agencies
and insurance companies. The company is located in Agra with all its
100 employees living on the private land space situated at Agra.
The Company has a policy of allocating the super-user password to
General Manager (GM) in Finance Department. The same is defined in
the Job Profile of GM (Finance) who is responsible to supervise the
allocation, deletion, modification, and suspension of user rights to
employees based on approvals made by HR Department. On 26th
September 2018; the General Manager (Finance) resigned from the
Company and on 1st October 2018; a new joinee who joined the
company as GM was given another super-user password.
In due course of time, the Company hired Mr. John as its internal
auditor in the month of March 2019. After the due procedure, he
submitted his draft IS Audit Report to Chief Executive Officer (CEO)
and Managing Director highlighting following key control issues:
♦ There is no basic configuration in the accounting system to
restrict cash payment in excess of ` 10,000/- that result in the
expense being disallowed as a business expense. That shall
lead to increase in the tax liability of the company.
(b) Section 46
(c) Section 66D
(d) Section 75
21.2. Suppose you are appointed as an IS auditor by SMS Limited for
auditing its Information Systems. You are determining what
controls are exercised to maintain data integrity for which you
might also interview database users to determine their level of
awareness of these controls. Which of the following Control are
you working on?
(a) Data Resource Management Control
(b) Security Management Control
(c) Operation Management Control
(d) Quality Assurance Control
21.3. SMS Limited has taken various types of insurance coverage for
safeguarding of its assets and to avoid unexpected future
liabilities due to uninterrupted event or disaster. These
insurance coverage falls under which type of specific risk
management strategy.
(a) Terminate the Risk
(b) Mitigate the Risk
(c) Accept the Risk
(d) Share the Risk
21.4. In order to protect its critical data from virus attack; SMS
Limited decided to limit the access to the social networking
sites by its employees in future. What type of risk response the
company exercised in this case?
(a) Terminate the Risk
(b) Treat the Risk
(c) Tolerate the Risk
(d) Transfer the Risk
Answer Key
Question No. Answer
21.1. (c) Section 66D
21.2. (a) Data Resource Management Control
21.3. (d) Share the Risk
21.4. (b) Treat the Risk
24. ABC Capital Finance Limited (ACFL) was inaugurated on 21st July 2019
with its Head Office/Corporate Office situated at Mumbai. The
Company is registered with the Reserve Bank of India (RBI) as a Non-
Banking Financial Company vide. Certificate No. N-13.14.2019. The
Company is primarily engaged in Lending Business. There are 10
Regional offices and 255 branches located all over the country that use
various types of remote access information systems for smooth and
fast processing of different types of loan applications all over branches
and regional offices.
Company has adopted an internal control work in line with section
134(5)(e) of the Companies Act, 2013 and as per Clause 49 V(C) and
(D) of SEBI, Equity Listing Agreement ensuring the orderly and
efficient conduct of its business, including adherence to the Company’s
policies, safeguarding of its assets and prevention and detection of
frauds and errors, accuracy, and completeness of Information to
various stakeholders. Company is hosted on a robust Data Centre (DR)
and Disaster Recovery Centre has been designed on fundamental
principles – data security, data integrity, data availability and data
scalability and has strict information security procedures. The company
periodically reviews the potential risks however they are considered
Cloud Computing using the cloud type - which is small, most secure,
controlled, maintained internally, and used to perform critical activities of
the company. For every new project undertaken by them, the functional
requirement documents are prepared, and the initial design requirements
are communicated to programmers via algorithms and flowcharts. All the
customer requirements are tracked, assembling materials are ordered
and the details regarding entire cost incurred for training, research and
full-fledged development of the product are managed through the
implemented SAP ERP system.
Furthermore, different versions of all the documents and white papers
related to the ongoing research are stored in the Relational Database
Management Systems (RDBMS) Teradata warehouse periodically to
maintain record of all the changes a said project undergoes during its
entire life cycle. Such methodology enables SciLabs to maintain and
compare the data between different time periods based on the time
stamps the data is stored in the data warehouse. SciLabs has also
implemented stringent controls so that the high-level architectural
diagrams of the new project are kept with utmost confidentiality.
Based on the facts of the case scenario given above, choose the
most appropriate answer to Q. Nos 26.1. to 26.5.
26.1. Flowcharts are used by SciLabs to communicate the
requirements to the programmers. Which among the following
would be the initial step in developing flowcharts?
(a) Identifying the activities in each process step.
(b) Preparing an initial rough diagram.
(c) Identifying the business processes to be documented.
(d) Identifying the starting point of the process.
26.2. SciLabs uses SAP ERP system, one of its modules that enables
to create detailed scheduling, material requirement planning,
and refine production integration. Which of the following
module of SAP ERP support all these features?
(a) Material Management
(b) Supply Chain
Answer Key
Question No. Answer
26.1. (c) Identifying the business processes to be
documented.
26.2. (b) Supply Chain
26.3. (b) Time Variant
26.4. (b) Public Cloud
26.5. (b) Section 43
on Turn-Around-Time
(TAT).
The business Management highlights this as an
managers need to be essential feature of being able to
3 provided MIS reports generate relevant MIS reports
on demand. through proposed system.
Apart from above issues, the company extracts the relevant data on
market trend of homemade and organic spices and purchase pattern
of customer of these products. Also, the cybercrimes and their counter
provisions under IT Act, 2000 governing e-commerce transactions are
to be considered while developing the new system.
Based on the facts of the case scenario given above, choose
the most appropriate answer to Q. Nos 28.1. to 28.5.
28.1. TAT represents the time gap between receipt of order and
dispatch of order and considered to be an important factor in
Order to Cash process flow. The phases of Order to Cash
business process are as follows:
(i) Customer Order
(ii) Order fulfilment
(iii) Collections
(iv) Accounting
(v) Invoice
(vi) Delivery Note
Choose the correct set of phases of order to cash business
process flow wherein the TAT can be applicable.
(a) (i), (ii),(vi),(v),(iii),(iv)
(b) (i),(ii),(v), (vi),(iii),(iv)
(c) (ii),(iv),(v),(vi),(i), (iii)
(d) (ii),(iii),(iv),(v),(i),(vi)
28.2. In the proposed system, the business managers shall have the
facility to generate relevant MIS reports. Identify the incorrect
about Management Information System (MIS).
(a) Business mangers rely on reports to evaluate
businesses’ daily activities and make decision.
(b) The warehouse mangers require MIS reports to gain
information about product inventory and shipping
information.
(c) Finance and accounting managers would require
information about sales revenue and business expenses.
(d) Different MIS reports automatically suggest the best
solution to its stakeholders.
28.3. The company does not have its own website and hence the
management of HEALTHY MAASALA Ltd. decides to sell its
products through online intermediary merchants like Amazon
and BigBasket etc. Identify the business model of e-Commerce
being used by the company in this case.
(a) Business to Consumer e-Commerce
(b) Business to Business e-Commerce
(c) Consumer to Business e-Commerce
(d) Consumer to Consumer e-Commerce
28.4. In purview of above case scenario, the management of
HEALTHY MAASALA Ltd. observes that the company must
follow IT Act, 2000 that provides the legal recognition for all
transactions that are made electronically. As per IT Act 2000;
which of the following activity does not fall under the purview
of computer related offences?
(a) Violation of Privacy
(b) Stealing Computer resource and computer source
document
30. Sweet & Sour is a well-established food chain with five branches at
different locations within Delhi. In 2018, the management decided to
start a tiffin service with 24x7 facility on regular basis. To do so, they
decided to acquire software which would be an online assistant to its
customers by providing them complete detail about their services. The
Management asked its manager to present them a report mentioning
the benefits, risks and control objectives and above all highlighting any
changes that are required in the working of food chain. The
Answer Key
Question No. Answer
31.1. (b) Operational Risk
31.2. (d) Testable Business Rules
31.3. (c) Security Analyst
31.4. (b) Platform as a Service
31.5. (c) Unique Id is created for each asset.
33. M/s TAS & Sons is an automobile manufacturer of spare parts of four
wheelers in India. The company does the business in both offline and
online mode. The company has four manufacturing units in various
locations across the country. It also has two branch offices located in
Pune and Hyderabad to handle activities like orders, delivery, complaints,
and stock operations. Sometime ago, the company’s business processes
like accounting, purchase, sales, and inventory were maintained in
manual mode. The management of the company observed that the
manual processing of these activities hinders the overall working of the
business-related daily operations. This resulted in a huge gap in the flow
of information, pending orders, delayed deliveries, and delayed decision
making due to lack of business reports and therefore overall non-
performance.
Therefore, the management committee decides to adopt the process of
automation of its various processes so that information flow would be
timely and consolidated within its branches and manufacturing units. To
attain this objective, the service models of Cloud Computing are proposed
to be adopted so that the branches and manufacturing units are
interconnected with centralized mechanism of data sharing and storage.
The proposed system with well-implemented access controls will provide
robust data security among its systems of branches and manufacturing
units. Not only the record keeping, but also data maintenance and
reports generation would become simpler after the implementation of
proposed system. The management is looking for better prospects of
adhering to the legal compliances of the country and also to initiate its
business operations through online mode.
The company hires a consultant Mr. Sumit to carry out the Feasibility
study of its proposed system who prepares a feasibility report and
submitted the same to the management. Based on the go ahead report
of Mr. Sumit’s report, a project team is constituted who will work under
him to execute the project and ensure its delivery on time.
35. XYZ is a well - established food chain with ten branches at different
locations within Delhi. The company wants to come out with an IPO
(Initial Public Offering). The Management asked the Financial Manager to
present a report pertaining the benefits, risks, and control objective and
above all if there is any change required in the working of food chain.
XYZ has decided to buy software which will be an online assistant to
customers and will provide them complete detail about the IPO and
solve their queries. In order to avoid any delay in its operation, XYZ
has bought the digital signatures for its authorized members of