BBIT 307 INFORMATION SYSTEMS AUDIT MANAGEMENT KCA Past Paper

UNIVERSITY EXAMINATIONS: 2016/2017
EXAMINATION FOR THE DEGREE OF BACHELOR OF
BUSINESS IN INFORMATION TECHNOLOGY
BBIT 307 INFORMATION SYSTEMS AUDIT &MANAGEMENT
FULL TIME/PART TIME/DISTANCE LEARNING
DATE: DECEMBER, 2016 TIME: 2 HOURS
INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions.

QUESTION ONE – COMPULSORY (30 MARKS)
a) What are some of the characteristics of a system auditor? [2 Marks]
b) Audit planning consists of both short- and long-term planning.
(i) Describe each type mentioned above [2 Marks]
(ii) There are four major factors that affect planning. Describe them. [8 Marks]
c) Overview of the Risk-based Approach Consists of several steps. Describe them as they
follow on another and elaborate each step. [5 Marks]
d) What is ‘concept of materiality’ in relationship to system auditing? [3 Marks]
e) Describe what you understand by data forensics in system auditing [4 Marks]
f) The framework for the ISACA IS Auditing Standards provides for multiple levels, as
follows:
(i) Standards
(ii) Guidelines
(iii) Procedures
Describe each of the above and give one example of each. [6 Marks]
QUESTION TWO
a) Controls are generally categorized into three major classifications. Mention these
three and give an example of each in relation to information systems environment.
[6 Marks]
b) (i) What do you understand by COBIT? [2 Marks]
(ii) CobiT is grouped into four major domains. Name them and give an example
of each. [8 Marks]
c) Identify any four benefits of an organization having an information auditor.
[4 Marks]
QUESTION THREE
a) Describe and give an example of each term and if possible show the relationship in a
well labeled diagram.
i. Contingency planning
ii. Incident response
iii. Disaster recovery
iv. Business continuity
[8 Marks]
b) Discuss in detail the information system audit process. [10 Marks]
c) An Information system auditor encounters several computer forensic scenarios in the
course of his work. Discus two common scenarios in the field [2 Marks]
QUESTION FOUR
a). Describe any six steps that guide an auditor while undertaking the audit tasks.
[6 Marks]
b). Outline four procedures for testing and evaluating information System controls
[4 Marks]
c). Describe three guidelines that assist system auditors detect and deter fraud
occurrences in an organization [6 Marks]
d). Discuss when and how an information system firm should retain a data forensic
expert. [4 Marks]
QUESTION FIVE
a). Briefly state three characteristics of a data forensic expert. [3 Marks]
b). There are numerous factors that a system auditor ought to put into consideration when
undertaking their duties. Discuss any three. [3 Marks]
c). Discuss five steps a data forensics firm goes through while reviewing a case
[5 Marks]
d). Discuss three functions and facilities built-in to well designed computer systems to
make the systems auditors job easier. [9 Marks]

(Visited 117 times, 1 visits today)
Share this:

Written by