You are on page 1of 2

CHAPTER 1

Concepts of Governance and Management of Information Systems



1. Explain the key benefits of IT Governance achieved at highest level in an organization.

2. Write short notes on the following with reference to Governance Dimensions:
(i) Conformance or Corporate Governance Dimension
(ii) Performance or Business Governance Dimension

3. What do you understand by GEIT? Also explain its key benefits.

4. Explain the key functions of IT Steering Committee in brief.

5. Discuss the key management practices, which are required for aligning IT strategy with enterprise
strategy.

6. The success of the process of ensuring business value from use of IT can be measured by evaluating
the benefits realized from IT enabled investments and services portfolio and how transparency of IT
costs, benefits and risk is implemented. Explain some of the key metrics, which can be used for such
evaluation.

7. Explain the following terms with reference to Information Systems:
(i) Risk (ii) Threat (iii) Vulnerability (iv) Exposure (v) Attack

8. Define the following terms:
(i) Likelihood of threat (ii) Countermeasure (iii) Residual Risk

9. Briefly explain various risk management strategies.

10. Describe key management practices for implementing risk management.

11. Discuss the five principles of COBIT 5 in brief.

12. Discuss various categories of enablers under COBIT 5.

13. Discuss the areas, which should be reviewed by internal auditors as a part of the review of
Governance, Risk and Compliance.

14. Discuss the key management practices for assessing and evaluating the system of internal controls in
an enterprise in detail.

Exercise
1. Describe the major benefits achieved through proper governance in an organization.
2. What are the key governance practices that are required to implement GEIT in an enterprise?
3. Discuss key management practices, which are needed to be implemented for evaluating whether
business value is derived from IT in an organization.
4. COBIT 5 provides various management practices for ensuring compliance with external
compliances as relevant to the enterprise. Explain these practices in brief.
5. Discuss some of the sample metrics for reviewing the process of evaluating and assessing compliance
with external laws & regulations and IT compliances with internal policies.
6. Write short notes on the following:
(i) Role of IT in enterprises
(ii) Integrating COBIT 5 with other frameworks
(iii) Sample areas of review for assessing and managing risks
(iv) Evaluating IT Governance Structure and Practices by Internal Auditors

CHAPTER 8 - Emerging Technologies

1. What is Cloud Computing? Explain some pertinent similarities and differences between Cloud and
Grid computing.

2. Discuss the major goals of Cloud Computing in brief.

3. Describe Front end and Back end architecture with reference to Cloud Computing.

4. What do you understand by Public cloud? Also discuss its major advantages in brief.

5. What is Private cloud? Also explain its major advantages in brief.

6. Explain the following with reference to cloud computing:
(i) Infrastructure as a Service (IaaS), (ii) Platform as a Service (PaaS),
(iii) Software as a Service (SaaS), (iv) Network as a Service (NaaS), and
(v) Communication as a Service (CaaS).

7. Explain, in brief, the characteristics of Cloud Computing.

8. Briefly discuss the advantages of Cloud Computing.

9. Discuss any four challenges to Cloud Computing in brief.

10. Explain some of the tangible benefits of mobile computing.

11. Write short notes on the following:
(i) Hybrid Cloud (ii) Mobile Computing (iii) BYOD (iv) Web 2.0 (v) Green IT

12. The work habits of computer users and businesses can be modified to minimize adverse impact on
the global environment. Discuss some of such steps, which can be followed for Green IT.

Exercise
1. Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are two of the three main
categories of cloud computing. What's the third category? Explain in brief.
2. Explain Web 2.0 with their applications.
3. Explain Mobile Computing and BYOD with an example.
4. What is Green Computing? Discuss security issues of Green computing in brief.

You might also like