GM Test Series: Top 50 Questions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 76

GM TEST SERIES

CA-Inter New Course


Top 50 Questions

EIS AND SM

Contact No. -9070800090 Email id – [email protected]


Page 1

CA INTER NEW COURSE

EIS AND SM

TOP 50 QUESTIONS

Q-1 Write a short note on the general ledger process and list the various steps involved in it.

Q-2 Mr. Suresh Kumar is a qualified commerce graduate working in Kartar Logistics &
Transports, a goods transportation company located in Punjab State. In the search of better
career opportunities, he recently appeared in a job interview conducted at P&G. Ltd., one of
India’s largest FMCG Company. During the job interview, an interviewer asked Mr. Suresh to
explain the Procure to Pay business process and list the risks and control objectives of Procure
to Pay (P2P) business process at the Masters level that an organisation should consider. Prepare
an appropriate draft reply.

Q-3 After qualifying the Chartered Accountancy examination, Mr. A got an interview call from
Hindustan Plastics, a large plastics and metal tools maker. During a job interview, an
interviewer asked Mr. A to explain the with Order-To-Cash (O2C) business process and list out
all the risks and their controls associated with Order-To-Cash business process at transactions
level. Prepare an appropriate draft reply.

Q-4 Cybercrime is no different from the traditional crime and the only difference is that in
cybercrime, computer and technology is involved. In the light of above statement, mention any
six cybercrimes that are being faced by individuals and organisations.

GMTESTSERIES.COM®
Page 2

Q-5 Mr. Bhavesh is the managing director of Bhavesh Textile Ltd., a large family owned
business. Considering the needs of the business, Mr. Bhavesh is considering to automate the
order receipt and delivery system of the company. In this process, company has determined
the objectives and goals to be achieved from the BPA exercise. What is the next step company
should consider in this regard? Explain briefly with the aspects needed consideration for the
same.

Q-6 A renowned travel agency ABC Private Ltd. wishes to implement an automated Grievance
Management System at its workplace to manage and handle the problems with an aim of
solving them. Determine the major benefits that will be drawn out of automating this Grievance
related business process.

Q-7 Bharat Plastics is a manufacturing company having good sales. To improve the efficiency
and reduce the overall time, it wishes to automate its purchase order generation process. One of
the purposes of automation is to provide better service to its customers. Prepare a list of
various steps that are required to be taken while automating the purchase order generation
process & explain each of the steps briefly.

Q-8 Though Human Resource (HR) Department plays a important role in development of any
enterprise, yet it has certain risks associated at every stage of its life cycle. Describe all the
risks related to Human Resource Department.

Q-9 In an organization, effective risk management procedure is very critical for its survival and
success and involves identification of high-level risk exposures and their analysis. Discuss all the

GMTESTSERIES.COM®
Page 3

risk management strategies available out of which the Senior Management of an organization
may choose to adopt for their organisation based on the analysis of risks.

Q-10 Enterprise Risk Management (ERM) may be defined as a process, affected by an entity’s
Board of Directors, management and other personnel, applied in strategy setting and across the
enterprise, designed to identify potential events that may affect the entity, and manage risk to
be within its risk appetite, to provide reasonable assurance regarding the achievement of entity
objectives. List the various benefits of Enterprise Risk Management

Q-11 ERP implementation is the difficult task as the organization which is in the process of
implementing ERP should keep abreast of latest technological development. Describe the
different risks associated with technology while implementing ERP.

Q-12 What are the types of access rights that can be granted to different employees with
respect to the master data, transaction data and reports of the organisation? Mr. Alok is the
HR Manager of Bharat Tools Ltd., a manufacturing company. According to you what kinds of
access rights that can be granted and what access rights that can be denied to Mr. Alok.

Q-13 Mr. Sarvan is the Chartered Accountant who recently got an assignment of conducting
the audit of an ERP system of BRD Ltd. You are required to list some of the questions that Mr.
Sarvan should ask during the ERP system audit of BRD Ltd.

Q-14 Business Intelligence assists the company in better planning their business affairs and is
getting more and more significant in today’s world. Analyze the statement “The potential
benefits of Business Intelligence (BI) programs include improved decision making; boosts

GMTESTSERIES.COM®
Page 4

business performance; improves operational efficiency; driving new revenues; and gaining
competitive advantages.” Determine its justification and also explain some of the BI tools in
brief.

Q-15 List some of the tasks that can be performed by the XBRL software.

Q-16 List the various benefits of the cyber law from the perspective of e-commerce in India.

Q-17 List the various vouchers used in the inventory module of the accounting software and
also mention their uses.

Q-18 Write a short note on voucher. Also list some of the points to be considered in voucher
numbering.

Q-19 State the main reasons that why separate front-end and back-end is needed in the
software.

Q-20 Discuss the different ways in which Database Administrator (DBA) can store the data of
ABC enterprise which is planning to implement Accounting Information System (AIS).

Q-21 What is data mining? Also steps what are the steps involved in Data Mining Process?

Q-22 What are the criteria’s to be meet by the MIS Reports to be useful for the organisation?

GMTESTSERIES.COM®
Page 5

Q-23 List some of application areas of Data Analytics.

Q-24 Write a short note on programming management controls mentioning the phases and the
associated audit trails.

Q-25 The IS auditor who is performing a comprehensive audit of an organization's information


system & network system needs to perform a "points of presence” audit to discover what
information is available about the organization’s Internet presence. Briefly explain.

Q-26 Mr. Avinash has recently joined a Manufacturing company where he has been briefed
about the functioning of different modules like Financial Accounting, Sales & Distribution,
Human Resource, Material Management, Production Planning, Plant Maintenance, Customer
Relationship etc. by the management. You are required to prepare a brief description on the
Financial Accounting Module stating its key features on behalf of Mr. Avinash.

Q-27 What are the different activities involved in the sales and distribution process? Mention
through a diagram. No explanation is required. Also briefly explain the pre-sale activities
involved in the sales and distribution process.

Q-28 Mr. A is a System Administrator of the company who must ensure the protection of
Operating System used in information system of the company. How can this purpose be
achieved?

GMTESTSERIES.COM®
Page 6

Q-29 Database Management System (DBMS) provides the facility to create and maintain a well
organised database for any enterprise. Describe the various advantages of Database
Management System used in an organization.

Q-30 What is big data? Also list some of the benefits of big data processing.

Q-31 Write a short note on the following E-Com Business Models

(i) e-Shops
(ii) e-Malls
(iii) Buyer Aggregators

(iv) Virtual Communities

Q-32 List any seven risks associated with E-Commerce.

Q-33 Briefly explain cards as the traditional method of digital payment.

Q-34 What are the limitations of Mobile Computing?

Q-35 What is Bring Your Own Device (BYOD)? Also list some of the advantages of BYOD.

Q-36 Discuss various Commercial Laws that govern e-Commerce or m-Commerce transactions in
India.

GMTESTSERIES.COM®
Page 7

Q-37 The Prime Minister Office of a country X plans to establish specific infrastructure setup
with its access shared amongst members of the group constituting of some selected high-
profiled dignitaries and officers from different ministries. The objective of the group is to carry
out certain assignments related to nation’s security and integrity. Which is the most suitable
choice of the cloud under Cloud Computing? Discuss its advantages and limitations as well.

Q-38 ABC university wants to conduct online exams for its different courses for which a
contract is given to vendor XYZ. The vendor provides computing resources such as processing
power, memory, storage, and networks to ABC university users to run their online exam
application on-demand. Identify the Service Model of Cloud Computing that vendor XYZ is
providing to ABC university and also describe its characteristics.

Q-39 Write a short note on Segregation of Duties. Also mention any three Segregation of Duties
Controls.

Q-40 The management of the company PQR wants to get audit of its Logical Access controls
that are implemented in the company’s infrastructure and information systems. As an IS
Auditor, determine the checklist while Auditing User Access Logs.

Q-41 Write a short note on Internet Banking Process.

Q-42 Write a short note on the risk and controls in the loans and advances process.

GMTESTSERIES.COM®
Page 8

Q-43 A Book Publisher offers discount to customers on the basis of customer type and number
of copies ordered as shown below:

Customer Type Number of Copies Ordered Discount %


Book Seller More than 10 25
Less than or equal to 10 15
Library More than 5 20
Less than or equal to 5 10
Customer number, name, type, book number, number of copies ordered and unit price are
given as input. Draw a flowchart to calculate the net amount of the bill for each customer and
print it. The above is to be carried out for 50 customers.

Q-44 Write a short note on configuration in the context of CBS software.

Q-45 Write a short note on Machine Learning. Also list any five application areas of Machine
Learning.

Q-46 There are various stages involved in the deployment & implementation of CBS. These
stages should be controlled at various stages to ensure that banks automation objectives are
achieved.

Q-47 Internal controls must be integrated in the IT solution implemented at the bank’s
branches to mitigate risks. State few examples indicating the internal controls in banks.

Q-48 E-commerce business is subject to various risks and it is necessary to protect it from those
risks. As an IT consultant, you are required to give some tips to an aspiring e-commerce vendor
so that his business can be protected from intrusion.

GMTESTSERIES.COM®
Page 9

Q-49 Do the growing reliance on technology, IT risks are becoming major security threats for
the banking industry. Write a short note on the IT Controls in Bank.

Q-50 Make a diagrammatic representation of Business Process Flow of Current & Savings
Accounts (CASA).

Q-51 Write the advantages of simple organisational structure. How simple structure results in
competitive advantage compared to larger rivals?

Q-52 Write a short note on logistics management and mention few of the advantages that the
business organisation would get by following the logistics management approach.

Q-53 “Supply Chain Management is conceptually wider than Logistic Management”. Explain.

Q-54 Explain the differences between three levels of strategy formulation.

Q-55 Amit Ltd., a well-known manufacturing company, is preparing to draft the strategy for the
next period. Its manager is advised about considering the competitive landscape of Amit Ltd.
What are technology leader firms? Also list major points Manager should consider in the
determination of the competitive landscape of Amit Ltd.?

Q-56 It is considered that business policy is the starting point in the evolution of strategic
management. How Business Policy evolved into Strategic Management? Explain briefly.

GMTESTSERIES.COM®
Page 10

Q-57 Define the term strategy. Is strategy substitute of management? Briefly explain.

Q-58 Strategy formulation is the part of overall strategic management process. Differentiate
between strategy and strategy management.

Q-59 Do you agree with the statement that “Strategic Management concepts are of no use to
Government organizations and Medical organizations”? Explain with reasons.

Q-60 Differentiate between the Strategy Formulation and Strategy Implementation.

Q-61 What is the purpose of SWOT analysis? Why is it necessary to do a SWOT analysis before
selecting a particular strategy for a business organization?

Q-62 B Ltd. wants to implement supply chain management in its organisation. List the steps
involved in implementing the Supply Chain Management System.

Q-63 An organization’s recruitment, training, performance appraisal and compensation


practices can have a strong influence on employee competence and performance. Elaborate
briefly.

Q-64 Determine the worth of A Ltd. considering the following details:


Particulars (Rs in Lakh)
Registered share capital 200
Paid-up share capital 140
Total Retained Earnings 80
Consider the following additional information:

GMTESTSERIES.COM®
Page 11

(a) A Ltd. has received total ₹200 Lakhs from the shareholders in the form of paid-up share
capital.
(b) An valuation firm has estimated the goodwill of ₹50 Lakhs of A Ltd. which the company
thinks is a conservative estimation.

(c) There is total inventory worth ₹20 Lakhs but its realisable value is just ₹16 Lakhs.

(d) A Ltd. also considers that assets worth ₹12 Lakh is overvalued and represented in asset side
with the amount of ₹18 Lakhs.

(e) Other fictitious assets of 6 Lakhs is to be considered.

Q-65 Briefly explain forward linkage & backward linkage in the context of strategy formulation
& implementation.

Q-66 Define the term industry along with some examples of industry. Also list few factors that
can be considered as the dominant economic features of the Industry

Q-67 B Ltd. is considering entering into the automobile industry. As competition is very intense,
the management is reluctant to take any quick decision about the expansion. You as a
consultant are required to explain what is key factor in the context of an industry

Q-68 Write a short note on Strategic Group Mapping and explain the procedure for
constructing a strategic group map.

Q-69 M Ltd. used to earn high profit compared to the industry average & one of the reasons
was it was able to create competitive advantage by integrating resources & capabilities
properly. But gradually its performance declined & it fallen into losses. What are the factors on
which the sustainability of competitive advantage depends?

GMTESTSERIES.COM®
Page 12

Q-70 Briefly explain about market penetration and market development in the context of
Ansoff’s Product Market Growth Matrix.

Q-71 Rohit Sodhi runs a charitable organisation for promotion of sports in the country. His
organisation conducts regular free training camps for youths interested in playing cricket,
football, hockey, badminton and so on. Many of his trainees have reached national level
contests. Rohit noticed that with success of IPL (Cricket) tournament there is an increasing
trend to extend similar format in other sports as well. He wishes to know how the development
is going help sports and to which industries it will offer opportunities and threats.

Q-72 Rahul is Managing Director of T Ltd. which is manufacturing trucks. He is worried about
the entry of new businesses. What kind of barriers will help Rahul against such a threat?

Q-73 ‘Coffee Beans’ is a coffeehouse chain that operates across the globe in different countries.
‘Coffee Beans’ has adopted a strategy to build business by establishing product uniqueness or
qualities and gain competitive advantage based on features of its offerings in coffee business.
Which type of strategy ‘Coffee Beans’ has adopted?

Q-74 Zumba Robots, an electronic robot manufacturing company is a leader in its business
segment. Over a period of time, it started losing its grip on the market as its overall position
started to weaken. Discuss the type of audit that you would like to suggest to analyse the
situation of the company?

GMTESTSERIES.COM®
Page 13

Q-75 Telecom industry is growing at a rapid speed in India. There is a cut throat competition
among the service providers in the industry. Identify the capabilities that will best serve as a
source of competitive advantage for a firm over its rivals?

Q-76 Value for Money’ is a leading retail chain, on account of its ability to operate its business
at low costs. The retail chain aims to further strengthen its top position in the retail industry.
Marshal, the CEO of the retail chain is of the view that to achieve the goals they should focus on
lowering the costs of procurement of products. Highlight and explain the core competence of
the ‘Value for Money’ retail chain.

Q-77 Rohit Patel is having a small chemist shop in the central part of Ahmedabad. What kind of
competencies Rohit can build to gain competitive advantage over online medicine sellers?

Q-78 Mr. Shridhar Khanna who is running a medium size cloth manufacturing business in
Panipat wishes to understand the driving forces that trigger change. He has sought advice from
you and wishes to know common driving forces. Briefly explain.

Q-79 Shri Alok Kumar is having his own medium size factory in Aligarh manufacturing hardware
consisting handles, hinges, tower bolts and so on. He has a staff of more than 220 in his
organisation. One of the leading brand of Hardware seller in India is rebranding and selling the
material from his factory. Shri Alok Kumar, believes in close supervision and takes all major and
minor decisions in the organisation. Do you think Shri Alok should take all decisions himself?
What should be nature of decisions that should be taken by him.

Q-80 Vastralok Ltd., was started as a textile company to manufacture cloth. Currently, they are
in the manufacturing of silk cloth. The top management desires to expand the business of the

GMTESTSERIES.COM®
Page 14

cloth manufacturing. To expand they decided to purchase more machines to manufacture


cotton cloth. Identify and explain the strategy opted by the top management of Vastralok Ltd.

Q-81 Write a short note on vertically integrated diversification explaining Forward Integration
and Backward Integration.

Q-82 “A strategic vision is a road map of a company's future." Comment. Draft a strategic vision
statement of any well-known national level Educational Institution you know.

Q-83 How product life cycle can be used in the diagnoses of a portfolio of product or business?
Explain.

Q-84 How Business Process Reengineering differs from the other process improvement
methods? Explain briefly.

Q-85 Define the term benchmarking. Also briefly explain the steps involved in the
benchmarking process.

Q-86 Entrepreneur & Intrapreneur are the buzzing words today. Differentiate between
Entrepreneur & Intrapreneur.

Q-87 List the issues which are to be considered in the strategy implementation.

Q-88 There are two prominent leadership style namely Transactional Leadership and

GMTESTSERIES.COM®
Page 15

Transformational Leadership style. Differentiate between the Transactional Leadership and


Transformational Leadership.

Q-89 Write a short note on Expanded Marketing Mix.

Q-90 Write a short note on Typologies of Strategies.

Q-91 Differentiate between the Cost Leadership Strategy and Differentiation Strategy.

Q-92 Do you think that competition is always bad for organisations? Explain Porter’s five forces
model as to how businesses can deal with the competition.

Q-93 What are acquisitions? Discuss with example of two companies resorting to this strategy?

Q-94 Differentiate between the Concentric Diversification and Conglomeratic Diversification.

Q-95 The CFO of a sick company manufacturing various electrical home appliances seeks your
advice for an appropriate retrenchment strategy. It has huge accumulated losses which have
eroded its net worth what will be your advice and why?

Q-96 Kewal Kapadia is the MD of KK Ltd. located in Kanpur. In a review meeting with the CFO
Kuldeep Khaitan, he said that in the first five years of last decade the company grew @ 8-10%
every year, then the growth rate started falling and in previous year the company managed 1%.
Kuldeep replied that the company is facing twin issues, one the strategy is not being
implemented as planned; and two the results produced by the strategy are not in conformity
with the intended goals. There is mismatch between strategy formulation and implementation.

GMTESTSERIES.COM®
Page 16

Kewal disagreed and stated that he takes personal care in implementing all strategic plans. You
have been hired as a strategy consultant by the KK Industries. Advise the way forward for the
KK Ltd. by identifying the problem areas and correct the strategic approaches that have not
been effective.

Q-97 What do you understand by the term core processes? Explain along with some examples
of core processes from different industries.

Q-98 ABC Ltd is a company that has grown significantly in last five years. With the increase in
size, it is facing difficulty in managing things. Many a times functional level is not in sync with
the corporate level. What will you like to advise to the company and why?

Q-99 AMJ Ltd. has decided to keep very low price for the product sweety it is considering to
launch in the near future. You are required explain what pricing policies a company can opt for
pricing its new product and identify the pricing policy of AMJ Ltd. for its new product. Also list
what are the objectives that must be kept in mind while designing a pricing strategy of a new
product?

Q-100 What are the three major research and development approaches for implementing
strategies?

SUGGESTED ANSWERS/ HINTS

GMTESTSERIES.COM®
Page 17

A-1 General Ledger is the process of recording the transactions in the system to finally
generating the financial reports like Balance Sheet, Profit and Loss Account, Cash Flow
Statement etc. The input for the General Ledger Process Flow is the financial transactions and
the outputs are various types of financial reports. The steps in the general ledger process flow
are as follows:
(i) Entering financial transactions into the system

(ii) Reviewing Transactions

(iii) Approving Transactions

(iv) Posting of Transactions

(v) Generating Financial Reports

A-2The various risks and control objectives associated with the Procure to Pay (P2P) business
process are as follows:
S.N. Risk Control Objective
1. System access to supplier System access to supplier
master not restricted to master restricted to authorized users only
authorized users only
2. Supplier master not upto date Supplier master are upto date
3. Invalid changes made to the Only valid changes made to the
supplier master supplier master
4. Changes made to supplier Changes made to supplier
master not correct master are correct
5. All valid changes in supplier All valid changes in supplier
master not input or processed master are input & processed
6. Changes to supplier Changes to supplier master are processed in
master delayed or not timely manner.

GMTESTSERIES.COM®
Page 18

processed in the
timely manner

A-3 The various risks and control objectives associated with the Order- To-Cash (O2C) business
process are as follows:
S.N. Risk Control Objective
1. System access to process System access to process transaction are
transaction not restricted to restricted to
authorized users only authorized users only
2. All orders received from All orders received from customer are
customer not input or processed input &
processed
3. Invalid orders input or processed Only valid orders input &
by system processed by system
4. Orders not approved by All orders are approved by the
management for price & terms of sale management for price & terms of sale
5. Orders and order cancellations Orders & order cancellation
not input accurately are input accurately
6. Goods shipped without invoice All goods are shipped with
invoice
7. Invoice raised for invalid Invoice raised only for the valid
shipments shipments
8. Invoice not accurately calculated All invoice accurately
& recorded calculated & recorded

A-4 Some of the cybercrimes that are being faced by individuals and organisations are as
follows:

GMTESTSERIES.COM®
Page 19

(a) Computer Hacking - Many organizations store their confidential data in computer systems
which may be targeted by rivals, criminals or even employees. Hacking refers to unauthorized
intrusion into a computer system or a network even without touching the computer to be
hacked and sitting somewhere else.

(b) Credit Card Fraud - Stealing & misusing victim's credit card to make unauthorized online
transactions.

(c) Harassment via Fake Profile on Social Media - Creating a fake profile of the victim and
labelling him as a person of loose character, fraudulent person etc.

(d) Theft of Confidential Information - Theft of confidential business and customer related
information from company’s server.

(e) Phishing & Emails Scams - Fraudulently acquiring sensitive information such as usernames,
passwords credit card details, bank details etc. through fake emails, websites.

(f) Introducing Viruses, Trojans, Bugs etc. - Introducing viruses, trojans, spy ware or any
malicious program to destroy or gain access to some electronic information system.

A-5 As given in the question that Mr. Bhavesh has already determined the objectives and goals
to be achieved from the implementation of BPA exercise. This is the fourth step in the BPA
implementation process. After determining the objectives and goals to be achieved, entity
should now engage the business process consultant. Business process consultant is the expert
who takes the BPA implementation task forward and provides the necessary consultancy to the
organisation in this regard. However before engaging the business process consultant, entity
should consider the following aspects about the business process consultant:
• Does the consultant have experience with entity business process?

• Is the consultant experienced in resolving critical business issues?

• Whether the consultant can recommend and implementing a combination of hardware,


software as appropriate to meet the BPA requirements?

GMTESTSERIES.COM®
Page 20

• Does the consultant can clearly articulate the business value of every aspect of the proposed
solution?

A-6 The major benefits that will be drawn out of automating the Grievance related business
process and implementing the Grievance Management System are as follows:

• Time Saving: As repetitive processes are automated, it saves lot of employee’s time.

• Reduced Costs: Manual tasks are performed at slower rate than an automated task and
consumes more time and resources. Automation results in cost saving.

• Reduced Turnaround Times: Automation of process reduces the associated time and
streamlines the entire process. This helps in reducing the turnaround time.

• Improves Operational Efficiency: Automation of processes helps in reducing errors and


mistakes associated with the manual process. This helps in the smooth running of the system
and improves operational efficiency.

• Quality & Consistency: The task performed by the automated system produces identical
result every time which results in high quality and consistency.

• Visibility: As automated processes are controlled and operated within a specified range, it
gives better visibility of the process status to the organisation.

A-7 Various steps involved in the automation of the purchase order generation process are as
follows:
Step 1: Define why we plan to go for a BPA?
The first step is Bharat Plastics needs to justify the reasons of automation. Some of the issues
due to which it wants to go for BPA may be:
• Non-availability of critical raw material

• Situation of stock out


• Delay in the manual processing of purchase order etc.

GMTESTSERIES.COM®
Page 21

• Cancellation of orders by the customers

• Imposition of fines and penalties


Step 2: Understand the rules/regulation which needs to comply with
Bharat Plastics should consider the applicable rules or regulations, if any, in the automation of
the purchase order generation process by it. Bharat Plastics should also consider its internal
corporate policies and industry practices, if any.
Step 3: Document the process, it wishes to automate
Bharat Plastics should properly document its present process of purchase order generation.
While documenting the present process, it should clearly mention all the steps involved in the
existing process, its order etc.
Step 4: Define the objectives to be achieved by implementing BPA
The objective which Bharat Plastics is trying to achieve through the process automation task
should be established. Objective should be SMART.
Step 5: Engage the business process consultant
Bharat Plastics should engage the process consultant after considering his reputation,
experience etc.
Step 6: Calculate the ROI for project

The company should calculate the ROI from the BPA project. For calculating the ROI, entity
should determine the cost involved in the BPA exercise and the expected benefits from the
BPA. The benefits include:
• Reduction in stock-out situation.
• Elimination of delays occurring in production

• Increase in profit due to increased sales

• Reduction of fines & penalties etc.

Step 7: Developing the BPA


Once top management allows, consultant develops necessary BPA for the purchase order
generation process.

GMTESTSERIES.COM®
Page 22

Step 8: Testing the BPA


Before making the process live, it should be thoroughly tested.

A-8 The various risks associated with Human Resource Department are as given below:
(a) Employees have system access in excess of their job requirements.

(b) Additions to payroll master files do not represent valid employees.

(c) New employees are not added to the payroll master files.

(d) Terminated employees are not removed from payroll master files.

(e) Invalid changes are made to the payroll master files.

(f) Changes to the payroll master files are not accurate.

(g) Payroll master file data is not up to date.

(h) Employees who have left company continue to have system access.

(i) System access to process employee master changes has not been restricted to the
authorized users.

A-9 When risks are identified and analyzed, it may not appropriate to implement controls to
counter them as some of the risks may be minor, and it may not be cost effective to implement
expensive control processes for them. The various risk management strategies organisation
can choose from are as follows:
• Tolerate/Accept the risk: Some risks may be considered minor because their impact and
probability of occurrence is low. In this case, accepting the risk as a cost of doing business is
appropriate, as well as periodically reviewing the risk to ensure its impact remains low.

• Terminate/Eliminate the risk: It is possible for a risk to be associated with the use of a
technology, supplier, or vendor. The risk can be eliminated by replacing the technology with
more robust products and by seeking more capable suppliers and vendors.

GMTESTSERIES.COM®
Page 23

• Transfer/Share the risk: Risks can be can be shared with trading partners and suppliers like
outsourcing infrastructure management. In such a case, the supplier mitigates the risks
associated with managing the IT infrastructure by being more capable and having access to
more skilled staff than the primary organization. Risk also may be mitigated by transferring the
cost of realized risk to an insurance provider by insuring the asset, facilities, personals etc.

• Treat/mitigate the risk: Where other options have been eliminated, suitable controls must be
devised and implemented to prevent the risk from manifesting itself or to minimize its effects.

• Turn back: When the probability or impact of the risk is very low, then management may
decide to ignore the risk.

A-10 ERM provides following benefits to the organisations:


(i) Minimize Operational Surprises and Losses - Due to ERM, Entity will have enhanced capacity
to identify the potential events and associated risks. It will help the entity to develop suitable
response.

(ii) Rationalize Capital - Having better information about entity’s total risk allows management
to better assess the overall capital needs and improves capital allocation.

(iii) Links Growth, Risk and Return - ERM gives enhanced ability to identify and assess risk and
management can accordingly establish acceptable risk levels relative to growth and return
objectives.

(iv) Align Risk Appetite and Strategy - Risk appetite means degree of risk management is willing
to accept in achieving its goals. Now once management stablish the risk appetite, it will
accordingly choose the strategy which will fall within the risk appetite of the management.

(v) Provides Integrated Response to Multiple Risk - Instead of responding different risk in
different ways, ERM will help the entity in providing an integrated response to multiple risk.

(vi) Seize Opportunities - ERM exercise may bring events which may have potential opportunity
there by letting the organization to seize those business opportunities.

GMTESTSERIES.COM®
Page 24

(vii) Enhances Risk Response Decision - ERM enables the entity to identify and select the most
appropriate risk response decision to respond to any potential risk.

A-11 The organizations implementing ERP system should be updated about the latest
technological developments. The associated risks and related controls are as follows:

Aspect Associated Risk Control Required


Software ERP system may have many functions Entity should choose only those
Functionality and features all of which may not be features & functions that it actually
needed by the entity. requires and also ensuring support of
additional features that might be
needed by it in the future.
Technological As technology evolves, the ERP system Entity need to select the latest
Obsolescence in use of the entity may become technologies and architectures for
obsolete. the ERP system and also ensure the
timely upgradation of it.
Enhancement ERP system are not kept up to date Entity should carefully choose
and Upgrades and upgraded as necessary or patches vendors & properly signed the
or updates are not installed properly. updation and support contracts with
them.
Application As the business expands, entity might The Entity should carefully manage
Portfolio need new applications & business the need of applications and business
Management modules to fulfil business needs and modules to reduce the duplication &
deliver new projects. complexity.

A-12 Considering the role of the user in the organization, user can be granted the following
types of access rights with respect to the master data, transaction data and reports:
(i) Create – Allows user to create data.

GMTESTSERIES.COM®
Page 25

(ii) Alter – Allows user to alter (change/manipulate) data.

(iii) View – Allows users to only view the data.

(iv) Print – Allows user to print data.

As Mr. Alok is the HR Manager of the organisation, he may be granted all kinds of access rights
like creation, alter, view & print of HR related data from all kinds of files (Master, Transaction &
Report). However he may be denied all other kinds of access rights other than the HR related
data.

A-13 Some of the questions that Mr. Sarvan should ask during the ERP system audit of BRD Ltd.
are as follows:
• Is there an ERP system administrator with clearly defined responsibilities?

• Does the system process data according to Indian GAAP and generally accepted auditing
standards?

• Does it meet the regulatory and organizational reporting needs?

• Does system protect the confidentiality and integrity of information assets?

• Does system protect the information assets from unauthorized access and uses?

• Have entity adopted a role-based access control?

A-14 BI tools are the software that are used to perform data analysis and reports that process
data to the different users. BI tools can be straightforward programs or can combine many data
analysis applications like Online Analytical Processing (OLAP), Mobile BI, Real time BI, Software
as a Service BI, Open Source BI, Collaborative BI etc. BI tools provide various advantages to the
organisation and it can be justified as follows:
• BI applications can be bought separately from different vendors or from a single vendor.

GMTESTSERIES.COM®
Page 26

• Before it can be used in BI applications, raw data from different source systems must be
integrated, consolidated and cleansed to ensure that data is accurate and consistent.

• Business intelligence team in the organisation may include BI manager, BI architects, BI


developers, business analysts and data management professionals.

• Some of the BI tools are Dashboards, Performance Scorecards etc.

• BI technology also includes data visualization software for designing charts and other
infographics.

• It is sometimes used interchangeably with business analytics.

• Initially, BI tools were used by data analysts and other IT professionals. However, business
executives and workers are using BI software themselves due to the development of Self-
Service BI.

A-15 XBRL makes reporting more accurate and efficient. Some of the tasks performed by XBRL
are:
• People can publish report with confidence that information provided in the report will be
used and analyzed correctly.

• People can use information provided in report with confidence that data provided to them
are as per the pre-defined rules and definitions.

• Through XBRL, people can use the information in the way that best suits their needs like
different language, currency etc.

A-16 Some of the major advantages of Cyber Law or Information Technology Act, 2000 (as
amended in 2008) from the perspective of E-Commerce in India are as follows:
• Companies can carry E-Commerce using the legal infrastructure provided by the Act.

• Email is considered as valid and legal form of communication and can be accepted in the
court of law.

GMTESTSERIES.COM®
Page 27

• The Act addresses the security issues in the electronic transactions.

• Companies can file forms, applications and other documents for any legal purposes in
electronic form.

• Concept of secured digital signature arises.

• Digital signature got the legal validity.

• Government is allowed to issue notifications etc. on the web thus promoting e-government.

A-17 The various voucers used in the inventory module and their uses are as follows:
S.N. Voucher Module Uses
Name

I. Purchase Inventory For recording purchase order raised on vendor.


Order
II. Sales Order Inventory For recording sales order received from customer.
III. Stock Journal Inventory For recording physical movement of stock from one
location to another.
IV. Physical Inventory For making corrections in stock after physical counting.
Stock
V. Delivery Note Inventory For recording physical delivery of goods sold to a customer.
VI. Receipt Note Inventory For recording physical receipt of goods purchased from
vendor.

A-18 A voucher is a documentary evidence of a transaction which is used like a source


document to capture data for input in the system. Voucher is also known as document. Some of
the points to be considered in Voucher Numbering are as follows:

GMTESTSERIES.COM®
Page 28

• All vouchers must be serially numbered.

• All voucher number must be unique (i.e. not same).

• Every voucher type shall have separate numbering series.

• A voucher number may have prefix, suffix or both.

• Vouchers should be recorded in chronological order and vouchers recorded earlier shall have
an earlier number.

A-19 Reasons of having separate front end & back end in the software are as follows:

Reasons Explanation
Domain Front end part of the software is meant for dealing with the users. Back end
Expertise is meant for storing and processing of data.
Presentation Front End is capable of presenting the information in proper format, colors,
fonts etc. Back End is not meant for it.
User Experience Front end provides user interface to the user through which he can interact
with the software and thereby providing great user experience. Front end
handles processed data while back end handles raw data.
Speed Using single software for both the aspects would increase the load and slow
down the speed. Separate back end software is used for handling data only.
This reduces the load and increases speed of operations.
Language Front end speaks in the language which could be understood by the user
and understands language spoken by the Backend. Back end speaks in
technical language not understood by a layman. Front end can speak in both
the languages, user’s language and technical language.

A-20 In the Accounting Information System, data can be stored in the following two ways:

GMTESTSERIES.COM®
Page 29

(a) Master Data: Master data is relatively permanent data that is not expected to change
frequently. It may change, but not frequently. In accounting systems, there may be following
type of master data:

(i) Accounting Master Data – This includes names of ledgers, groups, cost centres, accounting
voucher types, etc. Like capital ledger is created once and do not change frequently.

(ii) Inventory Master Data – This includes stock items, stock groups, godowns, inventory
voucher types, etc. Stock item is something which is bought and sold for business purpose,
trading goods.

(iii) Payroll Master Data – Payroll is a system for calculation of salary and recoding of
transactions relating to employees. Master data in case of payroll can be names of employees,
group of employees, salary structure, pay heads, etc. These data are not expected to change
frequently.

(iv) Statutory Master Data – This is a master data relating to statute. It may be different for
different type of taxes. In case of change in tax rates, forms, categories, entity need to update
the master data.
All business process modules must use common master data.
(b) Non-Master Data: It is a data which is expected to change frequently, again and again and
not a permanent data. E.g. Amounts recorded in each transaction shall be different every time
and expected to change again and again. Date recorded in each transaction is expected to
change again and again and will not be constant in all the transactions.

A-21 Data Mining is the process of analysing data to find previously unknown trends, patterns,
and associations to make decisions. The steps involved in the Data Mining process are as
follows:

(a) Data Integration: Firstly, the data are collected and integrated from different sources.

(b) Data Selection: It may be possible that all the data collected may not be required hence
entity should select only those data that are useful for data mining.

GMTESTSERIES.COM®
Page 30

(c) Data Cleaning: The data that is collected may not clean and may contain errors, missing
values or inconsistent data. Thus, entity need to apply data cleansing techniques.

(d) Data Transformation: Data even after cleaning are not ready for mining as it needs to be
transformed into a common format.

(e) Data Mining: Now various data mining tools and techniques are applied on the data to
discover the hidden trends and patterns.

(f) Pattern Evaluation and Knowledge Presentation: This step involves removing redundant
patterns, visualization of patterns etc. from the patterns generated.

(g) Decisions/Use of Discovered Knowledge: Finally user can use the knowledge acquired
through the data mining process to take better decisions.

A-22 MIS Report will be more useful for the entity if it meets the following criteria:
(i) Relevant - MIS Report will be more useful if it is relevant to the area it is made for and adding
unnecessary information in the MIS report should be avoided.

(ii) Timely - As MIS Report are used for decision making purposes, it should be timely and
contain the recent period data and adding very historical data should be avoided.

(iii) Accurate - Management relying on the MIS report cannot make sound decisions if data
contained in the MIS report is inaccurate. Hence the details provided in the MIS report should
be accurate.

(iv) Structured - MIS report contains many detailed and complicate data and hence to make it
easily readable and understandable, it should be properly structured.

A-23 Some Application areas of Data Analytics are as follows:


• Banks and credit card companies uses data analytics to analyse the withdrawal and spending
patterns of the customers to prevent fraud.

GMTESTSERIES.COM®
Page 31

• E-commerce companies uses data analytics to analysis visitors who are more likely to buy a
product or service based on navigation and page-viewing patterns in their website.

• Mobile network operators examine customer data to forecast so they can take steps to
prevent defections to business rivals.

• Healthcare organizations mine patient data to evaluate the effectiveness of treatments for
cancer and other diseases.

A-24 Program development and implementation is a major phase within the systems
development life cycle. The primary objectives of this phase are to produce or acquire and to
implement high-quality programs. The Control phase runs in parallel for all other phases during
software development or acquisition.
Phase Audit Trails
Planning Auditor should evaluate whether the nature of and extent of planning are
appropriate to different types of software that are developed or acquired and
how well the plans are executed.
Control Auditor should evaluate whether the control activities are appropriate for the
different types of software that are developed or acquired and how effective
these control procedures are.
Design Auditors should determine whether programmers use some type of systematic
approach to design. Auditors can obtain evidence of the design practices
through interviews, observations and reviews of documentation.
Coding Auditors should seek evidence –
• To determine whether programming management ensures that programmers
follow structured programming approach.
• Whether programming management has chosen a module implementation
and integration strategy.
• To check whether programmers employ automated facilities to assist them.

GMTESTSERIES.COM®
Page 32

Testing Auditors can use interviews, observe and examine the documentation to
evaluate how well unit testing is conducted. Auditors primary concern is to see
that whole-of-program tests have been undertaken for all material programs
and that these tests have been well-designed and executed.
Operation & Auditors need to ensure effective and timely reporting of maintenance needs
Maintenance whether maintenance is carried out in a well-controlled manner. Auditors
should ensure that management has implemented a review system for the
maintenance needs.

A-25 The IS auditor who is performing a comprehensive audit of an organization's information


system & network system needs to perform a "points of presence” audit to discover what
information is available about organization’s Internet presence. Some of the aspects in this
regard are:
• Search engines: Google, Yahoo and other search engines should be searched to see what
information about the organization is available. Searches should include names of company
officers, management, key technologists or internal project names etc.

• Social networking sites: Social networking sites such as Facebook, LinkedIn, Twitter etc.
should be searched to see what employees and others are saying about the organization. Any
authorized or unauthorized "fan pages" should also be searched.

• Online sales sites: Sites such as Amazon and eBay should be searched to see if anything
related to the organization is sold online.

• Domain names: The auditor should gather information for known domain names & related
domain names.

GMTESTSERIES.COM®
Page 33

• Justification of Online Presence: The auditor should examine business records to determine
on what basis the organization established online capabilities such as e-mail, web sites, e-
commerce, Internet access for employees etc. These services add cost and risks.

A-26 Financial Accounting Module is one of the most important modules of the ERP system
which also connects different modules to each other. Key features of this module are:
(i) Tracks and integrates the financial and accounting data across the organisation.

(ii) Creation of organisational structure (like defining company, company codes, business areas,
functional areas etc.)

(iii) Financial accounting global setting (like setting fiscal year, posting period, document types
etc.)

(iv) Tax configuration and creation and maintenance of house of banks.

(v) Accounting of assets & liabilities.

(vi) Accounting of accounts payable.

(vii) Accounting of accounts receivables.

A-27 Different activities involved in the sales and distribution process can be listed through the
following diagram:

GMTESTSERIES.COM®
Page 34

(a) identifying prospective customers,

(b) contacting them,

(c) fixing appointments,

(d) showing demo,

(e) submission of quotations, etc.

Pre-Sales Activities are the activities which are performed to generate order from the
customers. Pre-sale activities includes:

A-28 Some of the ways through which the operating system protection can be achieved are as
follows:
• Automated terminal identification: This will help to ensure that a specified session could only
be initiated from a certain location or a computer terminal.

• Terminal log-in procedures: A log-in procedure is the first line of defence against
unauthorized access. When the user initiates the log-on process by entering user-id and
password, the system compares the ID and password to a database of valid users and
accordingly authorizes the log-in.

• Access Token: If the log-in attempt is successful, the operating system creates an access token
that contains key information about the user including user-id, password, user group and
privileges granted to the user.

• Access Control List: This list contains information that defines the access privileges for all valid
users of the resource. When a user attempts to access a resource, the system compasses his
user-id and privileges contained in the access token with those contained in the access control
list. If there is a match, the user is granted access.

GMTESTSERIES.COM®
Page 35

• Discretionary Access Control: The system administrator usually determines who is granted
access to specific resources and maintains the access control list. However, in distributed
systems, resources may be controlled by the end-user.

• User identification and authentication: The users must be identified and authenticated in a
fool-proof manner. Depending on risk assessment, more stringent methods like Biometric
Authentication or Cryptographic means like Digital Certificates should be employed.

• Password management system: An operating system could enforce selection of good


passwords. Internal storage of the password file should not be accessible to users.

A-29 Major advantages of Database Management System (DBMS) are as follows:


• Permitting Data Sharing: One of the main advantages of a DBMS is that the same information
can be made available to different users.

• Minimizing Data Redundancy: In a DBMS, duplication of information is controlled and reduced


i.e. there is no need to repeat the same data again and again. It reduces cost of data storage on
storage devices.

• Integrity can be maintained: Data integrity is maintained by having accurate, consistent, and
up-to-date data. Updates and changes to the data only must be made in one place in DBMS
ensuring Integrity.

• Program and File consistency: Using a DBMS, file formats and programs are standardized. The
level of consistency across files and
programs makes it easier to manage data when multiple programmers are involved as same
rules & guidelines apply across all types of data.

• User-friendly: DBMS makes the data access and manipulation easier for the user. DBMS also
reduces the reliance of users on computer experts to meet their data needs.

• Improved security: DBMS allows multiple users to access the same data resources securely.
Using passwords, DBMS can be used to restrict data access to only those who should see it.

GMTESTSERIES.COM®
Page 36

A-30 Big data refers to the massive data sets which conventional database tools do not have
enough processing power to process and analyze them. Ability to process Big Data brings
following benefits:
(i) Better Decision making and strategy making

• Businesses can utilize data intelligence while taking decisions.

• Data from search engines and social media sites.

• Early identification of risk to the product or services.

(ii) Improved customer service - Traditional customer feedback systems are getting irrelevant.
Today, Big Data are being used to read and evaluate consumer responses.

(iii) Better operational efficiency - Integration of Big Data technologies and data warehouse
help organization to offload infrequently accessed data, thus leading to better operational
efficiency.

A-31
e-Shops An e-shop is a virtual store that sells products and services online. Orders are
placed and payments made. They are convenient way of direct sales to
customers and allows manufacturers to bypass intermediaries and reduce costs
& delivery times. Like www.dell.com.
e-Malls The e-mall is a e-retailing model of a shopping mall where different shops are
situated in the e-commerce website like www.alibaba.com.
Buyer It brings together large numbers of individual buyers and provide products at
Aggregators reduced prices. In this, the firm contacts goods or service providers, make them
their partners, and sell their products or services under its own brand. Example
– www.zomato.com
Virtual Virtual Community is a community of users who share a common interest and
Communities communicate with each other. These are highly scalable so that more people

GMTESTSERIES.COM®
Page 37

can join it. The services may be provided free of cost or for a subscription fee.
Like quora.com.

A-32 Some of the risks associated with e-commerce transactions are:


(i) Quality issues – Delivered product may be different from the actually ordered or the
delivered product may be of inferior quality.

(ii) Privacy & Security – In e-commerce transactions as data is needed to be transacted online,
privacy & security of data is a major concern. Also, there is threat of theft, copy or duplication
of data.

(iii) Hidden Costs – Particularly in case of goods ordered from other countries, there may be
hidden costs imposed by the company.

(iv) Need of Internet Connectivity – To conduct e-commerce transaction, stable internet


connectively is a prime requirement.

(v) Lack of Infrastructure – Growth of e-commerce needs not only digital infrastructure but also
physical infrastructure like roads, railway etc. In developing countries, this is a major challenge.
(vi) Non-Recognition of e-transaction – If e-transaction & digital signature is not recognised as
evidence in the court of law, e-commerce can never grow.

(vii) Problem of privacy – If intellectual properly are transacted through e-commerce platform,
there are very high risk of its privacy.

A-33 Cards are provided by banks to their customers. Cards are one of the most used digital
payment modes but now modern methods are gaining ground. Different types of cards are:
(a) Credit Cards – It is a small plastic card issued by bank & other issuers to the eligible
customers. Through credit card customer can purchase products or services on credit & their
cash flow position is not immediately impacted. Customer has to make payment to the card
issuers at the end of the billing cycle. i.e. month end.

GMTESTSERIES.COM®
Page 38

(b) Debit Cards – Debit card is a small plastic card issued by bank to their customers. Customer
can purchase goods or services and pay with the debit card & his account immediately gets
debited by the amount of payment. It is like a pre-paid card.

A-34 The major limitations of Mobile Computing are:


• Insufficient Bandwidth: Mobile internet services are usually provided through GPRS, EDGE
and 3G, 4G networks. Mobile internet speed is usually slower than the fixed internet
connection.

• Security Standards: Security is a major concern in mobile computing field particularly due to
the wireless nature of communication. There are security mechanisms like encryption, virtual
private network (VPN) etc. but still security is a serious concern in mobile computing field.

• Power consumption: When a power outlet or plug is not available, mobile devices have to rely
entirely on the battery power. Hence it is
necessary that battery capacity of mobile devices should be strong enough to provide
reasonable working time.

• Transmission interferences: Mobile signals can get affected by various factors like weather,
nearest tower range etc. Also signal reception in basements, hilly areas etc. is often poor.

• Potential health hazards: Mobile devices may generate radiations due to which long usages of
mobile devices may cause serious health issues. Using mobile devices while driving can cause
road accidents.

• Human interface with device: Mobile devices have smaller screen and keyboard which makes
them difficult to operate.

GMTESTSERIES.COM®
Page 39

A-35 BYOD refers to the business policy where companies allows employees to bring and use
their own preferred computing devices like smart phone laptop, tablet etc. for the business or
office related work. The main advantages of the BYOD Policy are:
(i) Happy Employees: Employees feels more comfortable in using their own devices at the
workplace.

(ii) Increased employee efficiency: As employees uses their own computing devices, their
efficiency and productivity increases.

(iii) Lower IT budgets: As employees uses their own computing devices, companies are not
required to incur money on the acquisition of such devices thereby lowering the IT budgets.

(iv) Reduced IT support requirement: IT department does not have to provide end user support
and Maintenance Services.

(v) Early adoption of new Technologies: Employees are usually proactive in adopting new
technologies, in this way organisations also gets the benefits of latest technologies.

A-36 Various commercial laws are applicable to e-commerce and m-commerce transactions in
India are as follows:
• Income Tax Act, 1961: Income Tax Act contains provisions regarding the taxation of income of
companies engaged in the e-commerce and m-commerce business in India.

• Companies Act, 2013: As most of the merchants in e-commerce / m-commerce business are
companies, the companies Act is directly applicable on them.

• Foreign Trade (Development and Regulation) Act, 1992: This is an act to provide for the
development and regulation of foreign trade by facilitating imports into and exports from India.

• The Custom Act, 1962: This act defines import and export of goods or services from India and
provides for levy of customs duty.

• The Goods and Services Tax Act, 2017 (GST): This Act requires e-commerce/m-commerce
merchants to comply with various provisions like uploading invoices, filing return, payment of
tax etc.

GMTESTSERIES.COM®
Page 40

• Consumer Protection Act, 1986: This law protects the consumer rights in the e-commerce and
m-commerce transactions.

A-37 The most suitable choice is Community Cloud which is the cloud infrastructure provisioned
for exclusive use by a specific community of consumers from organizations that have shared
concerns. It may be owned, managed, and operated by one or more of the organizations in the
community, a third party or some combination of them, and it may exist on or off premises. In
this, a private cloud is shared between several organizations. This model is suitable for
organizations that cannot afford a private cloud and cannot rely on the public cloud either.
Advantages of Community Cloud are as follows:
• It allows establishing a low-cost private cloud.

• It allows collaborative work on the cloud.

• It allows sharing of responsibilities among the organizations.

• It has better security than the public cloud.

The limitation of the Community Cloud is that the autonomy of the organization is lost and
some of the security features are not as good as the private cloud. It is not suitable in the cases
where there is no collaboration.

A-38 The Service Model provided by vendor XYZ to ABC university is Infrastructure as a Service
(IaaS). Characteristics of Infrastructure as a Service (IaaS) of Cloud Computing are as follows:
• Web access to the resources: The IaaS model enables the IT users to access IT infrastructure
resources over the Internet.

GMTESTSERIES.COM®
Page 41

• Centralized Management: The resources distributed across different parts can be controlled
from central console that ensures effective resource management and effective resource
utilization.

• Elasticity and Dynamic Scaling: Depending on the load, IaaS services can provide the resources
and elastic services where the usage of resources can be increased or decreased according to
the needs.

• Shared infrastructure: IaaS follows a one-to-many delivery model and allows multiple IT users
to share the same physical infrastructure and thus ensure high resource utilization.

• Metered Services: IaaS allows the IT users to rent the computing resources instead of buying
it. The services consumed by the IT user will be measured, and the users will be charged by the
IaaS providers based on the amount of usage.

A-39 Segregation of Duties (SOD) ensures that single individuals do not possess excess
privileges that could result in unauthorized activities such as fraud or the manipulation of
sensitive data. Some of the SOD controls are as follows:
• Transaction Authorization: Information systems can be programmed to require two or more
persons to approve certain transactions. Like in banking industry there is the signatory
requirement by a senior level manager also when transaction value exceeds certain limit.

• Split custody of high-value assets: High value assets can be protected using split custody. Like
Banks do this for central vaults, where a vault combination is split into two or more pieces so
that two or more persons are required to open it. Hence through proper SOD, high value assets
can be protected.
• Periodic reviews: IT personnel should periodically review user access rights to identify
whether any segregation of duties issues exist. This review is necessary for the effective SOD
mechanism.

GMTESTSERIES.COM®
Page 42

A-40 The IS auditor needs to determine what events are recorded in access logs. He needs to
understand the capabilities of the system being audited and determine if right events are being
logged or not.
• Centralized access logs: IS auditor should determine if organization’s access logs are centrally
managed or stored in individual systems.

• Access log protection: The auditor needs to determine if access logs can be altered,
destroyed, or attacked to cause the system to stop logging events. For sensitivity environments,
he needs to determine if logs should be written to media that is unalterable like optical WORM
(write once read many) media.

• Access log review: The IS auditor needs to determine if there are policies, processes, or
procedures regarding access log review and how it is functioning.

• Access log retention: The IS auditor should determine how long access logs are retained by
the organization and if they are back up.

A-41 Internet Banking Process involves the following steps:


• The customer having an account in the bank applies to the bank for the internet banking
facility.

• He is provided with the user ID & password through which he can access the internet banking
services.
• Customer will access the bank’s website through the internet browser and internet from
where he will be directed to a secured web server where he will insert his user ID and password
for login.

• The web server will forward the login details entered by the user to the internet banking
application server (IBAS) which then access the internet banking channel server (IBCS) to
authenticate the login details entered by the users.

• The information received through the web server is verified and if information is not
matched, an access denied message will be displayed and customer will have to log in again.
Customer is usually provided three log-in attempts.

GMTESTSERIES.COM®
Page 43

• However, if details are matched, an acknowledgement message is displayed & user is


provided various internet banking services like:

• Balance inquiry

• Fund transfer

• Request for the issue of cheque book

• Change of password

• Generation of account statements

• Stop payment etc.


The customer than chooses from the services listed above.

A-42 Risk & key controls loans and advances process flow are as follows:
S.N. Risk Key Controls

1. Credit line setup is unauthorized The credit team shall check the financial ratios, net
and not in accordance with the worth and other factors before offering the credit
bank's policy line to the client.
2. Credit lines set up in CBS is Access rights to authorize the credit limit should be
unauthorized restricted to authorized persons only
3. Breach of credit line set up Transactions cannot be made if aggregate limit of
outstanding amount exceeds the credit limit
assigned to the customer.
4. Customer master defined in CBS is Access rights to authorize the customer master in
not in accordance with pre- CBS should be restricted to authorized persons only.
disbursement certificate
5. Inaccurate interest or charges Interest or charges should be calculated
being calculated automatically in the CBS software as per the defined
rules and masters.

GMTESTSERIES.COM®
Page 44

6. Lower interest or commission Loan or other credit facility will be restricted by CBS
charged if interest or commission is charged is lower than
what has been defined in the Customer Master in
CBS.

A-43

GMTESTSERIES.COM®
Page 45

A-44 In the context of CBS software, configuration refers the way a software system is set-up.
Whenever a software is installed, value of different parameters has to be configured as per the
policies of the bank and rules applicable in the banking industry. Configuration will define how
software will function and what menu options will be displayed. The various modules of the
bank such as advances, deposits, treasury etc. have to be configured. Some examples of
configuration (task performed at configuration level) are:
• Password management

• User access and privileges configuration

• User activation and de-activation

• Creation of customer type, deposit type, financial year etc.

• Defining access rules from different devices.

A-45 Machine Learning is a type of Artificial Intelligence (AI) that provides computers with the
ability to learn without being explicitly programmed. Some of the application areas of Machine
Learning are:
• Autonomous vehicles like drones, self-driving cars etc.

• Solving mathematical problems

• Graphics software like adobe photoshop

• Search engines like Google search

• Online assistants like Apple Siri, Amazon Alexa etc.

A-46 The various stages involved in deployment & implementation of CBS. These stages should
be controlled at various stages to ensure that banks automation objectives are achieved. The
various stages are:

GMTESTSERIES.COM®
Page 46

• Planning: Banks should plan for CBS considering its strategic and business objectives.

• Approval: The decision to implement CBS requires high investment and recurring costs hence
it must be approved by the highest authorities of the bank.

• Selection: There are multiple vendors of CBS, each solution has different features and
advantages. Hence, bank should select the right CBS solution for itself so to meet its business
objectives.

• Design and develop or procure: CBS solutions may be developed in-house by the bank or
procured from market.

• Testing: Extensive testing must be done before the CBS becomes live i.e. put to actual use.
The testing is to be done at different phases like procurement phase, processing phase etc.

• Implementation: CBS must be implemented as per pre-defined and agreed plans.

• Maintenance: CBS must be maintained as required.

• Support: CBS must be supported to ensure that it is working effectively.

• Updation: Different CBS modules must be updated based on business needs, technology
updates or regulatory requirements.

• Audit: Audit of CBS must be done internally and externally as required.

A-47 Some of the internal controls that could be adopted by the Bank or Bank Branch are:
• Work of one staff to be verified by another staff (maker-checker principle).
• System of job rotation exists for staff.

• Fraud-prone items such as currency, demand draft, deposit receipts etc. should be in the
custody of at least two officials.

• Financial & administrative powers of officials should be fixed & communicated to all
concerned person.

• Branch manager must send periodic compliance report to his controlling authority.

GMTESTSERIES.COM®
Page 47

• All books should be periodically balanced and balancing should be confirmed by authorized
officials.

A-48 Some of the tips to protect any e-Commerce business from intrusion are as follows:
• Viruses – Entity should protect itself from viruses as viruses may cause loss of valuable data.

• Hackers – Entity should regularly assess its capability to protect itself from hackers.

• Regular software updates – Website of the e-commerce vendor should be up to date with the
latest security software.

• Passwords – Ensure that password are changed at regular intervals & password used by
former employee are made ineffective.

• Sensitive data – Use encryption software & other security software to protect sensitive data.

A-49 Do the growing reliance on technology, IT risks are becoming major security threats for
the banking industry. If left unchecked, IT risks can lead to serious consequences for the banks
and adversely impact its business. Sample list of IT related controls are:
• System to maintain the record of all log-ins and log-outs.

• System access to be available only during stipulated hours and days.

• There should be a user time-out system where if no activity is performed from a logged-in
account for a certain period, user will be automatically logged-out.

• Once end-of-the day process are over, ledger can be opened only with a supervisory level
password.

• If transaction wants to post something in the in-operative or dormant account, it can be done
only with a supervisory level password.

• Users can access only specified data and files and access rights should be given on ‘need to
know’ basis based on their role in organisation.

GMTESTSERIES.COM®
Page 48

• All exception situations like limit excess, reactivating dormant account etc. can be done only
with a supervisory level password.

A-50

A-51 Main advantages of simple organisational structure are:


(i) Very easy to build & operate.

(ii) Least expensive organizational structure.

(iii) Communication is frequent & direct.

(iv) Very little rules and formalization is involved.


Simple organisational structure results in competitive advantage compared to larger rivals due
to following reasons:
• Owner is directly involved in everything

• Easy change management

GMTESTSERIES.COM®
Page 49

• Has Greater flexibility

• Rapid response to changing environment

A-52 Management of logistics is a process which integrates the flow of supplies into, through
and out of an organization, transportation, warehousing, material handling, order fulfilment
etc. Organizations try to keep the cost of transportation as low as possible while ensuring safe
and reliable delivery. Some ways how logistics management can help a business organisation
are as follows:
• Cost savings

• Reduced inventory

• Improved delivery time

• Customer satisfaction

• Competitive advantage

A-53 Supply Chain Management is considered as an extension of the logistics management.


Logistics management is mainly concerned with the management of in-bound and out-bound
logistics, its transportation, warehousing, material handling, order fulfilment etc. All these
activities are also the part of supply chain management. But supply chain management involves
lots of other aspects also. Its emphasis on delivering right product at the right time to the right
customer at the right place and with the right price. Supply chain management is a tool of
business transformation. It reduces cost of the organisation and enhances customer services.
So in this way supply chain management is conceptually wider than logistic management.

A-54

GMTESTSERIES.COM®
Page 50

Basis Corporate Level Business Level Functional Level


Strategy Strategy Strategy
Formulated by CEO, Board of Business or Divisional Functional Managers
Directors & Senior Managers
Executives of the
Organisation.
Time period These strategies are These strategies are These strategies are
usually for long term. usually for medium usually for short term.
term.
Range These are the These are the These strategies are
broadest strategies strategies that are specific to the
covering the specific to the functions like HR,
organisation as a particular business or Finance etc. of a
whole. division. business or division of
the organisation.
Risk Involved High Risk Moderate Risk Low Risk
Example Strategy for Alphabet Strategies for For YouTube,
Inc. as a company. different divisions of strategies like Human
Alphabet Inc. like Resource, R&D,
YouTube, Search, Finance etc. of
Android. YouTube.

A-55 Technology Leader Firms are the firms who develops new technologies and takes a lead in
the R&D hence they are called Technology Leaders. This strategy involves huge risk as it causes
high R&D costs and there is no surety that the ultimate product would be a commercial success.
However this strategy offers the highest reward as well.

GMTESTSERIES.COM®
Page 51

To understand the Competitive Landscape of the company, manager of Amit Ltd. should
consider the following factors:
(i) Identify the competitor

(ii) Understand the competitors

(iii) Determine the strengths of the competitors

(iv) Determine the weaknesses of competitors

(v) Put all of the information together

A-56 Prior to the Year 1908, Business was conducted on adhoc basis with very little or no
formal planning. In the year 1908 Harvard Business School (HBS) Started using interactive case
studies to teach the students about Management and planning.
In the Year 1911, HBS formally introduced a course to create and enhance the general
management capabilities of the Students. This was the time when the concept of “Business
Policy “established. In the Year 1959, Business policy was formally introduced in Academics.
In the Year 1969, American Assembly of Collegiate Schools of Business (AACSB) made it
mandatory to have a course on Business Policy for the recognition of Business Schools in USA.
There was further evolution of Business Policy as Managers started having long term planning
instead of day to day planning or short-term planning and finally moved to Strategic Planning
for managing the business and strategic management came into existence.
As the Business environment become more and more uncertain, dynamic and complex,
Business Policy evolved and finally replaced by Strategic Management. So practically, today
business organisation uses the concepts of strategic management for managing their
businesses.

GMTESTSERIES.COM®
Page 52

A-57 Strategy is defined as the long-term blue print of an organization’s:


• desired image

• direction and

• destination

Strategy determines
• Where an organization wants to be

• What an organization wants to do

• Where it wants to go.

As the Business environment is dynamic uncertain and complex, it is essential for the
organization to have a well-crafted strategy. Well Crafted strategy helps the management to
better deal with environment and convert the opportunities in the favour of the organization.
To Survive and Succeed, entity needs well-crafted strategy but strategy is not the substitute or
replacement of a sound and alert Management System.
Strategy no matter how well-crafted it may be, it can never be perfect, flawless & optimal. The
continuous changes taking place in the environment will make even the most perfect strategies
irrelevant. Hence it is the duty of the management to continuously monitor the business
environment and review the strategy to make the necessary charges as needed in the strategy.

A-58
Strategy Strategic Management
Strategy implies long-range blueprint of an Strategic Management refers to the
organisation designed image, direction & managerial process of developing a strategic
destination. vision, mission, setting objectives, formulating
&
implementing strategy and initiating
corrective actions as needed.

GMTESTSERIES.COM®
Page 53

Strategy is like a plan through which entity Its process involves:


tries to achieve its goods & objectives. – Strategy formulation
– Strategy implementation
– Strategy evaluation

It has narrow scope compared to Strategic Strategic Management has a broader scope.
Management

A-59 Organizations may be classified into commercial (for profit) and non-commercial (NGOs)
on the basis of interest they have. Compared to the for-profit organisations, not-for-profit
organisations usually dependent upon charity, donation and other similar sources for their
financing needs. It is very important for medical organizations & government organisations to
use concepts of strategic management while running their operations.
With the advancement of computers and internet technologies the entire medical system has
undergone significant changes. Medical organizations needs to be very efficient in their
working. Strategic Management concepts are playing significant role in making the hospitals
more efficient and competitive. Through Strategic Management concepts, hospitals can:
• Generate sufficient fund for meeting their objectives

• Provide better quality services

• Offer Medical facilities to a large number of people

• Develop more advanced medicines

• Have deep collaborates with expert doctors, health experts etc.


Government agencies and departments uses the tax payer’s money hence they should be very
efficient in their working. Government Agencies and departments works with less autonomy
compared to private firms.
However with the proper use of strategic management tools and concepts, government
agencies and departments can:

GMTESTSERIES.COM®
Page 54

• Become more efficient and effective.

• Better compete with private sector.

• Provide better career opportunities to their employees.

A-60
Strategy Formulation Strategy Implementation
It is an entrepreneurial activity. It is an administrative task.
It deals with formulating appropriate It is the process of putting the strategy
strategies for entity. formulated into actions.
It is primarily on intellectual process. It is primarily on operational process.
It needs sound knowledge and analytical skills. It needs strong motivational and leadership
skills.
It focuses on effectiveness. It focuses on efficiency.
It requires coordination among few It requires organization wide coordination.
individuals.

A-61 An important component of strategic thinking requires generation of strategic


alternatives, or choices of future strategies to pursue, given the company’s internal strengths
and weaknesses and its external opportunities and threats. The comparison of strengths,
weaknesses, opportunities, and threats is normally referred to as SWOT analysis.
• Strength: Strength is an inherent capability of the organization which it can use to gain
strategic advantage over its competitors.

• Weakness: A weakness is an inherent limitation or constraint of the organization which


creates strategic disadvantage to it.

• Opportunity: An opportunity is a favourable condition in the environment which enables it to


strengthen its position.

GMTESTSERIES.COM®
Page 55

• Threat: A threat is an unfavourable condition in the environment which causes a risk for, or
damage to, the organisation’s position.
SWOT analysis helps managers to craft a business model (or models) that will allow a company
to gain a competitive advantage in its industry (or industries). Competitive advantage leads to
increased profitability, and this maximizes a company’s chances of surviving in the fast-
changing, competitive environment. Key reasons for SWOT analyses are:
• It provides a logical framework.

• It presents a comparative account.

• It guides the strategist in strategy identification.

A-62 Implementing the supply chain management system will involve the following steps:
(i) Product Development: Organisation must work with the customers and suppliers in product
development process. Active involvement of them is necessary as it will help the company to
bring the exact product the market demands and that too in a shorter duration.

(ii) Procurement: Procurement requires careful planning, identifying sources, negotiation, order
placement, inbound transportation and storage of raw material. Organizations should have
effective procurement mechanism in place.

(iii) Manufacturing: Companies should adopt flexible manufacturing process to quickly respond
to market changes. Manufacturing should be done on the basis of just-in-time (JIT) and keep
the inventory as low as possible

(iv) Physical Distribution: Availability of the products at the right place at right time is essential
for the success of organization. It should ensure that there does not remain any unsatisfied
demand.

(v) Outsourcing: As competition is increasing, companies all over the world are focusing on their
core competencies and performing only those tasks internally on which they are best and
outsourcing all other tasks to outside parties who can perform those tasks at a lower cost.

GMTESTSERIES.COM®
Page 56

(vi) Customer Services: Customers are the king and companies must serve them properly to win
their loyalty. Organisations should ensure proper after sale services to their customers.

(vii) Performance Measurement: Performance is measured in different parameters like costs,


customer service, productivity and quality.

A-63 Organization’s recruitment, training, performance appraisal and compensation practices


can have a strong influence on employee competence & performance. The following points
should be kept in mind:
(i) Recruitment and selection: The workforce will be more competent if a firm can successfully
identify, attracts, and select the most competent applicants.

(ii) Training: The workforce will be more competent if they are well trained to perform their
jobs.

(iii) Appraisal of performance: Having a well-established and sound performance appraisal


mechanism will boost the performance of the employees.

(iv) Compensation: A firm can increase the competency of its workforce by offering salary
packages that are more attractive than those of their competitors.

A-64
Statement of Net Worth of A Ltd. (Rs in Lakh)
Paid-up capital 140
Additional Paid-up capital (securities 60
premium)
Retained Earnings 80
Total 280

GMTESTSERIES.COM®
Page 57

Add: Goodwill 50
Less: Inventory Value (4)
Less: Asset overvalued (6)
Less: other fictitious assets (6)
Net worth of A Ltd. 314

A-65 Forward Linkages refers the situation where entity formulates a strategy it will pursue in
future but with the formulation of new strategy many changes have to be made in the
organization like organizational Structure, Culture, Leadership etc. may have to be modified
according to the new strategies. So in this way, the formulation of the strategy have the
forward linkage with the implementation. Forward linkage is most suited if entity wants to
change or modify its strategies as per the changing market situations.
Backward Linkage refers the situation where entity finds it very difficult implement new
strategies as new strategies might require changes in existing structure, culture etc. Hence
entity tends to adopt those strategies which can be implemented with the help of existing
culture, structure and other resources. This approach is known as backward integration. Here
entity makes incremental improvements to achieve its strategies. This approach is suitable for
those entities who wants to continue with the existing strategy without making any major
changes.

A-66 Industry is a group of similar firms whose products or servers having similar features and
attributes & they compete for the same buyers. Like Real Estate Industry, Auto Mobile Industry,
Telecom Industry etc. Some of the factors that can be considered as the dominant economic
features of the Industry are as follows:

(i) Size and Nature of market

GMTESTSERIES.COM®
Page 58

(ii) Scope of competitive rivalry (local, regional, national, global)

(iii) Growth rate of the market

(iv) Life cycle of the market

(v) No. of buyers and their size

(vi) Capital requirements

A-67 An industry's Key Success Factors (KSFs) are factors that affects the industry members'
ability to prosper in the market. KSFs are so important that all firms in the industry must pay
close attention to them. The answers to three questions help identify an industry's KSFs:
• On what basis do customers choose between the sellers?

• What resources & capabilities seller needs to be competitively successful?

• What does it take for the sellers to develop those resources & capabilities?

Understanding the industry key success factors should be the top most priority of the managers
and if they mis-understood these factors, they may end up crafting a misleading strategy. Any
industry usually has at most three or four key success factors at a time & key success factors
vary from industry to industry.

A-68 Strategic Group mapping is a tool for comparing the market positions of rival firms. A
strategic group consists of those rival firms with similar competitive approaches and positions
in the market. Companies in the same strategic group may be due to having comparable
product-line, price range, distribution channels etc. The procedure for constructing a strategic
group map is:
• Identify the competitive characteristics that differentiate firms in the industry. General
variables could be price range; geographic coverage; product-line breadth etc.

GMTESTSERIES.COM®
Page 59

• Plot the firms on a two-variable map using pairs of these differentiating characteristics.

• Assign firms having the same strategic approach to the same strategic group.

• Draw circles around each strategic group.

A-69 The sustainability of competitive advantage and a firm’s ability to earn profits from its
competitive advantage depends upon four major characteristics or factors of resources and
capabilities:
(i) Durability: The period over which a competitive advantage is sustained depends on the rate
at which a firm’s resources and capabilities deteriorate. In industries where the rate of product
innovation is fast, the rate of deterioration is high.

(ii) Transferability: Even if the resources and capabilities on which a competitive advantage is
based are durable, it is likely to be eroded by competition from rivals. The ability of rivals to
attack position of competitive advantage relies on their gaining access to the necessary
resources and capabilities. The easier it is to transfer resources and capabilities between
companies, the less sustainable will be the competitive advantage which is based on them.

(iii) Imitability: If resources and capabilities cannot be purchased by the competitors, then they
must be built from the scratch. How easily and quickly can the competitors build the resources
and capabilities on which a firm’s competitive advantage is based affects the sustainability of
the competitive advantage.

(iv) Appropriability: It refers to the ability of the firm’s owners to appropriate the returns on its
resource base. Even where resources and capabilities are capable of offering sustainable
advantage, there is an issue as to who receives the returns on these resources.

A-70 Market Penetration is the most common expansion strategy is market penetration or
concentration. In this strategy, firm uses its existing products and markets and sells it in the

GMTESTSERIES.COM®
Page 60

larger quantity to achieve growth. Entity can do the following to increase its market share in the
market penetration strategy:
• Increase product usage

• Increase the frequency used

• Increase the quantity used

• Find new uses for the current users


Market Development consists of marketing present products to customers in new markets.
Market development can be done through like expanding in new geographical markets.

A-71 An opportunity is a favourable condition in the environment which enables the


organisation to strengthen its position. While threat is an unfavourable condition in
environment which causes a risk to its position. It will offer opportunity and threats to the
following:
Opportunities
– Stadium and sports grounds

– Manufacturers of sports goods

– Sports channels, advertisers


Threats
– Entertainment industry engaged in TV serials, cinema, theatres etc.

– Event Management organisation engaged in non-sports events.

A-72 A firm’s profitability tends to be higher when other firms are blocked from entering the
industry. New entrants can reduce industry profitability. Barriers to entry represent economic
forces that slow down or prevents entry by other firms. Common barriers to entry include (now
explain each of the following):
• Capital Requirements

GMTESTSERIES.COM®
Page 61

• Economies of Scale

• Product Differentiation

• Switching Costs

• Brand Identity

• Access to Distribution Channels

• Possibility of Aggressive Retaliation

A-73 According to Michael Porter, strategies allow organizations to gain competitive advantage
from three different bases namely cost leadership, differentiation, and focus. Porter called
these as generic strategies.
Based on the facts given in the question, Coffee Beans has opted differentiation strategy. Its
products are designed having unique features and qualities that are different from the
competitors. Highly differentiated and unique products enable Coffee Beans to charge premium
prices for its products hence making higher.

A-74 The audit of management performance with regard to its strategies helps ‘Zumba Robots’
identify problem areas and correct the strategic approaches that have not been effective so far.
A strategy audit is a review of a company's business plan and strategies to identify weaknesses
and shortcomings and enable a successful development of the company. An assessment of the
external environment shows where changes happen and where organization’s strategic
management no longer match the demands of the marketplace. Based on such analysis, Zumba
Robots can improve its business performance significantly by periodically conducting such an
audit.

GMTESTSERIES.COM®
Page 62

A-75 Core competencies are capabilities that serve as a source of competitive advantage for a
firm over its rivals. Core competency as the collective learning in the organization, especially
coordinating diverse production skills and integrating multiple streams of technologies. An
organization’s combination of technological and managerial know-how, wisdom and experience
are a complex set of capabilities and resources that can lead to a competitive advantage
compared to a competitor.

A-76 A core competence is a unique strength of an organization which may not be shared by
others. Core competencies are those capabilities that are critical to a business in achieving
competitive advantage. Considering the facts of the case, ‘Value for Money’ is the leader on
account of its ability to keep costs low. The cost advantage that ‘Value for Money’ has created
for itself has allowed it to price goods lower than competitors. The core competency in this case
is derived from its ability to generate large sales volume because of its low-cost, allowing the
company to remain profitable even with low profit margin.

A-77 Capabilities that are valuable, rare, costly to imitate, and non-substitutable are core
competencies. A small chemist shop has a local presence and functions within a limited area.
Still it can build its own competencies to gain competitive advantage. Rohit Patel can build
competencies in the areas of:
(a) Giving personal attention to the customers

(b) Providing home delivery with no additional cost

(c) Providing speedy home delivery


(d) Having extended working hours

(e) Providing easy credit or a system of monthly payments

GMTESTSERIES.COM®
Page 63

A-78 Industry in which entity operates change due to new trends and developments taking
place in the environment. The most dominant forces are called driving forces as they have the
biggest influence on what kinds of changes will take place in industry. Some of the examples of
drivers are:
• Internet and e-commerce

• Globalization

• Mobilization of resources

• Product innovation

• Marketing innovation

• Laws, rules, regulations etc

• Entry or exit of major forms.

A-79 Considering the facts of the case, as Sri Alok Kumar is running a big company where lot of
decisions both small and big, are needed to be taken, hence it is not possible for him to take all
decisions by himself. Shri Alok Kumar should concentrate on strategic decisions only. These are
higher level decisions having organisation wide implications. The major dimensions of strategic
decisions are as follows:
• Strategic decisions require top-management involvement.

• Strategic decisions involve significant commitment of organisational resources.

• Strategic decisions necessitate consideration of factors in the firm’s external environment.

• Strategic decisions are likely to have a significant impact on the long-term prosperity of the
firm.

• Strategic decisions are future oriented.

• Strategic decisions usually have major multifunctional or multi-business consequences.

GMTESTSERIES.COM®
Page 64

A-80 Based on the facts given in the question, Vastralok Ltd. is currently manufacturing silk
cloth and its top management has decided to expand its business by manufacturing cotton
cloth. Both the products are similar in nature within the same industry. The diversification
strategy that the top management of Vastralok Ltd. has opted is concentric in nature. They
were in business of manufacturing silk and now they will manufacture cotton as well.
Concentric diversification amounts to related diversification. In concentric diversification, the
new business is linked to the existing businesses through process, technology or marketing.

A-81 In vertically integrated diversification strategy, the entity opts to engage in businesses that
one related to the existing business of the firm. The firm remains vertically with in same
product value chain moving either forward or backward in the chain and enters in to new
business areas.
Vertically integrated diversification could be in the firm of Forward Integration or Backward
Integration.
In backward integration, entity enters in to the business of the input provider or supplier with
the intention to create a effective supply chain. Through backward integration, entity gets a
better control over the input and manages its quality, availability and cost by itself. Like a super
market chain can acquire the dairy farm business to get the fresh supply of milk and other
related products.
On the other hand, in forward integration, entity moves forward in the value chain and enters
in to the business that uses the existing product of the entity (its customers). Through forward
integration, entity gets better control over the distribution chain of the product.

A-82 A Strategic vision is a roadmap of a company’s future providing specifics about technology
and customer focus, the geographic and product markets to be pursued and the kind of
company that management is trying to create. The vision of ICAI is ‘World’s leading accounting

GMTESTSERIES.COM®
Page 65

body, a regulator and developer of trusted and independent professionals with world class
competencies in accounting, assurance, taxation, finance and business advisory services’.

A-83 Product life cycle is a “S” shaped curve which represents the relationship of sales of the
product with respect to time as product passes through its life cycle. There are four phases in
product life cycle. These are:

(i) Introduction phase – This is the first phase in the product life cycle where the product is
introduced in the Market. Demand and competition remain low as the customer and
competitions are unaware about the product. In this phase, prices remain high.

(ii) Growth phase – In this phase, Market starts expanding due to which demand and sales
increases. Competition also increases due to which prices start falling.
(iii) Maturity phase – In this phase competition becomes Very intense due to which demand
does not grow and sales become stagnant.

(iv) Decline phase – This is the last phase of the product life cycle where there is a real decline
in the product demand and sale falls sharply.
The biggest advantage of product life cycle is that entity can get a significant insight about the
product and depending upon the insight, appropriate strategic decision can be taken. Like it a
business or product is in their introduction/initial or growth phase, Expansion should be the

GMTESTSERIES.COM®
Page 66

favourable approach. For matured business or product, Hold or Harvest are the best option and
for the declining business or product, Harvest or Retrenchment are best option.

A-84 Business Process Reengineering (BPR) differs from the other process improvement
methods in the following Manner:
(i) Re-engineering works on fundamental rethinking and does not have any scope for any partial
modification or marginal improvement. At the core of BPR is the concept of discontinuous
thinking. It challenges the existing rules & procedures and discards them to evolve new
processes.

(ii) BPR recognises the potential of IT for the efficient redesign of processes. BPR uses IT to
evolve new processes instead at automating the existing process.

(iii) BPR views the organisation from cross-functional perspective and disregards the constraints
of departmental boundaries.

(iv) BPR may require massive organisation change and re-structuring. BPR causes not just the
change in the process but also changes in many other areas too.

A-85 A benchmark may be defined as a standard or a point of reference against which things
may be compared. Benchmarking is an approach of setting goals & measuring performance
based on best industry practices.
Benchmarking process involves following steps:
(i) Identifying the need for benchmarking: The first step is to understand the needs of
benchmarking. Here objectives of the benchmarking are determined.

(ii) Understanding existing business processes: To make benchmarking exercise successful,


entity must be aware of its existing processes.

(iii) Identify best processes: Now entity should identify best practices & processes for
benchmarking.

GMTESTSERIES.COM®
Page 67

(iv) Compare own processes with others: From the selected best processes or benchmarks,
entity should compare its own processes. Then gaps in performance is analyzed.

(v) Prepare report & implement necessary steps: A report on the Benchmarking initiatives
containing recommendations is prepared and steps are taken to fulfil the performance gaps.

(vi) Evaluation: Organization should evaluate the results of the benchmarking process it
undertook in terms of improvements achieved compared to the objectives established.

A-86

Basis Entrepreneur Intrapreneur


Meaning Entrepreneur refers to a Intrapreneur is an employee
person who starts his own who promotes innovation
business with a new idea. within the organisation.
Dependency An entrepreneur is An intrapreneur is dependent
independent in his on the entrepreneur (owner).
operations.
Fund raising Entrepreneur starts his Intrapreneur is not required
business by raising the funds to raise funds himself & he is
himself. funded by the employer.
Ownership Entrepreneur has the He may not be the owner of
ownership of his business. the business. He is usually an
employee or manager.
Risk Entrepreneur bears the risk Intrapreneur does not fully
associated with the business. bear the risk involved.
Profits Entrepreneur is entitled to the Intrapreneur is usually
profits associated with entitled for the fixed salary
business. and bonus (if any).

GMTESTSERIES.COM®
Page 68

A-87 Given below are the issues which are to be considered in the strategy implementation:
(i) Programme Implementation

(ii) Projects Implementation

(iii) Procedural Implementation

(iv) Resource allocation

(v) Structural Implementation

(vi) Leadership Implementation

(vii) Behavioural Implementation

A-88
Transactional Leadership Transformational Leadership
This is the formalized approach of leadership. This is the informalized approach of
leadership.
This leadership style is suitable for: This leadership style is suitable for:
• Matured organisations • Organisations in initial stage
• Organisations performing well • Poor performing entities
• Organisations working in stable environment • Entities facing unstable environment

This leadership style is appropriate when the This leadership style is appropriate when the
organization wants to continue existing organization wants to adopt some major
system without going for any major change. changes.
This leadership style uses top-down approach. This leadership style uses bottom-up
approach.
This leadership style provides the scope of This leadership style provides the scope of
only one leader at a time. more than one leader at a time.

GMTESTSERIES.COM®
Page 69

A-89 Typically, all organizations uses 4 P’s of marketing mix made of Product, Price, Place &
Promotion but this is not exhaustive in nature. It is important to discuss a few more elements
that may form part of an organizational marketing mix strategy. They have got more
significance in recent years and growth of services has a major role for the inclusion of newer
elements in marketing mix. A few new Ps are:
• People: All human element who play a part in delivery of the market offering and thus
influence the buyer’s perception like the firm’s employees.

• Process: Actual procedures, methods & flow of activities by which product or service is
delivered.

• Physical evidence: The environment in which the market offering is delivered and where the
firm and customer interact.

A-90 To survive and succeed in this competitive marketplace, entity adopts various strategies
for its different business levels, stage of business life cycle or product life cycle and also the
competitive situation in the market. The various strategies an organisation may adopt are as
follows:
Basis Types
Organisational Level Corporate Level Business Level Functional Level
Stages of Business Life Introduction Stage - Market Penetration Strategy Growth Stage -
Cycle Growth/Expansion Strategy Maturity Stage - Stability Strategy

GMTESTSERIES.COM®
Page 70

Decline Stage - Retrenchment/ Turnaround Strategy


Competition Competitive Strategies - Cost Leadership, Differentiation, Focus
Collaboration Strategies - Joint Venture, Merger & Acquisition,
Strategic Alliance

A-91
Cost Leadership Strategy Differentiation Strategy
It is one of the generic strategies specified by It is one of the generic strategies specified by
Michael Porter. Michael Porter.
Cost leadership strategy means having the In differentiation strategy, entity tries to
lowest cost of operation, production, develop a product or service with unique
procurement, storage and distribution in the features or attributes that are different from
industry. the competitors.
This strategy is directed towards the price- This strategy is particularly applicable for the
sensitive buyers. buyers who are relatively price insensitive.
Through cost leadership strategy, organisation Successful differentiation strategy allows firm
tries to undercut its competitors through the to charge a premium price for its product and
prices. services and to gain customer loyalty.
To achieve cost leadership, entity needs tight Differentiation strategy needs strong
cost control, proper supervision, intolerance innovation & research capabilities, rapid
towards waste, very high efficiency etc. product innovations, increase brand image
and value etc.
The risk of pursuing cost leadership strategy is Major risk associated with differentiation
that competitors may recognise the successful strategy is that customers may not value the
cost leadership strategy and copy it. differentiating features offered by the
company and may not pay the premium prices
thus causing failure of differentiation strategy.

GMTESTSERIES.COM®
Page 71

A-92 Although competition makes organizations work harder, intense competition is neither a
coincidence nor bad luck. All organizations faces competition. To gain a deep understanding of
a company’s industry and competitive environment, managers do not need to gather all the
information they can find and waste a lot of time digesting it. Rather, the task is much more
focused. A powerful and widely used tool for systematically diagnosing the significant
competitive pressures in a market and assessing the strength and importance of each is the
Porter’s five-force model of competition. This model holds that the state of competition in an
industry is a composite of competitive pressures operating in five areas of the overall market.
These are:
(i) Threat of new entrants

(ii) Bargaining power of customers

(iii) Bargaining power of suppliers

(iv) Rivalry among current players

(v) Threats from substitutes

A-93 Acquisition of existing concern is a means of achieving the growth and expansion. Apart
from the urge to grow, acquisitions and mergers are resorted to for purposes of achieving a
measure of synergy between the parent and the acquired enterprises. Synergy may result from
the physical facilities, technical and managerial skills, distribution channels, research and
development and so on. Some of the popular acquisition are:
• Tata Steel’s acquisition of Corus

• Tata Motor’s acquisition of British Jaguar Land Rover

• Mittal Steel’s takeover of Arcelor

• Google’s acquisition of Android, YouTube etc.

GMTESTSERIES.COM®
Page 72

A-94
Concentric Diversification Conglomeratic Diversification
If the new business opted by the entity is If the new business opted by the entity is
linked with its existing business through totally disjoint or unrelated with its existing
process, market or technology, it is called business, it is called conglomeratic
concentric diversification. diversification.
It is also called related diversification. It is also called unrelated diversification.
For example, if a school book publishing For example, if a school book publishing
company enters into the business of school company enters into the business of stock
stationery and school uniform, it is concentric broking, it is known as horizontally integrated
diversification. diversification.

A-95 A sick company is a company which has huge accumulated losses which have eroded its
net worth. Electric home appliance is a sick company and is evaluating retrenchment strategy.
Retrenchment strategy is followed when an organization wants to substantially reduce the
scope of its activity. The various kinds of retrenchment strategy are:
(i) Turnaround Strategy: Retrenchment may be done either internally or externally. For internal
retrenchment to take place, emphasis is on improving internal efficiency, known as turnaround
strategy. Through turnaround strategy, organisation focus on ways to reverse the process of
decline. It may try to reduce costs, eliminate unprofitable outputs, generate revenue, improve
coordination, better control, and so on. It may also involve changes in top management and
reorienting leadership.

(ii) Divestment Strategy: Divestment strategy involves the sale or liquidation of a portion of
business, or a major division, profit centre or SBU. Divestment is usually a part of restructuring
plan and is adopted when a turnaround has been attempted but has proved to be unsuccessful.
(iii) Liquidation Strategy: In retrenchment, the most extreme and unattractive is liquidation
strategy. It involves closing down a firm and selling its assets. It is considered as the last resort
because it leads to serious consequences such as loss of employment for workers. Liquidation

GMTESTSERIES.COM®
Page 73

strategy may be unpleasant as a strategic alternative but when a "dead business is worth more
than alive", it is a good proposition.
The appropriate retrenchment strategy will depend on the circumstances and goals of the
company.

A-96 Considering the facts of the case, the company needs to conduct strategy audit. Strategy
audit is needed under following conditions:
(i) When performance indicators reflect that a strategy is not working properly or is not
producing desired outcomes.

(ii) When the goals and objectives of the strategy are not being accomplished.

(iii) When a major change takes place in the external environment of the organization.

(iv) When the top management plans: - to fine-tune existing strategies and introduce new
strategies & - to ensure that a strategy that has worked in the past continues to work despite
the internal and external changes that may have occurred.

Strategy Audit includes three basic activities:


(a) Examining the underlying bases of a firm’s strategy,

(b) Comparing expected results with actual results, and

(c) Taking corrective actions to ensure performance conforms to plans.

A-97 There are some processes which are extremely critical for the success and survival of the
entity. These processes are called core processes. Core processes if properly managed,
enhances the capabilities of the organisation and provides it competitive advantage. Some of
the core processes are:
• In FMCG sector, marketing is a core process.

• In electronics and semi-conductor industry, the new product development is core process.

• In insurance industry, premium charged from customer and profit earned by company after
settlement of claim is a core process.

GMTESTSERIES.COM®
Page 74

A-98 ABC Ltd. needs to break higher level strategies into functional strategies for
implementation. These functional strategies, in form of Marketing, Finance, HR, Production,
Research and Development help in achieving the organisational objective. The reasons why
functional strategies are needed can be enumerated as follows:
• Functional strategies lay down clearly what is to be done at the functional level.

• They provide a sense of direction to the functional staff.

• They facilitate the implementation of corporate and the business level strategies.

• They act as basis for controlling activities in the different functional areas of business.

• Functional strategies help in bringing harmony and coordination in the organisation.

• Similar situations occurring in different functional areas are handled in a consistent manner.

A-99 For a new product pricing, an organization may either choose to skim or penetrate the
market. In skimming prices are set at a very high level. In penetration pricing firm keeps a low
price for a new product to grab a large market share. In the given case, as the company has
kept a low price for its product, it has adopted a penetration pricing policy. In pricing a really
new product at least three objectives must be kept in mind:
(i) Making the product acceptable to the customers
(ii) Producing a reasonable margin over cost

(iii) Achieving a market that helps in developing market share.

A-100 There are three major research and development approaches for implementing
strategies.
(i) Technology Leaders: These are the firms who develops new technologies. These firms take a
lead in R&D hence they are called Technology Leaders. This strategy involves huge risk as it
causes high R&D costs and there is no surety that the ultimate product would be a commercial

GMTESTSERIES.COM®
Page 75

success. However this strategy offers the highest reward as well. E.g. Nokia, Apple, BMW,
Boeing etc.

(ii) Technology Imitator / Innovative Imitator: These are the firms who do not take lead in R&D
but imitates the successful products and services based on the new technologies. These kinds
of firms must have a very innovative and capable R&D Team who can successfully imitate the
new technologies on timely basis. Here risks and rewards are less compared to technology
leader firms.

(iii) Lower End Technology Followers: These are the low-cost producers who mass produce
products similar to but significantly less expansive compared to the products of technology
leaders or technology imitator firms. These firms are not required to make high R&D
investments but needs high investment in plant and machineries to mass produce the product.

GMTESTSERIES.COM®

You might also like