0 of 42 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 42 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
In which form of ECS there is a single receiver of funds from a large number of customers
Which of the following is not a sub-process of Information Security
Which of the following is not the challenge of IT for CBS
Which is not an example of configuration
_______ is not the key aspect in-built into architecture of a CBS are as follows
Which is not the risk associated with CBS
Which of the following is not the type of Non-fund based credit facility
Abbrivate CIBIL.
Which server software stores the name and password of the entire internet banking customer
_______ area consist of dealing room operations wherein dealers enter into deal with the various corporate & interbank counter-parties
_______ area consist of dealing room operations wherein dealers enter into deal with the various corporate & interbank counter-parties
In which form of ECS there is a single account to be debited against which many accounts with a number of banks in same clearing house area are credited
_______ involves transfer of funds from one place to another
Which of the following is not the type of fund based credit facility
Which is not the type of mortgage
Which of the following is not the type of risk response strategy
How many stages are present in money laundering
________ is an attempt to obtain sensitive information such as usernames, passwords and credit Card details etc.
What documents are issued by bank where customer is having their account & generally by central office of banks
___________ means the listing of program, computer commands, Design & layout and program analysis of computer resource in any form .
What is a sophisticated computer that accepts service requests from different machines called client.
Arrange the correct sequence for business process flow of Current A/c & Saving A/c:
i) RM will request for KYC
ii) Customer can avail facilities
iii) Current/ Saving Account will provided to customer
iv) Customer approaches RM
v) Documents handed over to credit team
Arrange the correct sequence for business process flow of Sale using credit card :
i) Receipt is generated & sale is completed
ii) Send authentication request to merchant’s bank
iii) Approval Msg. will received from credit card issuing bank
iv) POS will process the transection v) Credit card is swiped by POS machine.
Arrange the correct sequence of data analytics :
i) Implementation ii) Planning, iii) Updation, iv) Approval, v) Selection
Banking Regulation Act , is introduced in which year.
Banks have a highly-defined organization structure with clearly defined roles, authority & responsibility. The given statement describes which of the following
Conversion of illegal proceeds into apparently legitimate business earnings through normal financial or commercial operations is known as _________.
Conversion of illegal proceeds into apparently legitimate business earnings through normal financial or commercial operations is known as _________.
Crime that involves use of computer & a network is known as ______
Employees of banks should be trained in the proper manner for handling of personal data of customers .
Finacle & Finn One are example of _________.
Which risk response is used to “formally acknowledge that risk exists and monitor it”
Making insurance coverage for risk is a type of risk response to _______the risk
Master is created ones _________ is completed
Movement of proceeds, frequently currency, from the scene of crime to a place, or into a form, less suspicious & more convenient for the criminal is known as ______?
Punishment for cheating by personation using computer resource is described under which section?
Punishment for identity theft is described under ______
Punishment for violation of privacy is described under ____
By implementing _________ risk can be mitigated?
Section 66 describes punishment for offence under _____
What is the potential harm caused if a threat exploits a particular vulnerability to cause damage to an assets.
The Reserve Bank Of India is established on _______?