Tuesday, 29 December 2020

Forex operations recollected questions on 23.02.2020

 Forex operations  recollected questions on 23.02.2020



how many incoterms...
CIP meaning ...
Export registration valid for how many years...
Pre requisite for exporter importer (pan / IEC/ Registration with export promotion council)...
Duty rate in EPCG scheme?...
Back office front office middle office differentiation...
Normal transit period means ?
NTP for foreign bill...
Corporate donation can be done for which of the following purposes...
Gift from resident to non resident can be credited to which account ...
Hedging of ecb ...
Refinance of ecb ....
Ecb eligibility for startups ...
Short medium long term loans def...
Uniform rules for collection code number....
BPO three questions...
Docdex rules timeline for disposal of disputes
Ex works.....
counsel invoice...
Lc rules defined under which articles...
Rejection code in swift...
45a of swift form defines wat...
Ecgc whole turnover pc...
Forfeiting definition...
Definition of credit...
Meis sies schemes in FTP 2020...
GSTP which country not in list...
Duty drawback refund exemptions....
Date of export in multimodal transport...
Current account definition...
Prohibited capital investments...
Stale document in lc...
Bill of ladding on board definition....
Shipping insurance is not fully indemnified ...
High sea sales happens before ?..
High sea sales happens at ...
Export value will be taken at fob or cif under export schemes...
Direct transfer of documents between seller and buyer in case of preferential trade agreement countries...
How much maximum advance repayment in normal imports ....
How much maximum advance repayment in services imports...
Software export happens through which package....
Overdue bills liquidation at wat rate...
Overdue bills rate of interest after 360 days...
Lc is opened against ? Confirmed order / po confirmed by seller ...
Avalising meaning ...
Counselor invoice meaning

Forex recollected questions

 Forex recollected questions 


1) How many incoterms?
2) Full form of DAT
3)Few questions from doc letter of credit .
4)Nearly 8 questions on LRS
5)NRI remittances limits etc
6)Basic questions on URR 725,
7)URC 522
8)ISP 98
9)Known holiday in forex
10)One question on section of fema
11)Ecgc scheme
12)Question on customs related
13)TT buying TT selling
14)Bill discounting
15)Insurance docs in LC
16) three numericals on cross rates

Recollected questions on IT security 19.01.2020

 Recollected questions on IT security 19.01.2020

1. Major change in It act 2008 and IT act 2000
2. which act is ammened after CTS ? choices r Rbi a t BR act  Indian evudence act
3.It security s resoonsible fir all employes and driver is CiSO
4.Ciso will report to Hirm
5. Threat vulnerability case study
6. Threat vector
7.crime s not bcos of oppurtnty need ratiaisation answer s inteligence
8.Which metal dector is used in inland indepth
9. which metal detector cannot diferentiate metals
10. which does not comes under indepth Security
11.SQL injection
12. case study qn on Rootkit
1e.RTP
14.ROP
15.unit twating /whitebox/ blackbox testing
16. warm site/ cold site
17. COBIT developed by which agency of USA
18.which ia bench mark of Indian security stds COBIT OR IASA
19. what has to be hand over to conpany in case of Escrow arrangement- Source code
20. When it has to handover and who should demand the codes under escrow agreemnt
30.salomi technique
31. Acess control case study
32. Acess control policy is for Physical acess or al type access
33. For software protection no physical security s needed or physic security is fully needed or partly if it s a single pC.
34.Maker checker checjer has role power more than maker.
35which is cheaper RFID or Barcode reader
36. wether both bar code reader and RFID can be scanned with same scanner?
37.when a sytem ahould be Tagged with RFId as soon as it is bought or wen it is brought yo the company erc.
38. Arranging the sequence of Physical.movembt of   Hardwares like listing sequencing tagging etc. 
39. life cycle of aoftware devepmnetn lik planning devolping testing implementing and the mam twist is wether maintannce comes under life cycle of developing or the life cycl ends with inplementing only.?
40.which fire extinguisher to b used in setver room Co2
41.CAPtCha is case sensitive
42.stenography/ cryptography.
43 Malware/ spyware/ Addware/ Botner
44. wether Botnet iz a malwRe,?
45. Wanna cry is a ransomware
46. Some question was abt layers in Osi model
47.Ddos
48.dual core process
49. Trapdoor
50.Bit glass
51. Digital india aims at - bringing internet  and e governancce to all parts of society
t2. Cobit is computer governance or IT governamce
53. which ia important in bank customer data prootection along with adata centre or Only dafa centres hvng other data?
54. Atm jackpotti g
55. Green dispensor
56.Load balancing
57. wether security policy of a company is confidential or it can be known to all
58.PGP
59.Dumbster Drving
50. which technique if used for mallicious intention bcomes crime - Sniffing
60. Iso 27700 /27001/27002 _ 2 questions
61. open source application - MS word
62. PCI dss used for??
63. Iaas Paas
76. In buffef overflow attacker targets_ stack
77. secuirty to be ensured untill last mile
78. -Network attac hed storage
79. why disk duplex is better than disk miroring
80.Zeus is a malware attacking banks
81. Zombies
82.spiral model/ iterative model/ waterfall model case study
83.jitter technology
84. pDC (plan do chek)
85. which std is used for life çycle Iso/iec 5288:2008

Questions are modearaate. Taxman book is more than enough to pass. If V COMPLete Cyber crime and fraud managemnt exam before completing IT security it will be easier since 30% questions can be related.

In Taxman book at the end of Each topic few topics were given under the title "KEY WORDS". Most questions are from that.

Cyber crime and fraud management recollected on 28.12.2019

 Cyber crime and fraud management recollected on 28.12.2019

Recollected questions:
Cyber crimes are handled by which orgnanisation in india
Type 1 crime
Preventive control
Detective control
Detterant control
Logical control
Sections and their fine with imprisonment in years
Committes of it security ,it governance, it controls
Netra by which organisation
Fast flux
Stux net
Phising
Shoulder surfing
Digital signature
Oldest agency in india
Few questions on cert in
Passive attack
Active attack
Direct attack
In direct attack
Logic bomb
Zeus
India own operating system boss in under whom
Confidentiality
Availability
Integrity
Conventional crime
Cyber crime
Same features of conv and cyber crime
Tailgating
imp topics are  1differences between viruses and worm
2 it act
3 different types of cyber crimes
4 various types of cards
5 gate way payment
6 prevention and detection control
7 pss act
8 2 tier authentication
9 passive and active attacks
mostly questions from 2  and 3 and 4...units

 Cyber terrorism
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites

Msme recollected questions on 28.12.2019

 Msme recollected questions on 28.12.2019


Investment in P&M, Equipment, Partnership, public and private limited company, Joint Hindu Family, Partnership, women entrepreneurs categories, ITCOT, US small business act, KVIC, SIDC, BCSBI loan application disposal time norm, venture capital fund, smera, cgtmse, angel funds, hybrid capital, collateral free loan, pmegp, red and green clause LC, back to back LC, 5 Cs, credit appraisal, ratios analysis and balance sheet related questions, nayak and other methods of lending,  risk types, PS targets, BDS, Tequp, RRTUFs, back ended subsidy, clusters, rehabilitation n restructuring, drt, arc, mudra, wto, clearancs for setting up unit,  items included in P&M etc... reading of entire book and updated changes is must

Certified Risk management recollected questions on 28.12.2019

 Certified Risk  management  recollected questions on 28.12.2019

1. Calculate geometric mean, harmonic mean.
2. Question on probability related to card.
3. Calculation of duration, mod duration and convexity.
4. Problems on forex. Spot rate given , buy and sell problem
5. Theoretical questions were also many
6. Gap calculation regard to net interest income.
7. Risk weight assets given. Calculation of cet 1, tier 2 and at 1. Tier 1 along with ccb.
8. Calculation of vertical disallowance, horizontal disallowance and capital charge of market risk.

Certified treasury professional exam 28.12.19

Certified treasury professional exam  28.12.19
1)question on price yield curve like nature of curve,meaning of intersection of curve with price axis, etc 5 question
2)option question... Like in the money, at the money, out of money, time Valueof option, intrinsic, call put questions on option based on strike and spot price
3)forward rate agreement.. Numerical 5 marks as per mac mill an book with some changes
4)repo question numerical like forward leg ready leg numerical as per mc millian book
5)bond question npv of coupons and principal related questions 5 marks
6)commercial paper theory questions 5 marks like who can issue, whether cp gives coupon, net worth for issuing cp etc.. Read Mac millian book ,all questions answerable
7)question on forex tt rate bill rate based on nature of transactions which rate to be selected.. 5 questions
8)numecrical on yield calculations and prices calculations for t bills.. Numerical similar to what has been given in appendix at back of Macmillan book 5 question
9)theoretical question were also conceptual.. Question related to bond option derivative swap
Overall questions were medium level of toughness for those who have not worked in this area
These questions I can recollect
Best of luck to those who wish to appear for CTP exam.

Numerical based on FRA, CURRENCY EXCHANGE, REPO TRANSCATION, BOND/YTM, YIELDS ON T-BILL, CURRENT YIELD
A 5 MARKS EASY SET OF QUESTION FROM COMMERCIAL PAPER

Other Theory questions from Bond theorem, Delta, gama etc.
35-40 marks numerical is there.

 

Previous years Digital banking recollected

 Previous years Digital banking recollected


Aeps
Nach
Upi
Virtual keyboard to safegaurd against keylogger
4 questions on process of chargeback
Nfc technology and RFID
Approx 8-10 question on security of POS terminals
2 que on MDR
What is cash withdrawal through pos called

Digital Banking Recollected questions:::

Digital Banking Recollected questions:::
1.CTS abbreviation cheque truncation system
2. What is firewall?: A software programme for protecting against unauthorized access to the information.
3.BBPS … Bhatart Bill payment sytem
4.MDR: merchant discount rate
5. minimum amount which can be remitted under RTGS by a customer: Minimum Rs. 2 lac and no Maximum.
6.Max amount of NEFT can be remitted ..no limit
7. AEPS stands for : Aadhar Enabled Payment System.
8. CPPC stands for : Central Pension Processing Cell.
9. IBPP stands for : Internet Bill Presentation & Payment.

ISB Recollected Questions and Exam Tips::::

 ISB Recollected Questions and Exam Tips::::


Function of modem, which is not an OOP Lang.


 C C++ Java C#, questns abt DRP,


Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP


RISK MANAGEMENT recollected questions :-

 RISK MANAGEMENT recollected questions :-

Maturity bucket case study
Modified Duration (YTM) Semiannual, Convexity case study 
Basel 3 T1 and T2 case study
LTV ratio case study
Foreign exchange case study
Rating Migration case study
MCLR Case Study
Basis risk
Trading book
EAD, PD, LGD
BPV
Various Approaches for Market Risk, Credit Risk , Operational Risk
Various 1 marks numericals on foreign exchange
Various RWA were asked
Etc.

MSME recollected questions

 MSME recollected questions

1. Micro, small & medium sector
2. Priority sector classification (esp foreign banks less than 20 branches etc)
3. One sum on calculation of NWC
4. CLUSTER development features
5. TIFAC full form, CODISSIA located at?
6. Mahila schemes implemented by SIDBI
7. Which are NOT included under plant & machinery
8. HUF, LLP questions on minor admissibility
9. Common seal compulsory for companies/LLP
10. GRAY sick area
11. Ots implemented by? - individual banks
12. Highest investment by overseas investors is under which sectors
13. Study report Of DIC recommendations
14. Federation of msme for West Bengal state? ITCOT located in which state? MSME council located? Msme as per constitution is state/central/concurrent subject?

Cyber fraud and prevention Recollected questions

 

Cyber fraud and management:: preventionss
Recollected questions:
Cyber crimes are handled by which orgnanisation in india
Type 1 crime
Preventive control
Detective control
Detterant control
Logical control
Sections and their fine with imprisonment in years
Committes of it security ,it governance, it controls
Netra by which organisation
Fast flux
Stux net 
Phising 
Shoulder surfing
Digital signature 
Oldest agency in india
Few questions on cert in
Passive attack
Active attack
Direct attack
In direct attack
Logic bomb
Zeus
India own operating system boss in under whom
Confidentiality
Availability 
Integrity
Conventional crime
Cyber crime
Same features of conv and cyber crime
Tailgating
imp topics are  1differences between viruses and worm
2 it act
3 different types of cyber crimes
4 various types of cards 
5 gate way payment
6 prevention and detection control
7 pss act
8 2 tier authentication
9 passive and active attacks
mostly questions from 2  and 3 and 4...units


 Cyber terrorism
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security 
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites