Tuesday, 29 December 2020

IT security recollected questions on 06.09.2020

 IT security recollected questions on 06.09.2020 

ISMS 

cobit

Cyber espionage

Malware

Botnets

Downtime

Incident response

Backups

HOT SITE WARM SITE

PDC 

CDR

SEISMIC ZONE

AUDIT CHARTER

FIREWALLS

SMTP

CRYPTOGRAPHY AND STEGANOGRAPHY

VLAN

HUB

SNIFFER

EAVES DROPPING

GOPAL KRISHNA WORKING GROUP

RBI 2018 RECOMMENDATIONS

BLADE SERVER

RFID

GRAMM LEACH BILEY ACT

SAS70

GAISP AND GAIT

ISO27001

VOIP

SALAMI TECHNIQUE

LOAD BALANCING

RDBMS

PREVENTION N DETECTION

ZOMBIE

SECURITY GOVERNANCE

KRA

RTI2005

ACCESS PRIVILEGE 

2 QUESTIONS WERE OF HYPOTHETICAL SITUATION

BC-DRM

FAULT TOLERANT SYSTEM INCLUDES



COBIT

ISACA

ISO BASED QUE

INCIDENT MANAGEMENT

BCPDR

BLADE SERVER

RTI 

ISMS

HARDWARE SECURITY

RDBMS 

WINDOW CONFIGURATION

PHYSICAL SECURITY

DIFF BT VIRUS AND WORM

FASTFLUX

CRYPTOGRAPHY

Following questions were asked for MSME exam held on 23.08.2020

  Following questions were asked for MSME exam held on 23.08.2020


Which model MSME policy represent

Max. Person in transport operator

New definition of MSME

Atmanirbhar package

Medium enterprises is a part of priority sector or not

Max. Partner in private Ltd firm

Name of women entrepreneurs schemes

What is ZED.

Max. Investment of company in MSME

Benifits of LLP

Who is responsible for regulating MSME schemes in states

Full form of HUDCO, TEV and MUDRA, 

Max. Limit for collateral free loan.

Max extent of guarantee cover in CGTSME for different amounts

Problems faced by MSME

What is hurt money, venture capital and angel funds

What is composite loan scheme, 

Single window operator

Limits under PMEGP

What is documentary bill

Back to back LC

NUMERICAL ON debtors turnover ratio, DER, DSCR

What does DSCR indicates

Identify MSME credit rating agencies

Benefits of credit rating agencies

Target for micro enterprises for foreign banks

Roles of BDS

Effect of technology - innovation, diffusion, substitution

Motive of TEQUP scheme

Benefits of cluster

Steps for cluster selection

Where is knitwear cluster

Definition of sick unit

External and internal causes of sickness

What is sick grey area

Viability criteria

What is siphoning of funds

NPA classification

What is micro finance

What is multiple lending

Cyber crime recollected questions on 09th aug 2020

 Cyber crime recollected questions on 09th aug 2020

Cyber stalking 

IT amendment act

Types of control 

Cyber crime origin 

Punishment for cyber crime 

Cyber squatting 

CIA

CBI function 

Honeypot 

Payment system 

Information security 

ISO 27001

NTRO

Rootkit

Trojan horse 

Info steal 

Cyber terrorism 

Hacking 

Hacking defined under IT or ITA

Computer Fraud 

Vishing 

IPC

DoS

Cyber Extortion 

Fire Alarm and CCTV, which type of control 

Malware 

Hactivist 

White hat hackers

Digital signature 

Electronic signature 

Integrity 

Durability 

Cyber forensic

RBI as regulatory

Sniffer

PKI

Encryption-decryption

Motive of hacker

OLTP

Payment Gateway 



Very few questions from module D.

MSME recollected questions 02082020

 MSME recollected questions 02082020



Recollected qs msme 02.08.20 3.30 pm batch

atmanirbhar bharat- 20000cr allocation and 1qs of which is correct.
Crm is ..
Mudra, sarfesi full form
Arrange correct order of credit process
1qs of diffusion, 
numerical on iscr, 
Arrange correct sequence of cluster development
Outcome of 2008 crisis- basel 3
Common of int and ext causes of Sick enterprises
Illeterate person execution of doc
Msme women enterprise
Tifac 1 qs
Doubtful asset
Rehabilitation package
Composite loan 1 qs 
Smera 1qs
Credit rating agency work 1 qs
Knitwear cluster- Ludhiana
Notice period in 6 months
Women entrepreneurs share- 51%
Private ltd directors
Max credit guarantee for women
New classification of msme
1 qs on wto
Pricing 1 qs
Mfi 1qs
Cambridge 1qs
Ots 2qs
Securitisaion find incorrect one
Diversion of funds- find correct one
Sick grey unit 1qs
Unido 1 qs on find incorrect one
Tuf related to which sector
Bds 3 qs
Msme do 1 qs
Contigent liablity- 1 qs
Pmegp 1 qs(max limit+ subsidy)
Single window scheme -2 qs
Venture capital- definition
Sidbi -2qs
Kvic-1qs
Fdi policy- 24%
New industrial policy-1qs
1qs on regulatory framework- 4 country names were given
1 qs on classification as per manpower/turnover.
SARFAESI full form
MSME women enterprises 3 ques
2mrks DSCR DEBTORS TURNOVER RATIO INTRST COVERAGE RATION 
RECENT JUNE 20 ATMA NIRBHAR PACKAGE 3 QUES
FDi investment policy
Recent changes in msme defention 2ques
Sick unit viability norms
Reasons for sick units both internal and external causes in single ques
CGTMSE coverege tricky women enterpris quess
About CRM
MUDRA IS ESTABLIHED FOR

Partnership firm llp diff
Security for lending JLG
 illiterate person execution of loan docs for 2mrks

Kyc AML QUESTIONS RECALLED: 12.07.2020

 Kyc AML QUESTIONS RECALLED: 12.07.2020


1. US SANCTIONS
2. BANK SECRECY ACT
3. MONEY LAUNDERING REGULATION 2007 -UK AML/ CFT LEGISLATION
4 . 3 TO 4 QUESTIONS ON DESIGNATED DIRECTOR
5. PRINCIPAL OFFICER
6. OTP BASED EKYC 4 QUESTIONS
7. CKYCR RELATED 2 QUESTIONS
8. RECORD RETENTION PILICY FOR TRANSACTION REPORTED TO FIU IND
9. BENEFICIAL OWNER IN CASE OF COMPANY AND TRUST
10. BO CONTROLLING INTEREST
11. ADVERSE EFFECT OF MONEY LAUNDERING
12. DIFF BETWEEN ML AND TF
13. STR CTR CCR REPORTING FREQUENCY
14. TRANSACTION MONITORING
15. AML ALERT
16. FATF SANCTIONS,UN SANCTIONS
17. FIU IND FUNCTION
18. FATF CELL FUNCTION
19. ED FUNCTIONING
20. SERIOUS FRAUD INVESTIGATION OFFICE
21. FACTORS DISSEMINATING STR TO LAW ENFORCEMENT AGENCIES
22. EXCHANGE HOUSE
23. AS PER BCBS SHARING OF INFORMATION FLOW
 24. FATF REGIONAL BODIES
25.AML CELL FUNCTION
26. SMALL ACCOUNT 3 QUESTIONS
27. DESIGNATED OFFICER RELATED 1 QUESTION

ALL QUESTIONS WERE FROM THE BOOK ONLY

New MSME recollected questions

 New MSME recollected questions 


Investment in P&M, Equipment, Partnership, public and private limited company, Joint Hindu Family, Partnership, women entrepreneurs categories, ITCOT, US small business act, KVIC, SIDC, BCSBI loan application disposal time norm, venture capital fund, smera, cgtmse, angel funds, hybrid capital, collateral free loan, pmegp, red and green clause LC, back to back LC, 5 Cs, credit appraisal, ratios analysis and balance sheet related questions, nayak and other methods of lending,  risk types, PS targets, BDS, Tequp, RRTUFs, back ended subsidy, clusters, rehabilitation n restructuring, drt, arc, mudra, wto, clearancs for setting up unit,  items included in P&M etc... reading of entire book and updated changes is must.


A lot of questions from ratio analysis... Factoring, calculate break even analysis in terms of unites, old msme classification, PMEGP, MUDRA Bank, MSME subvention scheme, a lot of questions clusters and many of them tricky too, calculation on the basis of First lending and 2 lending method, Ganguly committe 4c, RBI UK committee on msme, Internal external causes of sickness, Banking appraisal KVIC and many more

Everything from book except some latest developments ..only you have to be ready for tricky questions and for that depth reading is must as per my todays analysis

Recollected questions of exam conducted on 28.06.2020

 Recollected questions of exam conducted on 28.06.2020


Defination of ML as per United Nations- identify correct one

What type of impact ML cause- social, economic, political

Difference between ML and TF- Identify correct one

Cycle of ML- Including case studies to identify which step is mentioned

Method of ML- Including case studies to identify which method is used

What is smurfing, shell companies, off shore banking, hawala system,mutual evaluation, correspondent banking

Palermo convention

which ML laws or act is used in which country

PMLA- Record maintenance, punishment, penalties,

UAPA offence

Role of national investigation agency, role of ED, 

Categories of US sanction

Elements of KYC police, 

Definition of customer as per RBI

Concept of beneficiary owner, Identify invalid OVD, Restrictions on small account, which OVDs is to be obtained for proprietary account, partnership account, trust account, PEP, pooled account, limitations for non face to face customer

for whom EDD should be done - including case studies, how to screen customer, periodicity of KYC  for various risk categories, 

When to go for Partial freezing of account, types of reporting to be done, limit of CTR, time limit of STR, What is white listing,

Role functions of PO, senior management, role of audit, at what level KYC training is important

CCP EXAM 23-02-2020

 CCP EXAM 23-02-2020


1.All most 10 questions from ratios and fund flow and cash flows.( queations  on stock and debtors turnover and their impacts)

2. 5 Questions on working capital assessment by different methods.

3. 5 Questions on lc calculatiin and definitions of lcs.

4.5 Questions set on PERIORITY SECTOR LENDING CERTIFICAE.
5.5 Questions on Msmed act.

6. 4 questions break even analysis.

7.Around 7 questions on payback method and irr

8. One question on formula of ANBC

9.Two questions from company act.(commemcement of business certificate not required now) etc.

10.There were  2 or 3 quetions on provision( provision for mse I remembered. Provisining coverage ratio also asked.

11. Kimberly method related to which.

12.Cardinal principal of lending.

BEP 5 Marks.
WC assessment,
NPV, IRR concept.
LC/BG assessment case study.
PSLC.
Priority sector classification.
LTV, Provisioning norms.
B/S analysis, DER.
ISCR calculation.

Theoretical questions are conceptual, problems were easy, read handbook on credit management thoroughly.

Forex operations recollected questions on 23.02.2020

 Forex operations  recollected questions on 23.02.2020



how many incoterms...
CIP meaning ...
Export registration valid for how many years...
Pre requisite for exporter importer (pan / IEC/ Registration with export promotion council)...
Duty rate in EPCG scheme?...
Back office front office middle office differentiation...
Normal transit period means ?
NTP for foreign bill...
Corporate donation can be done for which of the following purposes...
Gift from resident to non resident can be credited to which account ...
Hedging of ecb ...
Refinance of ecb ....
Ecb eligibility for startups ...
Short medium long term loans def...
Uniform rules for collection code number....
BPO three questions...
Docdex rules timeline for disposal of disputes
Ex works.....
counsel invoice...
Lc rules defined under which articles...
Rejection code in swift...
45a of swift form defines wat...
Ecgc whole turnover pc...
Forfeiting definition...
Definition of credit...
Meis sies schemes in FTP 2020...
GSTP which country not in list...
Duty drawback refund exemptions....
Date of export in multimodal transport...
Current account definition...
Prohibited capital investments...
Stale document in lc...
Bill of ladding on board definition....
Shipping insurance is not fully indemnified ...
High sea sales happens before ?..
High sea sales happens at ...
Export value will be taken at fob or cif under export schemes...
Direct transfer of documents between seller and buyer in case of preferential trade agreement countries...
How much maximum advance repayment in normal imports ....
How much maximum advance repayment in services imports...
Software export happens through which package....
Overdue bills liquidation at wat rate...
Overdue bills rate of interest after 360 days...
Lc is opened against ? Confirmed order / po confirmed by seller ...
Avalising meaning ...
Counselor invoice meaning

Forex recollected questions

 Forex recollected questions 


1) How many incoterms?
2) Full form of DAT
3)Few questions from doc letter of credit .
4)Nearly 8 questions on LRS
5)NRI remittances limits etc
6)Basic questions on URR 725,
7)URC 522
8)ISP 98
9)Known holiday in forex
10)One question on section of fema
11)Ecgc scheme
12)Question on customs related
13)TT buying TT selling
14)Bill discounting
15)Insurance docs in LC
16) three numericals on cross rates

Recollected questions on IT security 19.01.2020

 Recollected questions on IT security 19.01.2020

1. Major change in It act 2008 and IT act 2000
2. which act is ammened after CTS ? choices r Rbi a t BR act  Indian evudence act
3.It security s resoonsible fir all employes and driver is CiSO
4.Ciso will report to Hirm
5. Threat vulnerability case study
6. Threat vector
7.crime s not bcos of oppurtnty need ratiaisation answer s inteligence
8.Which metal dector is used in inland indepth
9. which metal detector cannot diferentiate metals
10. which does not comes under indepth Security
11.SQL injection
12. case study qn on Rootkit
1e.RTP
14.ROP
15.unit twating /whitebox/ blackbox testing
16. warm site/ cold site
17. COBIT developed by which agency of USA
18.which ia bench mark of Indian security stds COBIT OR IASA
19. what has to be hand over to conpany in case of Escrow arrangement- Source code
20. When it has to handover and who should demand the codes under escrow agreemnt
30.salomi technique
31. Acess control case study
32. Acess control policy is for Physical acess or al type access
33. For software protection no physical security s needed or physic security is fully needed or partly if it s a single pC.
34.Maker checker checjer has role power more than maker.
35which is cheaper RFID or Barcode reader
36. wether both bar code reader and RFID can be scanned with same scanner?
37.when a sytem ahould be Tagged with RFId as soon as it is bought or wen it is brought yo the company erc.
38. Arranging the sequence of Physical.movembt of   Hardwares like listing sequencing tagging etc. 
39. life cycle of aoftware devepmnetn lik planning devolping testing implementing and the mam twist is wether maintannce comes under life cycle of developing or the life cycl ends with inplementing only.?
40.which fire extinguisher to b used in setver room Co2
41.CAPtCha is case sensitive
42.stenography/ cryptography.
43 Malware/ spyware/ Addware/ Botner
44. wether Botnet iz a malwRe,?
45. Wanna cry is a ransomware
46. Some question was abt layers in Osi model
47.Ddos
48.dual core process
49. Trapdoor
50.Bit glass
51. Digital india aims at - bringing internet  and e governancce to all parts of society
t2. Cobit is computer governance or IT governamce
53. which ia important in bank customer data prootection along with adata centre or Only dafa centres hvng other data?
54. Atm jackpotti g
55. Green dispensor
56.Load balancing
57. wether security policy of a company is confidential or it can be known to all
58.PGP
59.Dumbster Drving
50. which technique if used for mallicious intention bcomes crime - Sniffing
60. Iso 27700 /27001/27002 _ 2 questions
61. open source application - MS word
62. PCI dss used for??
63. Iaas Paas
76. In buffef overflow attacker targets_ stack
77. secuirty to be ensured untill last mile
78. -Network attac hed storage
79. why disk duplex is better than disk miroring
80.Zeus is a malware attacking banks
81. Zombies
82.spiral model/ iterative model/ waterfall model case study
83.jitter technology
84. pDC (plan do chek)
85. which std is used for life çycle Iso/iec 5288:2008

Questions are modearaate. Taxman book is more than enough to pass. If V COMPLete Cyber crime and fraud managemnt exam before completing IT security it will be easier since 30% questions can be related.

In Taxman book at the end of Each topic few topics were given under the title "KEY WORDS". Most questions are from that.

Cyber crime and fraud management recollected on 28.12.2019

 Cyber crime and fraud management recollected on 28.12.2019

Recollected questions:
Cyber crimes are handled by which orgnanisation in india
Type 1 crime
Preventive control
Detective control
Detterant control
Logical control
Sections and their fine with imprisonment in years
Committes of it security ,it governance, it controls
Netra by which organisation
Fast flux
Stux net
Phising
Shoulder surfing
Digital signature
Oldest agency in india
Few questions on cert in
Passive attack
Active attack
Direct attack
In direct attack
Logic bomb
Zeus
India own operating system boss in under whom
Confidentiality
Availability
Integrity
Conventional crime
Cyber crime
Same features of conv and cyber crime
Tailgating
imp topics are  1differences between viruses and worm
2 it act
3 different types of cyber crimes
4 various types of cards
5 gate way payment
6 prevention and detection control
7 pss act
8 2 tier authentication
9 passive and active attacks
mostly questions from 2  and 3 and 4...units

 Cyber terrorism
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites

Msme recollected questions on 28.12.2019

 Msme recollected questions on 28.12.2019


Investment in P&M, Equipment, Partnership, public and private limited company, Joint Hindu Family, Partnership, women entrepreneurs categories, ITCOT, US small business act, KVIC, SIDC, BCSBI loan application disposal time norm, venture capital fund, smera, cgtmse, angel funds, hybrid capital, collateral free loan, pmegp, red and green clause LC, back to back LC, 5 Cs, credit appraisal, ratios analysis and balance sheet related questions, nayak and other methods of lending,  risk types, PS targets, BDS, Tequp, RRTUFs, back ended subsidy, clusters, rehabilitation n restructuring, drt, arc, mudra, wto, clearancs for setting up unit,  items included in P&M etc... reading of entire book and updated changes is must

Certified Risk management recollected questions on 28.12.2019

 Certified Risk  management  recollected questions on 28.12.2019

1. Calculate geometric mean, harmonic mean.
2. Question on probability related to card.
3. Calculation of duration, mod duration and convexity.
4. Problems on forex. Spot rate given , buy and sell problem
5. Theoretical questions were also many
6. Gap calculation regard to net interest income.
7. Risk weight assets given. Calculation of cet 1, tier 2 and at 1. Tier 1 along with ccb.
8. Calculation of vertical disallowance, horizontal disallowance and capital charge of market risk.

Certified treasury professional exam 28.12.19

Certified treasury professional exam  28.12.19
1)question on price yield curve like nature of curve,meaning of intersection of curve with price axis, etc 5 question
2)option question... Like in the money, at the money, out of money, time Valueof option, intrinsic, call put questions on option based on strike and spot price
3)forward rate agreement.. Numerical 5 marks as per mac mill an book with some changes
4)repo question numerical like forward leg ready leg numerical as per mc millian book
5)bond question npv of coupons and principal related questions 5 marks
6)commercial paper theory questions 5 marks like who can issue, whether cp gives coupon, net worth for issuing cp etc.. Read Mac millian book ,all questions answerable
7)question on forex tt rate bill rate based on nature of transactions which rate to be selected.. 5 questions
8)numecrical on yield calculations and prices calculations for t bills.. Numerical similar to what has been given in appendix at back of Macmillan book 5 question
9)theoretical question were also conceptual.. Question related to bond option derivative swap
Overall questions were medium level of toughness for those who have not worked in this area
These questions I can recollect
Best of luck to those who wish to appear for CTP exam.

Numerical based on FRA, CURRENCY EXCHANGE, REPO TRANSCATION, BOND/YTM, YIELDS ON T-BILL, CURRENT YIELD
A 5 MARKS EASY SET OF QUESTION FROM COMMERCIAL PAPER

Other Theory questions from Bond theorem, Delta, gama etc.
35-40 marks numerical is there.

 

Previous years Digital banking recollected

 Previous years Digital banking recollected


Aeps
Nach
Upi
Virtual keyboard to safegaurd against keylogger
4 questions on process of chargeback
Nfc technology and RFID
Approx 8-10 question on security of POS terminals
2 que on MDR
What is cash withdrawal through pos called

Digital Banking Recollected questions:::

Digital Banking Recollected questions:::
1.CTS abbreviation cheque truncation system
2. What is firewall?: A software programme for protecting against unauthorized access to the information.
3.BBPS … Bhatart Bill payment sytem
4.MDR: merchant discount rate
5. minimum amount which can be remitted under RTGS by a customer: Minimum Rs. 2 lac and no Maximum.
6.Max amount of NEFT can be remitted ..no limit
7. AEPS stands for : Aadhar Enabled Payment System.
8. CPPC stands for : Central Pension Processing Cell.
9. IBPP stands for : Internet Bill Presentation & Payment.

ISB Recollected Questions and Exam Tips::::

 ISB Recollected Questions and Exam Tips::::


Function of modem, which is not an OOP Lang.


 C C++ Java C#, questns abt DRP,


Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP


RISK MANAGEMENT recollected questions :-

 RISK MANAGEMENT recollected questions :-

Maturity bucket case study
Modified Duration (YTM) Semiannual, Convexity case study 
Basel 3 T1 and T2 case study
LTV ratio case study
Foreign exchange case study
Rating Migration case study
MCLR Case Study
Basis risk
Trading book
EAD, PD, LGD
BPV
Various Approaches for Market Risk, Credit Risk , Operational Risk
Various 1 marks numericals on foreign exchange
Various RWA were asked
Etc.

MSME recollected questions

 MSME recollected questions

1. Micro, small & medium sector
2. Priority sector classification (esp foreign banks less than 20 branches etc)
3. One sum on calculation of NWC
4. CLUSTER development features
5. TIFAC full form, CODISSIA located at?
6. Mahila schemes implemented by SIDBI
7. Which are NOT included under plant & machinery
8. HUF, LLP questions on minor admissibility
9. Common seal compulsory for companies/LLP
10. GRAY sick area
11. Ots implemented by? - individual banks
12. Highest investment by overseas investors is under which sectors
13. Study report Of DIC recommendations
14. Federation of msme for West Bengal state? ITCOT located in which state? MSME council located? Msme as per constitution is state/central/concurrent subject?