Friday, 28 June 2019

Information system for bankers recollected

Information system banker exam.

Some questions.....shared by members



CyAT

CAA

Digital Signature

BCP

Digital forensics

Normalisation

Internal audit

DBA responsibility

Telecommunications system audit

Power off switches

Cyber terbunal judge or magistrate

DS reissuance

Central depository of DS

Audit trail significance

Bottom up methodology

Audit plan

BCP

IDS

Virtual keyboard

IFMS full from

EFT

RBIA

Inherent risk

Insider threat

IS Audit policy

Information security officer role

DBA responsibility

Stress testing

BCNF

Critical applications

Poor architecture system

SDLC

Prototyping model

RTO application

IT Act 2000

Punishment for copyright as per IT Act

Controller of Certifying Authorities operates the National Repository of Digital Signatures (NRDC)

Function of modem, which is not an OOP Lang. C C++ Java C#, questns abt DRP, Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP

DDL DML DCL TCL commands, CA CCA-Digital certificates

Digital signature complete

Cyber apellate tribunal presiding officer

System testing

Compliance testing

Substantive testing

Telecom control

Db forms

Db commands

Risk based audit

It audit

Dba roles n resp

Prototyping model

Sdlc full

Interface testing

Rbeit ltd reg it subsidiary of rbi

Non repudiation

Bot stroke worms

Certified information System Banker



13.01.2019 3 PM Batch

Moderate Difficulty

Passing Mark 60

Each question carries 1 mark ( 100 questions )



Scored 55 marks



Recollected questions

DR centre location

Data warehouse

Audit charter/policy

Is audit 5 -10 questions

RAM and cache memory

Static RAM

Metadata

Which DB model used in CBS

Characteristics of a table

Many to Many relationship in DB

Simple ,self,outer join

Adaptive maintenance

Multiplexing

Packet switching

Full Duplex method

Bridge,router,switch,gateway

Diff between router and switch

Function of osi model layers 5 questions

Which protocol used in banking http,smtp,tcp/ip

Real time processing

Emergency response

Mirror site and reciprocal agreement

Trojan horse

E money

INFINET

CFMS

SFMS

Spoofing, piggybagging

Pervasive principle in GASSP

Classification of control

Boundary sub system

Audit trail

Attenuation

Types of noise (cross talk)

False positive and negative

Firewall

Intrusion detection systems and tuning

In what circumstances user ID and password will be given to user(emergency access)

Remote Access

OS tasks

Travelling virus procedure

Public and private key encryption

No comments:

Post a Comment