Friday, 21 February 2020

Cyber crime recollection


Cyber crime and fraud management recollected on 28.12.2019


Recollected questions:
Cyber crimes are handled by which orgnanisation in india
Type 1 crime
Preventive control
Detective control
Detterant control
Logical control
Sections and their fine with imprisonment in years
Committes of it security ,it governance, it controls
Netra by which organisation
Fast flux
Stux net
Phising
Shoulder surfing
Digital signature
Oldest agency in india
Few questions on cert in
Passive attack
Active attack
Direct attack
In direct attack
Logic bomb
Zeus
India own operating system boss in under whom
Confidentiality
Availability
Integrity
Conventional crime
Cyber crime
Same features of conv and cyber crime
Tailgating
imp topics are  1differences between viruses and worm
2 it act
3 different types of cyber crimes
4 various types of cards
5 gate way payment
6 prevention and detection control
7 pss act
8 2 tier authentication
9 passive and active attacks
mostly questions from 2  and 3 and 4...units

 Cyber terrorism
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites

IT security recollected

IT SECURITY

***********

Giv priority to Technical terms...

***************

26.10.2019 MEMORY BASED RECOLLECTED QUESTIONS

Salomi technique



Accountability- biometric login wat d user has/knows/is



Access control

Access privilege



Maker checker principle



Ciso/cfo role



Anti piracy



Thteat/vulnerability/impact



RFID radio frequency identification



Perimeter security



3 most common metal detector



Fire extinguishers



E waste



BYOT/BYOD /work from home



Commonly used sever



Router/modem/switch/gateway



White box/black box testing



Alpha/beta testing



ISO certfctn standard specifctn



COBIT



STEGNOGRAPHY/RANSOMWARE/CYBER TERRORISM/SOCIAL ENGG



DOS/DDOS



CAPTCHA



MALWARE/SPYWARE/ADWARE/ROOTKIT/BOTNETS



FASTFLUX/STUXNET



HOTSITE/WARMSITE/COLDSITE



IS AUDIT QUALIFCTNS



GUIDELINES FOR FRAUD PREVENTION



FSDC

Wednesday, 19 February 2020

Assets

ASSETS::

Fixed Assets :
Assets which are purchased for long
term and not meant to be sold but used for production.
Land & Building,Plant & Machinery
Vehicles,Furniture & Fixture
Office equipment,Capital Work in Progress These are
represented as under:
Original value (Gross Bock) Less depreciation
Net Block or book value or written down
Value Method

Non Current Assets:

Assets which cannot be classified as current or
fixed or intangible assets Book Debts or Sundry
Debtors more than 6 months old/ Disputed Debts,
Investment of long term nature in shares,
govt. securities, associates or sister firms or
companies. Long term security deposits. Unquoted
investments; Investments in subsidiaries or sister
concerns; Loans & Advances to directors, officers;
Accounts receivables in respect of sale of plant &
machinery; Advances to concerns in which directors
are interested; Deposits with customs port trust etc
Intangible & fictitious Assets Which do not have
physical existence. For example: Goodwill, Patents,
Trade Mark, Copy Right, Preliminary or pre operative
expenses, other formation expenses, debit balance of
P & L account, accumulated losses, bad debts,
Capital issue expenses e.g. discount on issue of
share & debentures, commission on underwriting of
shares & debentures; Deferred revenue expenditure
e.g. Advertisement

Current Assets : Cash in hand, Bank balance
including fixed ,deposits with banks. Stocks/inventory
(such as raw material, stock in process, finished
goods, consumable stores and spares),Book
debts/Sundry debtors/Bills Receivable/ Accounts
receivable/ debtors, Government and other trustee
securities
(other than for long term purposes e.g. sinking funds,
gratuity funds etc.),Readily Marketable/quoted govt. or
other securities meant for sale,Interest accrued and
receivables,Advance payment of taxes,
pre-paid expenses,Advance payments for
merchandise; unexpired insurance

Sunday, 16 February 2020

Basics what is what? Banking terms

Basics what is what? Banking terms

What is FII?
FII (Foreign Institutional Investor) used to denote an investor, mostly in the form of an institution. An institution established outside India, which proposes to invest in Indian market, in other words buying Indian stocks. FII's generally buy in large volumes which has an impact on the stock markets. Institutional Investors includes pension funds, mutual funds, Insurance Companies, Banks, etc.
What is FDI?
FDI (Foreign Direct Investment) occurs with the purchase of the “physical assets or a significant amount of ownership (stock) of a company in another country in order to gain a measure of management control” (Or) A foreign company having a stake in a Indian Company.
What is IPO?
IPO is Initial Public Offering. This is the first offering of shares to the general public from a company wishes to list on the stock exchanges.
What is Disinvestment?
The Selling of the government stake in public sector undertakings.
What is Fiscal Deficit?
It is the difference between the government’s total receipts (excluding borrowings) and total expenditure.
What is Revenue deficit?
It defines that, where the net amount received (by taxes & other forms) fails to meet the predicted net amount to be received by the government.
What is GDP?
The Gross Domestic Product or GDP is a measure of all of the services and goods produced in a country over a specific period; classically a year.
What is GNP?
Gross National Product is measured as GDP plus income of residents from investments made abroad minus income earned by foreigners in domestic market.
What is National Income?
National Income is the money value of all goods and services produced in a country during the year.
What is Per Capita Income?
A: The national income of a country, or region, divided by its population. Per capita income is often used to measure a country's standard of living.
What is Vote on Account?
A vote-on account is basically a statement ,where the government presents an estimate of a sum required to meet the expenditure that it incurs during the first three to four months of an election financial year until a new government is in place, to keep the machinery running.
Difference between Vote on Account and Interim Budget?
Vote-on-account deals only with the expenditure side of the government's budget, an interim Budget is a complete set of accounts, including both expenditure and receipts.
What is SDR?
The SDR (Special Drawing Rights) is an artificial currency created by the IMF in 1969. SDRs are allocated to member countries and can be fully converted into international currencies so they

serve as a supplement to the official foreign reserves of member countries. Its value is based on a basket of key international currencies (U.S. dollar, euro, yen and pound sterling).
What is SEZ?
SEZ means Special Economic Zone is the one of the part of government’s policies in India. A special Economic zone is a geographical region that economic laws which are more liberal than the usual economic laws in the country. The basic motto behind this is to increase foreign investment, development of infrastructure, job opportunities and increase the income level of the people.
What is corporate governance?
The way in which a company is governed and how it deals with the various interests of its customers, shareholders, employees and society at large. Corporate governance is the set of processes, customs, policies, laws, and institutions affecting the way a corporation (or company) is directed, administered or controlled. Is defined as the general set of customs, regulations, habits, and laws that determine to what end a firm should be run.
Functions of RBI?
The Reserve Bank of India is the central bank of India, was established on April 1, 1935 in accordance with the provisions of the Reserve Bank of India Act, 1934. The Reserve Bank of India was set up on the recommendations of the Hilton Young Commission. The commission submitted its report in the year 1926, though the bank was not set up for nine years. To regulate the issue of Bank Notes and keeping of reserves with a view to securing monetary stability in India and generally to operate the currency and credit system of the country to its advantage." Banker to the Government: performs merchant banking function for the central and the state governments; also acts as their banker. Banker to banks: maintains banking accounts of all scheduled banks.
What is the dispute between the RBI and GOVT OF INDIA presently
What is monetary policy?
Monetary policy is the process by which the government, central bank, of a country controls (i) the supply of money, (ii) availability of money, and (iii) cost of money or rate of interest, in order to attain a set of objectives oriented towards the growth and stability of the economy.
What is Fiscal Policy?
Fiscal policy is the use of government spending and revenue collection to influence the economy. These policies affect tax rates, interest rates and government spending, in an effort to control the economy. Fiscal policy is an additional method to determine public revenue and public expenditure.
What is Core Banking Solutions?
Core banking is a general term used to describe the services provided by a group of networked bank branches. Bank customers may access their funds and other simple transactions from any of the member branch offices. It will cut down time, working simultaneously on different issues and increasing efficiency. The platform where communication technology and information technology are merged to suit core needs of banking is known as Core Banking Solutions.

What is bank and its features and types?
A bank is a financial organization where people deposit their money to keep it safe. Banks play an important role in the financial system and the economy. As a key component of the financial system, banks allocate funds from savers to borrowers in an efficient manner.
i. Regional Rural Banks were established with an objective to ensure sufficient. Institutional credit for agriculture and other rural sectors. The RRBs mobilize financial resources from rural / semi-urban areas and grant loans and advances mostly to small and marginal farmers, agricultural labourers and rural artisans. The area of operation of RRBs is limited to the area as notified by GoI covering one or more districts in the State.
ii. Banking services for individual customers is known as retail banking.
iii. A bank that deals mostly in but international finance, long-term loans for companies and underwriting. Merchant banks do not provide regular banking services to the general public
iv. Online banking (or Internet banking) allows customers to conduct financial transactions on a secure website operated by their retail or virtual bank.
v. Mobile Banking is a service that allows you to do banking transactions on your mobile phone without making a call , using the SMS facility. Is a term used for performing balance checks, account transactions, payments etc. via a mobile device such as a mobile phone.
vi. Traditional banking is the normal bank accounts we have. Like, put your money in the bank and they act as a security and you will get only the normal interests (decided by RBI in our case, FED bank in US).
vii. Investment banking is entirely different. Here, people who are having so much money (money in excess which will yield only less interest if in Banks) will invest their money and get higher returns. For example, If i have more money instead of taking the pain of investing in share market, buying properties etc. I will give to investment banks and they will do the money management and give me higher returns when compared to traditional banks.
What is E-Governance?
E-Governance is the public sector’s use of information and communication technologies with the aim of improving information and service delivery, encouraging citizen participation in the decision making process and making government more accountable, transparent and effective.
Credit Rating Agencies in India?
The credit rating agencies in India mainly include ICRA and CRISIL. ICRA was formerly referred to the Investment Information and Credit Rating Agency of India Limited. Their main function is to grade the different sector and companies in terms of performance and offer solutions for up gradation. The credit rating agencies in India mainly include ICRA and CRISIL(Credit Rating Information Services of India Limited)
CODE OF BANK'S COMMITMENTS
Code of Bank's Commitments made to the individual customers during July 2006 is valid for three years. The code is voluntary which stresses minimum standard of banking practices to follow while dealing with the customers in their day-to-day operations. The code has been developed to promote minimum standards, to increase transparency, to achieve higher operating standards, to promote fair and cordial relationship between the banks and customers and to foster confidence in the banking system. The Code of Bank's Commitment includes all products and services,
whether they are provided by branches or subsidiaries across counters, over phone or through Internet. Customers can lodge complaints related to Internet banking and non-adherence to the provisions of the fair practices code for banks of the Banking Codes and Standards Board of India (BSCBI), as per amendment brought in by the RBI to the Banking Ombudsman Scheme in February 2009.
Help on any enquiry on the Code of Bank's Commitment is available at Indian Banks' Association, Mumbai. The monitoring agency on the implantation of Code of Bank's Commitment is Banking Codes and Standards Board of India, RBI.

LIMITED LIABILITY PARTNERSHIP ACT - SALIENT FEATURES

LIMITED LIABILITY PARTNERSHIP ACT - SALIENT FEATURES
 The LLP will be an alternative corporate business vehicle that would give the benefits of limited liability but would allow its members the flexibility of organizing their internal structure as a partnership based on an agreement. The proposed Bill does not restrict the benefit of LLP structure to certain classes of professionals (as in some countries) but would be available for all enterprises that fulfill the requirements of the Act. LLP will be a body corporate and a legal entity separate from its partners.
 A LLP will have perpetual succession. While the LLP will be a separate legal entity, liable fully of its assets, the liability of the partners would be limited to their agreed contribution in the LLP.
 Further, no partner would be liable on account of the independent or un-authorized actions of other partners, thus allowing individual partners to be shielded from joint liability created by another partner’s wrongful business decisions or misconduct.
 Indian Partnership Act, 1932 shall not be applicable to LLPs and there shall not be any upper limit on number of partners in an LLP unlike an ordinary partnership firm where the maximum number of partners cannot exceed 20.
 A LLP shall be under obligation to maintain annual accounts reflecting true and fair view of its state of affairs.
 Since tax matters of all entities in India are addressed in the Income Tax Act, 1961, the taxation of LLPs will be as addressed in the Income Tax Act.
 Provisions are made in the Bill for corporate actions like mergers, amalgamations etc.
 While enabling provisions in respect of winding up and dissolutions of LLPs have been made in the Bill, detailed provisions in this regard would be provided by way of rules under the Act.
 The Act also provides for conversion of existing partnership firm, private limited company and unlisted public company into a LLP.
 Nothing Contained in the Partnership Act 1932 will affect an LLP.
 The Registrar of Companies will register and control LLPs also.
Conceptually, an LLP is a hybrid corporate form entity combining features of the existing partnership firms and limited liability companies. LLP combines the benefits of limited liability for partners with flexibility to organize internal management based on mutual agreement among the partners. India’s 1932 Partnership law permitted partnership firms with unlimited liability.
Following are as the salient features of the LLP bill, 2008:
 LLP shall be a body corporate and a legal entity separate from its partners. It will have perpetual succession like a corporation;
 Provisions of the Indian Partnership Act, 1932 shall not be applicable to LLPs and there shall not be any upper limit or number of partners in an LLP unlike an ordinary partnership firm where the maximum number of partners cannot exceed 20; (10 in case of banking);
 While the LLP will be a separate legal entity, liable to the full extent of its assets, the liability of the partners would be limited to their agreed contribution to the LLP. Further, no partner would be liable on account of independent or unauthorized actions of other partners to be shielded from joint liability created by another partner’s wrongful business decisions or misconduct;
 The framework of LLP is not restricted to professional services alone. Several business activities can be undertaken using the LLP structure;
 Any individual or body corporate may be a partner in LLP:
 An LLP shall be under obligation to maintain annual accounts reflecting true and far view of its rate of affairs; and
 The bill contains procedures for corporate actions like mergers, amalgamations, liquidations etc.

The LLP Act will be administered by Ministry of Corporate Affairs. LLPs would need to be necessarily registered with registrar of companies by submitting necessary documents. The registration of LLPs will be a time bound (approx 2 weeks) and paperless affair and would be covered under MCA-21 e-governance programme of the Ministry of Corporate Affairs

*Very very useful financial tips*

*Very very useful financial tips*

1. *Avoid buying property on loans unless you have a clear plan for its repayment. Monitor cash flow*

2. *Start a SIP at a very young age*

3. *Avoid buying a car unless you use it everyday*

4. *Do not let this sentence scare you. “Mutual fund investment are subject to market risk”. Look at the history and growth of Mutal Funds*

5. *Try having a simple wedding*

6. *Atleast 20% of your wealth should be liquid so you can utilize it when necessary*

7. *Considering inflation, do not keep huge money in savings bank account*

8. *If you invest in stocks, pay due attention*

9. *Do not have a belief that property & car make you rich*

10. *Never invest in insurance for returns*

11. *Use credit card for needs not for wants*

12. *Cancel all credit cards before you die, or inform family. Even a small residue will cost your family much*

13. *Invest on yourself & then on other investments*

14. *Balance your earnings with your savings first, then on spending and loans. Never take unnecessary loans*

15. *Always have a plan for future events on your career, life, spending and finance*

16. *Always have a reserve on your savings for contingency and urgent situations*

17. *Investment like, have a regular health check & do healthy workout every day*

18. *Do buy adequate term Insurance if you have dependents*

19. *Prepare a Will*
✒✒

Micro finance recollected

 microfinance exam questions from,
1. Chikola group
2. Rrb bank established in the year
3. Rbi act, rrb act,
4. Bank rakyat Indonesia
5. Malegam committee recommendation
6. Shg bank linkage program
7. Sewa bank
8. Break even analysis also named as
9. As 2 deals with
10. Examples of cash flow like travel expenses interest expenses
11. 2 numericals from break even anaysis
12.average case load formula
13. Question from relationship risk