Sunday, 8 November 2020

Kyc AML on 08.11.2020

 

Kyc AML on 08.11.2020

Aml generation

Principal officer

Trust documents required

USA/UK acts

Record prevention time

Str/CCR report submission

Fiu Ind function

Fatf styles regional bodies

Basel committee Norms

IT security recollected questions on 08.11.2020

 Recalled Questions IT Security (8/11/2020)

Slot 1


Owner , custodian, User

RFID

Internet Access Policy

Beat Frequency Oscillator

IPS & IDS Differance

Network server

HPs open View software

Blade server

Authorization and authentication

Salami Technique can be detected by

Beta Testing

VoIP

QMS

ISMS

Plan do check act (PCDA)

COBIT ISACA SOX GAIT HIPAA SAS70

Defense in Depth

Critical servers in most bank are on UNIX 

schema

Hubs

MPLS SMTP

cryptography steganography

application layer firewall are also called as PROXY firewall

Drawbacks of using in house software development

Cyber espionage

DRP

Audit charter

SEBI act 1992

CDR call details record

regsvr32 command

RBI Vision 2018(2 questions)

Shimming skimming

Big data

SHA 512

Server Cluster

Difference between virus and worm

Hot site and warm site

HA in BC DRP means

defence against eavesdropping

Sniffer

third party access to critical info resources area

edit the Registry using Command in windows

RuPay Visa Master card

Bancs 

Cvv 3D 

Stages in software development

Black box testing



Paper was moderat




.5 marks question on cobit kyc it act rti act software development level




1 marks question on software development process and it security




2 marks question on study based




Questions were from all segments




ISO related questions




Difference between skimming and shimming




Difference between cryptography and steganography




One question on metal detector




One question on software testing related




Defence in depth