Showing posts with label Recollected Questions for all exams. Show all posts
Showing posts with label Recollected Questions for all exams. Show all posts

Sunday, 12 March 2023

CCP recollected questions on 11.03.2023

 RECOLLECTED QUESTIONS CCP 11.03.2023 3.30 PM

Case studies:

1. PRIORITY SECTOR LENDING ( pslcs , housing, education)

2. EXPORT FINANCE ( PCFC, post shipment credit, NTP)

3. Insolvency and bankruptcy code

4. Factoring and forfaiting

5.current ratio, dscr , limit calculations and interpretation

6. Debt equity ratio, turnover ratios and collection periods

7. Bank guarantees

8. Break even analysis ..

Normal questions :

1. Liquidity risk - asset liabilities management

2. Contents of credit policy

3. Certificate of commencement of business - issued by registrar of companies as per company act -2013

4. Question on one person company ( OPC )

5. case based questions regarding advance to Limited company

6. Questions on bills discounting system

7. Types of syndication

8.guidelines on consortium lending.

9.statutory and regulatory restrictions on loans and advance

10. Current ratio problems and comparison for two different companies

11. Two problems on tangible networth

12. Sensitivity analysis

13. Question on payback period

14. Time value of money - features, problems on present and future value 

15. Advantages and disadvantage of IRR 

16. Margin of safety in break even analysis

17. Net working capital definition

18. Impact of inadequate working capital

19. Margin percentage in turnover method - 5 percentage of projected annual turnover

20. Min investment in commercial paper - 5 lakh

21. LC which covers storage and warehouse charges - green clause LC

22. Questions on coacceptance facilities

23. Questions on diamond dollar account DDA scheme

24.ultra vires borrowing

25. Running account facility in pre shipment finance

26. Loans under weaker section in priority sector lending

27. Characteristics of retail banking

28. Purpose for model home loan

29. Repayment period in IBA model education loan - 15 years

30. Moratorium period in IBA mode education loan - 2 years

31. Calculation of loan amount - IBA model education loan 

32. Documents of which registration is compulsory

33. Time limit for registration of documents

34. Personal liability documents

35. Limitation of documents - time period

36. Question on English mortgage

37. Question on credit monitoring and tools.

38. Objectives of supervision and follow up

39. Doubt ful asset - definition

40. Prudential and revised prudential guidelines on restructuring of advances

41. Wilful defaulter

42. SARFAESI act notice period - 60 days

43.case based question on mortgage and CERSAI registration of two different banks

Thursday, 30 December 2021

CYBER CRIME QUESTIONS OF IIBF EXAM (MEmoRY BaSed previous Years

 CYBER CRIME QUESTIONS OF IIBF EXAM (MEmoRY BaSed previous Years

Q1.what is honey pot.

Q2. What are steps involved in a Ecommerce transactions.

Q3. Difference between durability and consistency.

Q4. What is firewell.

Q5 .what is wankworm and NASA.

Q6. Eucp published in which year.

Q7.OLA is not a popular app store.

Q8.what is circumstantial evidences. 

Q9.BOSS (Bharat operating system solution) was developed by which organizations -CDAC 

Q10.what is malicious code writer's. 

Q11.What is multilayered security 

Q12. What is data. 

Q13.blackmailing is an example of cyber extortion. 

Q14 what is SCADA.

Q15.what is cryptolocker

Q16.smart card in metro railway stations are examples 

Q17.packet filter firewall.

Q18. micro ATM.

Q19.cross site Scripting.

Q20. What is A hectivist...

Q21. Rupay card is issued in which year. 

Q22. what is Trojan hourse. 

Q23. What is malware.

Q.24. data backup is an example of which type of control.

Q25. what is Lebance loop modus oprendi in atm card frauds.

Q26.CCTV is an example of which control.

Q27.what is Cyber Smearing.

Q28.what is operating system Vulnerability

Q29.what is full form of CISA cyber security information sharing Act.

Q30 what is Zeus viruses.

Q31.what is hashh value and integrity.

Q32.what difference between Authorization and Authentication.

Q33. What is INFO stealer?

Q34.what is A back End Access.

Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally.

Q36.what is security Administration and Quality Assurance.

Q37.what is CAPTCHA.

Q38.Intentionally misrepresentation of Data is called A Fraud.

Q39.What is definition of Control.

Q40.What is John Deo Order. ...

Q41.what is payment walked and digital wallet

Q42 what is Anonymous.

Q43. What is trapdoor access.

Q44.Total branch automation TMA.

Q45. .com and .org are TLD.

Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures.

Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter, intercept or Block URL.

Q48.one question on CBS and TBA total branch Automations.

Q49. Sys admin sys user or teller all are examples of Spoofing.

Q50.what is A network Analysis.

Q51.what is vulnerability

Q52.what is DNS sinkholding.

Q53.e.Contactless smart card are example of which.

Q54 . Lebance Loop card fraud rubber band type material inside Atm Fraud.

Q55.what is Contigency planning.

Q56.what is Nigrean 419 Fraud.

Q57.Dumpster Diving.

Q58.what is difference between Steersman and script kiddle ,

Q59.Staganography.

Q60. What is SSL injections and Cross Site Scripting......

Q61. Preventive detective and compensating contol.

Q62. DRONES ARE developed by Drdo.

Q63.income tax.

Q64.Director of DRDO and it's powers.

Q65 .differencebetween Cert india and nasscom.

Q66.TSP/IP. Q67.DDos Attack.

Q68. CyberSmearing and Cyber Defamation.

Q69. Cyberwarfare and Cyber terrorism.

Q70. BECKDOOR access.

Q71.digital signature.

Q72.symmetric and AsymmetricEncryption

Q73.public and private keys.

Q74.command Injections and SQL injections.

Q75.details of Masquerding Attack.

Q76. Trapdoor access and BYOT device.

Q77.Sec.43 and Sec 46 of IT act.....

Q78.Sec. 69 B deals with......

Q79.Blue Hat hackers are a Part of testing team.

Q80.what is crypyolocker and INFO Stealer

Q81.WHAT IS zeus virus

Q82.What do you understand by Mean rea or destructive Mindset.

Q83.what is DDL DATA definition language

Q84.what is packet filteration Firewall

Q85.what do you understand by the word ANONMOUS

Q85.what is computer vandalism

Q86.WHAT IS FRONT END validation control

Q87.what is DATA

Q88.WHAT IS Locard Exchange PRINCIPLE

Q89.WHAT is penalty under SECTION 46 AND 47 of IT AMENDMENT ACT

Q90.What is xss cross site scripting

Q91.what is TCS fraud IN andhrapredseh is EXAMPLE OF

Q92.WHAT is cybersmearing

Q93.what is STEERSMAN

Q94.WHAT do you mean by ALITE HECKER

Q95.IDS is palced between internet and firewell

Q96.what is PCIDSS

Q97.WHAT is Matrix code barcoding

Q98.WHAT is software Piarcy

Q99.what is DNS SINKHOLDING

Q100.WHAT do you understand by traditional criminals

Q101.WHAT is beck end access

Q102.IN WHICH year ekyc published and its detail

Q103.BYOD DEVICE q Q104.WHAT is trapdoor

Q105.what is PURPOSE OF FIREWELL

Q106. BATCH processing is an example of oltp online transition

Precessing

Q107.WHAT IS UTM

Q108. Loss of reputation is a serous adverse effect of DDOS ATTACK

Q109.THE discussion paper held on payment and settlement system of RBI held on 2013 was main focus on ENHANCED USE OF ENTERNET BANKING AND E COMMERCE Q110.what is B2G business to government E COMMERCE TRANSCTION

Q111.boss was developed by cdac

Q112.WHAT IS STAGANOGRAPHY Q113. WHAT IS ALGORITHM

Q114.WHT IS PKI Q.115 WHAT IS HONEY POT q116. WHAT IS MICROATM

Q117.DETAILS ABOUT I4C AND CERTIN Q118.SATYAM AND SIFY CASE

Q119.PUCL CASE IS AN example of sec.69 Q120.WHAT IS VBV THESE ARE

RECOLLECTED QUESTION OF PAPER ON 15 SEPTEMBER 2018

20.10.2018 cyber crime question

1.cyber crime definition

2.3 factor pressure, opportunity, rationalisation

3.cybernetics,kybernetes,steersman,governor,cyberpunk----given 4 option

4.honey pot

5.1st worm

6.denial of service

7.buffer overflow

8.shoulder surfing

9.access control

10.script kiddles

11.john doe order

12.nigrria419

13cyber warfare

14 email spoofing

15 cyber stalking

16 domain name .in represent

17.Satyam infoway ltd vs siffynet supreme court

18 cyber warfare

19 phishing

20 zeus

21.non repudiation

22 tailgating

23.trapdoor

24.captcha.

25 .blue hat hacker

26.phreaking

27. Ethical hacking

28.anonymous

29.bar code matrix code

30.RFID

31.data manipulation and data definition language

32.symmetic encryption

33.Encryption and decryption

34.lo-card exchange principle

35.C-Dac

36.payment getway

37.payment and settlements system 2007

38 acquiring bank

39 brute force attack

40.man in the middle attack

41session hijacking

42.digital wallet

43OLTP

44 Ucpdc

45.EMV card

46.netra drdo

47CBI Specialized structure

48.electonic signature

49.DSCI set up byNASSCOM

50.US Initiative -cyber security information sharing act

51.it act andit amendment act.

52.Pki

53 .authenticity

54.maximum value that can be stored in a prepaid card 50000

55. SWIFT


By pritee Hardiha

Cyber fraud management exam recollected questions on 17.11.2018

The regulator of uav,

Netra developed by,

Script kiddies,

Ethical hacking,

Blue hat hacking,

Nigeria 419,

Social engineering,

When a NRI contacted u by phone to transfer 500000 lakh rupee to another account

in another branch. what action will be taken by you as a Branch manager.

.org,.com are Tld or Sld,

Cyber crime definition,

Cyber smearing,

Masquerading attack,

Email spoofing,

In a software application at end of page we use to see "I agree with term and

conditions". what do you mean by that.

A.p case vs Tcs case,

Eucp started in which year- Approved in 2001& effective from 2002

Steps involved in online transfer processing.

Where scada is used.

Anonymous definition,

Tail gating,

Tress passing,

Harrasing a lady over mail comes under which crime,

Cyber warfare,

Definition of Durability,

Odd man out of the given below which is not an app

1.ola 2.google store.3.black berry.4.apple

Locard principle,

Malicious code writers,



By rama

Cyber crime definition

3 factors induce to commit fraud

Internet of things

Wank worm first hacktivist attack

Stuxnet

Script kiddies

Spoofing

CcTLD

Ransomware

SCADA

Vishing

Authorisation authentication difference

BYOD

authentication tech for e mail

Digital signature

Internet addiction disorder

CAPTCHA

blue hat hacker

2D bar coding known as matrix code

DML

Prevention control

Detection control

Digital footprints

Brute force attack

Payment wallets

SWIFT

prepaid cards

Shoulder surfing

PCIDSS

TCS vs state of AP case

IPC forgery of electronic records

3 domain servers of security initiative

Compulsive disorders

Stylometry

Jilani working group

FSDC

to combat computer related crimes, CBI has following specialized

structure

CBI Interpol

Cyber crime and fraud management recollected on 28.12.2019

Recollected questions:

Cyber crimes are handled by which organization in india

Type 1 crime

Preventive control

Detective control

Deterrent control

Logical control

Sections and their fine with imprisonment in years

Committes of it security ,it governance, it controls

Netra by which organisation

Fast flux

Stux net

Phising

Shoulder surfing

Digital signature

Oldest agency in india

Few questions on cert in

Passive attack

Active attack

Direct attack

In direct attack

Logic bomb

Zeus

India own operating system boss in under whom

Confidentiality

Availability

Integrity

Conventional crime

Cyber crime

Same features of conv and cyber crime

Tailgating


imp topics are

1differences between viruses and worm

2 it act

3 different types of cyber crimes

4 various types of cards

5 gate way payment

6 prevention and detection control

7 pss act

8 2 tier authentication

9 passive and active attacks

mostly questions from 2 and 3 and 4...units


Cyber terrorism

1. Who Coordinates with Interpol in India ? - CBI

2. Which department was designated as Nodal Agency for Cyber Crime prevention -

CERT-IN

3. What is the difference between Virus and Worm - Virus need human intervention

to activate or multiply whereas worm automatically get multiplied

4. Worms are mainly used by hackers to - Occupy more space in the system/heavy

usage of bandwidth in the network

5. One of the employee carefully watching the password entered by the Manager.

What type of threat it is - Shoulder Surfing

6. Leaving a Logged in Computer by an employee - is human negligence

7. Hackers scans the computer pre attack to identify - Vulnerability in the system

8. Hackers inject worms/virus into the network to reach the target system and it -

exploits the Vulnerability

9. Non updation of antivirus is - one of the major vunerability

10. One customer recieved a call in his mobile phone and the person posing himself

as a bank manager collected the card credentials from him.This type is called -

Phising

11. Online Banking sites are borne to what risk - Phising/IP spoofing

12. Data transfer between systems vide Network can be secured by - PKI

13. Customers can make sure that they deal with the authenticated website - by

checking the Lock icon near the address bar

14.In https, S denotes - Secured/Security

15.This kind of worms directly attacks the root directory - Rootkits

16. This worms are really hard to detuct and delete - Rootkits

17. The compromised systems in the network are commonly termes as - Zombies

18. Customer security credentials were compromised by way of fraudulent SMS is

called - smishing

19. The employees who try to hack their own company's site/find the vulnerabilities

are called - White hat hackers

20.DDos - Distributed Denial of Service

21.Ransomware which blocks the access to the website demanding ransom for the

same is - Denial of Service attack

22. Using same method for both encryption and decryption is called - symmetric

encryption

23. Providing Last Login detail in Internet banking site is to - to detect any

unauthorised usage earlier

24.Limits for retrying the passwords is - to avoid the unauthorised access

25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter

passwords

26.UTM stands for - Unified Threat Management

27.Setting up smoke detectors in the branch is - Detective Method

28.Placing Security guard in system room to avoid - Physical damage/attack on

systems

29. Following the authorised person to enter into system room and making entry into

the room is - Tailgatting

30.Dumbster Driving is a method - Searching for vulnerability in deleted files and

data

31.FIrewall is - Intrusion Detection System

32.Authentication of electronic data/document can be assertained by - Digital

Signature

33. When two or more persons illegally tries to enter into a critical room with single

id/same id - Masquerading

34.Detection is normally - Post incedent

35. Post incident study mainly for the purpose of - study the impact of the attack and

lessons for future prevention

36. Indian Agency working on Digital Forensics and Cyber security - C-DAC

37. OLTP refers to - On line Transaction Processing

38. OLTP is also termed as - Payment Gateway

39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme

to complete the transaction

40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level

and Merchant POS

41. Credit Card data theft through POS is falls under - Merchant PoS Security

42.Data encrypted using Private key can be decrypted by the public key available

with - the Receiver

43. Cross verifying the Signature on the Slip against the Signature in the back side of

the ATM card is doen by - the Merchant

44.Data should be secured in the following stages - Saved, Transit and Retrival

45.Intruder software in a network which attacks the data while in trnasit and thus

commits data theft - Man in the Middle Attack

46. Captures a widows sessio for the purpose of data theft before it reaches the

recipient is - Session Hijacking

47. Limits set for retrying of password is to avoid - Brute Force attack

48. ISSP stands for - Information System Security Policy

49.ICANN stands for - International Corporation for Assigned Names and Numbers

50.TLD stands for - Top Level Domain

51.Globally recognized set of rules defined for electronic records is - e-UCP

52.Technique used to redirect traffic from the infected device is called - Sinkholding

53. The technique which can intercept unencrypted data transit of mobile apps is

called - Wi FI Snifing

54. This is one type of malware which doesnot affect the system/network - Ad-ware

55. This usually comes as a Pop up/add on screen which carries link for dubious

websites - Ad-ware

56.EMV cards follow standard of - ISO/IEC No 7816

57. EMV cards follow this standard for Contactless card - ISO/IEC 14443

58. NFC is the technique used in contactless cards - Near Field Communication

59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards

60. NFC cards works under - RFID Technology

61. Providing Access controls to employess based on roles/need is - Risk based

Authentication

62. Seeking PIN to complete a transaction in PoS is - 2FA

63.SSL - Secure Socket Layering

64.SSL ensures - Encrypted link between a web server and a browser

65. Sending annoying messages to a person causing irritation/nuisance - Cyber

Stalking

66. Black mailing a person using Computer/or network is - Cyber Extortion

67. Ransomware is type of - Cyber Extortion

68. Disputes on Domain names and protest are redressed globally by - UDRP

69. Phising/Vishing is type of - Cyber Cheating

70. Group of people attacks a Computer/ group of computers for propagating a

objective - Cyber Terrorists

71. Hackers with common interest attack rival government's department site and

database are - Cyber terrorists

72. ____ refers to the quality of secrecy associated with the data and the state of

keeping an information asset secret - Confidentiality

73.____ refers to the state of remaining in the same format and not allowing for any

tampering/manipulation - Integrity

74. ____ refers to the state o confirmation that the user has the authority to issue the

command to the system - Authorisation

75. Quality of non denial, the stake holders are not permitted to denythe particular act

of doing the act is - Non-repudiation

76. CAPTCHA refers to - Completely Automated Public Turing test to Tell

Computers and Humans Apart

77. Placing letters in different sizes and styles which is hard to read by systems/robots

is called - CAPTCHA

78. _______ is an important component for study and analysis to under the modus

operandi of a Cyber Attack - Threat Vector

79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the

network which was attacked

80. Conventional Crimes are - Physical crimes that involve thet of systems and

hardware devices

81.Cyber Crimes are - System Crimes that involves data theft or tampering

82.Insider Attack Threat is - attack on the system/network by own employee without

any permission/authentication

83.______ is the most dangerous attack in cyber crimes - Insider Attack

84. An employee copied and sold the sensitive information to a competitor concern is

an example of - Insider Attack

85. Hackers scan the port/system and develop worm or codes to attack the same based

on this - Vulnerability

86. ____ does not wait for any executable file to run for getting activated in the target

system - Worm

87.____ refers to small piece of programs injected into the target system to spy on the

activities - Spyware

88. Drones are classified as - Spying Devices

89. UAV stands for - Unmanned Aerial Vehicle

90. Most of the UAV used by the polic/defence authorities for - Survelliance

purposes

91.The persons who are hired by companies to hack their own website/to identify the

Vulnerability are - Blue Hat Hackers

92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all

in one solution is referred as - Unified Threat Management

93. Force Log out option in Internet banking after certain time of Idleness is to guard

the system against - Session Hijacking

94. Installing anti virus into the system is - Preventive Method

95.A statement used to create, alter, drop objects in a database is called - Data

Definition Language

96. Fault Detection, isolation and recovery are closely associated wiht - Detection

Control

97. Installing Bio Metric devices to check unauthorised entry is - Physical Control

98. Unless properly logged, straightaway accessing the database through a SQL is

termed as - Back end Access

99.IT Act 2008 describes the activity of hacking as a criminal activity in section no

66

100. IT Act 2000 came in force on - 17 October 2000

101. IT Amendment Act came into force on - 27 October 2009

101. IT Act consists of - 13 Chapters and 90 Sections

102. The Section which deals with cyber crimes as civil offence - Section 43

103. The Section deals with cyber crimes as Criminal Offences - Section 66

104. IT Amendment Act included the following which is not in the IT Act 2000 -

Electronic Signature

105. Electronic Signature has been dealt in - Section 15

106. Under Section 43A, if any body corporate handling any sensitive personal data is

negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees

107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the

penalty/compensation may go upto - One Crore rupees

108. Tampering with Computer Source Documents - Section 65

109. Punishment under Section 65 may go upto - Three years imprisonment and

extend upto Two Lakhs Fine

110. Computer Related offences which were dealt under section 43 can also be dealt

as criminal offence under section - 66

111. Punishment under Section 66 may go upto - two three years and/or fine upto five

lakhs rupees

112. Crime of Cyber Stalking ( sending electronic messages for the purpose of

causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two

three years imprisonment

113. Identity Theft is dealt under Section - 66c

114. Punishment of Identity Theft - may extend to three years term and/or fine upto

One lakhs rupees

115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto

One lakhs rupees

116. Cyber Cheating is dealt under - Section 66D

117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment

118. Cyber Terrorism is dealt under - Section 66F

119. Publishing obscene material in electronic form dealt under - Section 67

120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine

121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5

years term and/or ten lakhs rupees fine

122. Sexually explicit content in electronic form dealt under - Section 67A

123. Punishment under Section 67A is - Five years term with fine

124.Punishment for Sudsequent conviction of the same crime under section 67A is – 7 years term and/or ten lakhs rupees fine

125. CERT-IN has been designated as Nodal agency for Critical Information

Infrastructure Protection under Section - 70B

126. Mispresentation/Suppression of material Fact dealt under - Section 71

127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees

128. Breach of confidentiality and Privacy dealt under Section - 72

129. Analysing the style of writing or the langauage style for the purpose of Crime

Investigation is - Stylometry

130. RBI issues licenses for Payment Banks in India based on approval from - BPSS

131. NTRO stands for - National Technical Research Organisation

132. Netra, the light weight UAV was developed by - DRDO

133.NCIIPC stands for - National Critical Information Infrastructure Protection

Centre

134. DSCI - Data Security Council of India, established by NASSCOM

135. Digital Forensic tools used by our Police Department were developed by - CDAC

136. C-DAC stands for - Centre for Development of Advanced Computing

137. NTRO works under - Prime Minister's Office

138. Two acts which are mainly handled by ED - FEMA and PMLA

139. Money laundering using banking systems/Internet banking is – Conventional Crime

140. Obtaining an IP address similar to some other and demanding a ransom for

forego the same is - Cyber Squatting

141. Data Protection while in transit using non repudiation techniques can be

achieved through - Public Key Infrastructure

142. Card Skimming is a technique mostly used th steal the card details and it mostly

placed on - ATM manchines

143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards

144. To avoid the Card Credentials in Online sites these cards were introduced -

Virtual Cards durability and consistency.

145. Smart Cards which are loaded with Money prior to issue is called - Prepaid

Cards

146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours

147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-

148. Hackers try to capture the login credentials by analysing the keys pressed in the

Key boards. the worms captures such data is called as - Key Loggers

149. By clicking unauthenticated link, customers may diverted to fake websites to

capture the sensitive personal. This is type of - Website spoofing/IP Spoofing

150. Ad wares are used not to harm the computers but to - make a catch by making

the user to click on the dubious link to fake websites

Q4. What is firewell.

Q5 .what is wankworm and NASA.

Q6. Eucp published in which year.

Q7.OLA is not a popularapp store.

Q8.what is circumstantial evidences


26-12-2021 Vishal

Mens Rea

FastFlux

Stuxnet

Wank Worm

ISO 27001

Digital Signature issued by

ITAA Sec 43

ITAA Sec 66

ITAA Sec 70

ITAA Sec 71

Masquarding

Tailgating

Blue Hat Hacker

White Hat Hacker

Script Kiddies

DDL

DML

Schema

Wednesday, 3 November 2021

Memory recalled questions of prevention and cyber crime management on 23.10.2021

 Memory recalled questions of prevention and cyber crime management on 23.10.2021:-

1) cyber crime-Greek word kybernets

2)Threat vector, John doe order

3)Cyber terrorism- section-66F

4) Matching of compliance to their functions-2marks

5)from ATM withdrawal which type of data processing

6) Different type of National institution

7)FASTFLUX,IP SPOOFING

8)CASE STUDIES OF SMC PNEUMATICA Vs Jogesh kwatra 

9)Masquerading, Tailgating

10)Common types of card fraud

11)DOS,DDOS

12) DETECTION CONTROL

13)Man in the middle attack

14)script kiddies

15)Men's Rea

16)White hat hackers

17)ISSA

18)Database control case study

19) Imprisonment for punishment by cheating

20)SCADA,DSCI,CISA 

Etc..and many more.

MEMORY RECALLED QUESTIONS FOR INFORMATION SYSTEM BANKER 23.10.2021

 

MEMORY RECALLED QUESTIONS FOR INFORMATION SYSTEM BANKER 23.10.2021 

 

1.more number of questions from preventive ,detective and corrective controls

2.more number of QUESTIONS from types of testing

3.more number of questions from IS AUDIT

4.questions from RTGS - real time

5. Neft - deferred net settlements 

6. Audit charter 

7. Types of input and output devices

8. Redundancy check

9. Commi ,undo comes under TRANSACTION CONTROL LANGUAGE ( TCL )

10.phases of SDLC

     a.feasibility study

      b.system definition or requirement analysis

       c. System design

        d.program construction or coding

       e. Testing

       f . implementation

        g. Maintenance

11. Attenuation

12.simplex , half duplex , full duplex 

    Walkie talkie example of half duplex

13. Bridges in which layer

14. questions from BCP and BIA

15. Examples of critical,vital and non critical systems

16. Hot site ,warm site ,cold site 

17. Questions from disaster recovery planning

18. Gap analysis GA

19. features of electronic E money

20. Issuance of E money

21. INFINET is primarily TCP/ IP network

22. Which not comes under SFMS

23.questions from social engineering, spoofing, unauthorised access

24. One question from GASSP 

25. Three principles of It security - confidentiality, integrity, availability.

26. Types of input controls, batch controls , output controls.

27. Field check , record checks

28. White noise - due to rise in temperature

29. Cross talk - on account of coupling of signal paths 

30.key components of security policy

31. Firewall ,IDS, tuning

32.one question on incident handling

33. Virtual private network

34. Questions from digital signature

    a.who issues - CA certifying authority

   b. Who appoints CCA. - central govt 

   c.public key and private key

35.punishment and fine for hacking, tampering code.

36. One question from cyber apellate tribunal cyat.


Sunday, 24 January 2021

KYC aml Re-collected questions on 24.01.2021

 Mostly questions on KYC portions,like,all the basic questions covers,from KYC master circulars guidlines...And AML same ,all the basics ,you need to cover from master circulars ,

money mules,multiple choice answer from designated directors,kyc templates,politically exposed person ,questions from customer acceptance policy,2 marks question ,NRI students opening accounts,PEP,small accounts limits,trust required documents,questions from enhanced due diligence procedures 2 marks,FIU IND,STR,CCR,there are 5@6 questions from FATF guidlines,Ankita Ahuja money luandering ,question related placement,layering and integration 2 marks like case studies..

Tuesday, 19 January 2021

Digital banking Re-collected questions on 01.01.2021


14 Jan 2021iDgital banking recollected questions on 01.11.2020"


12 Jan 2021

1.NPCI NETC - FASTAG 2.NG RTGS 3.Weak AI - in which platform 4. ISO/IEC 7813 5. Virtualisation (ATM Cards) 6.Salami Slicing 7.UPI Vs IMPS 8.Crypto Miner 9.NEFT and RTGS codes N04,N06 10.*99# NUUP - 3 questions 11.CRM 12.Prepaid Card Max Limit by Banks 13.POS technology 14.PPC Full Form 15.Cash Recycler Machines - 2Marks 16.Closed Loop Cards Networks - Example 17.VISA & MasterCard importance in Credit Cards 18.Customer Data Flow consists 19.ChatBot - 2marks 20.First Distributed Block chain implemented by 21. Analytical tools do among others elasticity 22. Ripple Crypto currency 23. Forex Transactions settled by in India 24. In Block Chain Blocks are linked by 25. Bitcoin is based on which block chain 26. Maximum Cash withdrawal from POS In TierIII Centres 27. Type of Clouds in Block Chain 28. Description Key is Called & Encryption Key 29. CIA - Confidentiality integrity and Availablity should be observed 30. POS - PCI DSS compliant in POS 31. Blockchain Cryptographic Algorithm SHA (256,224,512) 32. Different User or Systems attacker 33. Terms associated with CTS 34. CTS functionality 2 Marks 35. Types of Virus like Torjen,Warm etc., 36. father of Block Chain 37. Father of Artificial intelligence 38. Financial Risk in BC Point 39. Hyperlegder Variations 40.Spoofing /Squatting


Rural banking operations recollected questions Dec 2021

 Rural banking operations recollected questions

RRB amendment act 2018- 3Q

No of directors selected by shareholder in RRB

Min stake of center and state government

General lien

Warehouse planning by whom- 2Q

Meeting for scale of finance organise by whom

Loan % to SC/ST under DRI

farmers double income upto 2022 plan by whom

Adv of SHG credit linkage program

Lok Adalat-2Q

Ultra small branch-1

Non judicial stamps -2

Increase profitability

RRB perform the business of banking under which Act

Net operating profit- very complicated formulas in option

Loan to commission agent against ______

Return on assets

Farmers Club- 5/7Q

Photo voltic pump- 5Q

Tuesday, 12 January 2021

ISB Re-collected questions recently

 ISB Re-collected questions recently



Questions were like

False negative

Dns

Cyat

Punishment for contravention of cca

Adjudicating officer comes under chapter

Drs should establish in non seismic zone

Hot site warm site reciprocal agreement which one is cheapest


Is audit procedures and plannings 

Dba

Which do not support network change -options were repeaters routers gateway 

Multiplexing

Normalisation 

Tcp works on which layer

Access control

Least privilege

Is audit spreadsheet 

Caat

Spoofing

It act 2000 amendments 

Cca is appointed by

Who issue digital certificate 

What type of risk arise when e banking services disrupted-

Legal and reputation risk 

Fourth generation language -



The last unit contains annexures /appendix/ glossary which are very important people tends to ignore while preparing for the subject.

Monday, 11 January 2021

CCP RECALLED QUESTION DATE 10.01.2021 TIMING-3.30PM

 CCP RECALLED QUESTION DATE 10.01.2021 TIMING-3.30PM


Break even point 6 marks-direct question from credit management book page-764

Very tricky case study 5 marks from commercial paper god knows how to solve 

them (I just answered 2)

Payback period 2 mark numerical(which project is better)

NPV, IRR simple calculation 6 marks

DSCR calculation 5 marks level easy

Working capital 3 questions each from Nayak method, MPBF method 1 &2

Debtor turnover creditors turnover 4 marks

Interest coverage ratio 1 mark numerical

Inventory turnover ratio 2 numerical and 1 theory qs(high turnover ratio indicates what)

Fair code practice msme 3 theory questions

LLP characteristic 1 mark 

Msme recent categorization 1 theory qs(micro enterprise eligibility)

Commercial paper 1 theory qs (qs related to lot size)

Shockingly no questions from packing credit, post shipment credit, buyer’s credit, supplier’s credit

Cardinal principle of lending 1 theory qs(Which is not a principle)

Credit policy characteristic and use (2 theory qs)

Pledge characteristics 1 theory qs

2 questions from LC(sight lc and green clause lc)

Consortium and syndication difference 1 qs

Priority sector 1 qs(limit of housing loan in metropolitan city)

Collateral 1 simple theory qs

1 theory qs data needed for calculation of NPV IRR

Cash budget method 1 qs(used for seasonal business)

Dimond dollar account eligibility 1 theory and used for what 1 qs

Kimberley 1 theory qs

Factoring and forfeiting 3 questions (basic characteristic of both)

Roc registration time limit 1 mark

1 mark theory from corrective action plan (CAP)

Cersai is under which act 1 mark

SMA 2 classification 1 qs

Early warning of distress account 1 qs

MUDRA full form 

PMJDY OD age limit and income criteria 2 qs

Implementation of resolution plan 2 qs

Function of IBC 1-2 theory qs

Tuesday, 29 December 2020

All IIBF Certifications PDFs in single link 2020-2021

 All IIBF Certification PDFs in single link 2020-2021


Read corresponding  IIBF books .. Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best


Face book:

https://www.facebook.com/groups/543054539662893/

Certified credit officer/Professionals 2020

https://drive.google.com/file/d/1lUW00Y-qnVzH9R9QB4ZjGqeShYDATS-e/view?usp=sharing

CAIIB ABM 2020

https://drive.google.com/file/d/10AkzgCtLyYexdKulaYY3B1ljHRJPGuLu/view?usp=sharing


MSME 2020

https://drive.google.com/file/d/1m1qF2hh9D0hpVvFTlNCR2rvpYAiEQTD8/view?usp=sharing


KYC AML:2020

https://drive.google.com/file/d/1T__7x42LV1HaG9YBQuMkAIPvS9GAHeL8/view?usp=sharing


BCSBI:2020

https://drive.google.com/file/d/1lSOKtV5OrThXmCwiB4TGVyOjZVVtjThd/view?usp=sharing


CAIIB IT:2020

https://drive.google.com/file/d/1t7Ein_FE5YMruvDQPOG4Z3Z-TE-Xmp_1/view?usp=sharing


Certified Treasury Professionals:2020
https://drive.google.com/file/d/1lVvYYtYC797vn1DKuSAsCxJhkv3E1JxK/view?usp=sharing


Digital banking 2020
https://drive.google.com/file/d/1lckjesn0gs0kiOZID1aBubb4tiHvbzPE/view?usp=sharing


Forex Individual 2020

https://drive.google.com/file/d/1lf3o8SRqy2_aRJulq9qf2q0krHmFlKok/view?usp=sharing


Forex Operations 2020
https://drive.google.com/file/d/1lnPrVdXPVsc3sve8OwsjE87OEgsxsAVb/view?usp=sharing



Cyber Crime and fraud management 2020

https://drive.google.com/file/d/1m2y5bwuUa1vKkBjx5DjwH17dNf8BP-xu/view?usp=sharing


Information System for Bankers 2020
https://drive.google.com/file/d/1lt0r7cRzJHTmBXsmF9xvEYFzaaxHCxTI/view?usp=sharing


International Trade Finance  2020
https://drive.google.com/file/d/1lxS3FGgdzI5Q-rJFPufnVUSA69TpVjT3/view?usp=sharing


IT SECURITY 2020
https://drive.google.com/file/d/1ly9nfxTpucTPKB6kuV-mIod4pTc97ceg/view?usp=sharing


Micro finance 2020

https://drive.google.com/file/d/1lzMSuWctOJUrKnNP_FfRlQL9ngs1U6aS/view?usp=sharing

Risk In financial services 2020
https://drive.google.com/file/d/1m7eITlMDdKTnc1FU1sSIKJtP8IcrZrG1/view?usp=sharing


Certified Audit  Professionals:
https://drive.google.com/file/d/1m8aQcdD4qr7R4QzUEgiN1Paw_rWhKWsm/view?usp=sharing

https://drive.google.com/file/d/1zoloZKNR2-UsBGIf0gw1ErhD0F2Y9mHW/view?usp=sharing
















Micro finance 70 recollected questions

  Micro finance 70 recollected questions


Q1.C.rungrajan committee on microfinance
Q2. Breath length and depth meaning.
Q3. Difference between poverty lending approach and financial system approach.
Q4. Microfinance focus on poorest of the poor.
Q5. Nabard and it's role.
Q6. Nationalization of banks and it's purpose.
Q7.IRDP programm substitute the SJGSY program.
Q8.what is facilitater and it's role.
Q9.what is GRT group recognition test and it's purpose.
Q10.one question on Money lenders.
Q11.break even analysis and CPV analysis 3 questions.
Q12.what is microcredit.
Q13.what is microfinance.
Q14. What is sustainability.
Q15 what is BRI bank Ryat Indonesia.
Q16 .what is unit diseas.
Q17.chikola group of Kenya is example of which model.
Q18.Difference between SHG and JLG model
Q19 detailed question on grameen bank model.
 Q20. What is SHG bank linkage model...
Q22. Assumptions of grameen bank model of Bangladesh.
 Q23.diffrence between direct cost indirectcost setupcost and cost of fund.
Q24 .capital=assets-liability.
Q25.for NBFC model minimum networth requires rs.5 crore.
Q26.malegam committee and its recommendation.
Q27.qualifying assets and its significance
Q28.what is most accepted and widely usedmodel of microfinance in india.
 Q29.what is ghostborrower or multiple lending.
Q30.details of BC model.
Q31.what is reckless lending.
Q32. Details of SHG2 model part2.
 Q33. What is refinancing.
Q34. National rural livelihood mission.
 Q35 .Swarn jayanti gramin Swarojgar yojna
Q 36.what is mutual fund.
 Q37. What is merchant banking.
Q38.details of Revolving Fund.
 Q39. Financial inclusion definition and scope.
Q40. What is kyc and it's purpose
Q41 .Illiterate person can open which type of exam.
Q42 .Difference between impact accessment and social performance.
Q43.what is social rating
Q44. What is minimalist and integrated approach.
Q45.what is micro Insurance.
 Q46. Role of SEBI.
 Q47.role of IRDA.
 Q48. What is cash flow statement
.Q49. What is flat rate of interest.
 Q50. What is travel expanses.
 Q51.what is operating expense Ratio.
 Q52. What is asset depricitation.
 Q53 what is accounting stanard 2
. Q54. What is average case load.
Q55. What is Target group.
Q56. What is PAR.
Q57. What is market risk.
Q58. What is bank rate.
Q59.what is reprising risk.
 Q60. What is riskmanagement loop
Q61 what is schedule and nonshedule bank.
Q62. What is human risk.
 Q63.what is operational risk.
Q64.what is merchant banker.
 Q65. What is trading in stock exchange.
 Q66.two questions on mutual fund.
Q67.three question on Break Even Analysis.
Q68. What is regulatory risk.
 Q 69.what is Repayment rate.
 Q70.trust and Trust feed and what NBFC banking Model and what is business Correspondent model (BC Model)...... these All are 70 Recollected Questions of microfinance held on 15 july 2018. best of luck to All 

iibf JULY 2019 EXAMS Recollected

 IIBF  JULY 2019  EXAMS Recollected 



In today's microfinance exam questions from,
1. Chikola group
2. Rrb bank established in the year
3. Rbi act, rrb act,
4. Bank rakyat Indonesia
5. Malegam committee recommendation
6. Shg bank linkage program
7. Sewa bank
8. Break even analysis also named as
9. As 2 deals with
10. Examples of cash flow like travel expenses interest expenses
11. 2 numericals from break even anaysis
12.average case load formula
13. Question from relationship risk
12.



Recollected Questions 21.07.2019 IT security recollected on 21.07.2019
ROBO backup
Skimmer and shimmer
RFID and Barcode shortcomings
ISO 27001
After Jillani committee 1996
What IT act took place
Downstream liability
Routers
A/B testing
VoiP eavesdropping
User level controls
PCI DSS
HIPAA
Defence in Depth
Green servers
Blade servers
E -wastes
Scavenging
ATM jitter
Mobile banking
TCP IP
VLAN
Cyptography
Steganography
IDS DNS
CLOUD computing
Threats
Vulnerability
SQL Injection
Cyber terrorism
Viruses worms
Malware
Stuxnet
Fault tolerence
Business continuity and Disaster recovery


DTP

Many case studies were there - calculations of duration,MD,convexity, mclr related problem, cal of market, credit risk weighted assets,

CTP

Certified treasurey professional questions dated 14.7.19
Friends to be honest paper was easy compared with the one dated 27.4.19
The following are the questions given
Numerical related to
FRA
Commercial paper numericals around 6-7 and also individual questions related to cp and cd such has issuers and maximum limit and minim limit and
Questions related to various measures of options : delta , gamma,rho,
Numericals on bond prices
Numericals of auctions
Dutch auction
French auction
Novation definition
Liquidity related questions
Direct quote
Reinvestment risk
Futures
Qustions related to bond yield
Transfer pricing
ECB
Option coupon bond
Zero coupon bond
The questions were mostly numericals so pleae go through the reference book
All d best friends

ISB

information System Banker Recollected questions
CyAT
CAA
Digital Signature
BCP
Digital forensics
Normalisation
Internal audit
DBA responsibility
Telecommunications system audit
Power off switches
Cyber terbunal judge or magistrate
DS reissuance
Central depository of DS
Audit trail significance
Bottom up methodology
Audit plan
BCP
IDS
Virtual keyboard
IFMS full from
EFT
RBIA
Inherent risk
Insider threat
IS Audit policy
Information security officer role
DBA responsibility
Stress testing
BCNF
Critical applications
Poor architecture system
SDLC
Prototyping model
RTO application
IT Act 2000
Punishment for copyright as per IT Act
Controller of Certifying Authorities operates the National Repository of Digital Signatures (NRDC)
Function of modem, which is not an OOP Lang. C C++ Java C#, questns abt DRP, Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP
DDL DML DCL TCL commands, CA CCA-Digital certificates
Digital signature complete
Cyber apellate tribunal presiding officer
System testing
Compliance testing
Substantive testing
Telecom control
Db forms
Db commands
Risk based audit
It audit
Dba roles n resp
Prototyping model
Sdlc full
Interface testing
Rbeit ltd reg it subsidiary of rbi
Non repudiation
Bot stroke worms
Certified information System Banker

13.01.2019 3 PM Batch
Moderate Difficulty
Passing Mark 60
Each question carries 1 mark ( 100 questions )

Scored 55 marks

Recollected questions
DR centre location
Data warehouse
Audit charter/policy
Is audit 5 -10 questions
RAM and cache memory
Static RAM
Metadata
Which DB model used in CBS
Characteristics of a table
Many to Many relationship in DB
Simple ,self,outer join
Adaptive maintenance
Multiplexing
Packet switching
Full Duplex method
Bridge,router,switch,gateway
Diff between router and switch
Function of osi model layers 5 questions
Which protocol used in banking http,smtp,tcp/ip
Real time processing
Emergency response
Mirror site and reciprocal agreement
Trojan horse
E money
INFINET
CFMS
SFMS
Spoofing, piggybagging
Pervasive principle in GASSP
Classification of control
Boundary sub system
Audit trail
Attenuation
Types of noise (cross talk)
False positive and negative
Firewall
Intrusion detection systems and tuning
In what circumstances user ID and password will be given to user(emergency access)
Remote Access
OS tasks
Travelling virus procedure
Public and private key encryption

ISB Recollected Questions and Exam Tips june18::::

Function of modem, which is not an OOP Lang.
C C++ Java C#, questns abt DRP,
Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP


International trade finance today's recollected

Its all about Limits on various transaction, FEMA Schedule:I, II, III, LRS, JV/WOS, different FC A/c and their purpose. Reading Macmillan BOOK thoroughly is sufficient to clear the Exam.

[08/07, 07:28] Ara: Vostro account
[08/07, 07:28] Ara: ECB is a form of bank loan, suppliers credit, buyer credit
[08/07, 07:28] Ara: Standby letter of credit is under ucp600 or ucp600 ,isp
[08/07, 07:28] Ara: Bill of Ladding 2 questions, export bill crystallization, guarantee maximum period, exim Bank duties 2mark, Duration of bill realisation, PCFC value above export order, deemed exporter, if domestic price increases above export price...
[08/07, 07:28] Ara: Deemed export 2 ques
[08/07, 07:28] Ara: Bank guarantee under
[08/07, 07:28] Ara: Lrs scheme available to individuals upto USD 250000 not to corporate, partnership, huf, trust
[08/07, 07:28] Ara: Buyer credit linked to Libor/ mibor
[08/07, 07:28] Ara: Documents should be presented within 21 days from
[08/07, 07:30] Ara: If the maturity date is a holiday then it should be presented before the date or after holiday
[08/07, 07:38] Ara: Merchant trade should be completed within 9 months
[08/07, 07:41] Ara: What is clean payment
[08/07, 07:41] Ara: High sea sale
[08/07, 07:42] Ara: Trade blog 1 que
[08/07, 07:43] Ara: Normal transist period is from the port to destination port or from manufacturing to destination port
[08/07, 07:47] Ara: India export rice in exchange of petrol, Diesel this is theory of comparative advantage , heckscher ohlin theory, theory of absolute advantage
[08/07, 07:50] Ara: In trade within country which is common as international trade. Dap ,Daa LC
[08/07, 08:00] Ara: Factoring forfeiting 4 questions
[08/07, 08:06] Ara: Transfer LC
[08/07, 08:11] Ara: Foreign exchange governed by dgft RBI, exim bank,
[08/07, 08:14] Ara: Lc is given on Fob value
[08/07, 08:20] Ara: If ABC company is having bank guarantee with x bank and they are entering to contract with y to supply goods and if ABC company fails what bank will do a) pay to y on the value of entered or b) pay a guarantee amount
[08/07, 08:21] Ara: Pre shipment 360 days
[08/07, 08:21] Ara: Preshipment interest is given upto 180 days
[08/07, 08:27] Ara: Bank guarantee should not be issued more than 10 yrs
[08/07, 08:29] Ara: Status holder are classified from one to five star
[08/07, 08:29] Ara: Softex is used for software export
[08/07, 08:36] Ara: Advance remittance up to usd200000

[08/07, 08:39] Ara: ABC company is dealing with goods and banking with x 🏦 bank , it buys goods from y and for y company x bank willing to finance is it a) vendor finance b) channel finance
[08/07, 08:49] Ara: Three , four star export house
[08/07, 08:54] Ara: Export of goods freely upto RS 500000
[08/07, 08:57] Ara: Project contractors after completion of project abroad may import without an authorisation good including capital goods used in project provided they have been used for atleast 1 yrs
[08/07, 08:58] Ara: Duty exemption scheme
[08/07, 08:59] Ara: Duty drawback scheme


[08/07, 09:03] Ara: Arbitration
[08/07, 09:03] Ara: Speculation
[08/07, 09:05] Ara: If on Oct 3 transaction is settled on Oct 5 assuming Oct 3,4,5 is working day this is a) spot b) forward c ) future d) ready
International Trade Finance exam yesterday.

Bill of Ladding 2 questions, export bill crystallization, guarantee maximum period, exim Bank duties 2mark, Duration of bill realisation,PCFC value above export order, deemed exporter, if domestic price increases above export price... Some more questions which I recollected.

 Thanks

Trade Finance Recollected Questions: Preshipment, Post shipment Finance, PCFC, Forfaiting, EXIM Bank, FTP, Trade Blocs, ECGC Confirmation, DEPB Scheme, EPCG, Limitation Clause, ECNOS full form, Combined Transport Document, Gift Exports limit, Adv payment limit on Import, Bonafide Baggage period, Drawback, Merchanting TradeTrade, Domestic Trade types.


 digital banking recollected
Jackpotting
Emv and non emv
Abps and aeps
Financial exclusion concept
10 questions on cards
Frauds like skimming etc
Risk based 5 questions
Mpin based 3 questions
Card dimension
8 straight forward questions from book
Confusing ones as all questions have 2 anwers type...be carefull before marking answers
Digital banking todays recollected questions

Otp full from
Pharming  attack on internet website's 
Mom and pop means
Technology solution in India which is not part of FI
Cyber mugging
X2x service code
Pos terminals related questions
Dimensions of plastic card
Difference between  gprs pos and pstn  pos
First pos mc developer in india
Chargeback related questions
Jackpotting in atm means
Meltdown and spectre means
Nfs managed by npci situated at
In Forex settlement the rupee leg is settled through

If I recollect I will append pls


Ccp-
Questions were conceptual. Really difficult questions from LG and LC. Questions from Syndication and MBA -5. LC - no numericals only conceptual case study 5 no. Syndication and Consortium -5 . EPS -5, IBC -5 , and questions covering the whole book. Interesting fact - none of this answer was the right answer nearly 15 -20 questions. Very confusioning

  • Cleared CCP today.. Questions were from msme service n manufacturing sector, Npv and irr difference, eps calculation, calculation of tnw-1, minor question-2,case study on huf , bcsbi -2 questions, case study on lc and asked to select type of lc, max period of BG, deferred payment guarantee, cersai is done under, cersai is used for, break even point calculation-1,standard deviation on investment,time value for money etc...
·         Forex operations review and Recollected exam
·          
·          
·          
·         Usance Period
·          
·         sanction of fresh/enhanced export credit limits should be made within 45
·          
·         Limit for export under OPGSP
·          
·         Schedule III of FEMA
·          
·         Remittance exceeding USD10Mio per project consultancy service in respect of Infra Projects
·          
·         commission to an agents abroad for sale of residential flats-USD25000 or 5% of inward remittance
·          
·         reimbursement of pre-incorporation expenses
·          
·         Donation - 1% or USD 5Mio
·          
·         Pan mandatory for all LRS remittance
·          
·         LRS reporting - Daily Basis
·          
·         LRS not applicable to HUF,Partnership form, Trust
·          
·         2 new Incoterms incorporated in 2010
·          
·         export realisation period
·          
·         collectin bill
·          
·         rate application from transfer from NRE to FCNR
·          
·         who issue SOFTEX form
·          
·         fedai last meetings
·          
·         advance remittances toward imports of services are permitter without any limit
·          
·         question on accruals in the account should be converted into rupees into rupee on last day of succeeding
·          
·         month
·          
·         who can open SNRR account
·          
·         How much INR can be taken outside Inida
·          
·         Export of gift articles not exceeding 5 lacs
·          
·         NRO account Foreign nationals should not exceed more than 6 months
·          
·         Vostro account is funded through which Form1/2/3/4
·          
·         when we sent MT707
·          
·         Travellers proceedings to which countries not exceeding USD 300 per visit
·          
·         Target of FTP2015-20 export target of $900 billion by 2019-20
·          
·         Article 13 of UCP 600
·          
·         Green clause credit
·          
·         Commercial invoice should be signed and dated
·          
·         10-12 questions on ECB,FDI,ODI
·          
·         3-4 questions on FTP
·          
·          
·          
·          Questions asked from UCP 600, LOC, LRS, FTP 2015- 2020, ECGC, PTA, ECB, etc.
·          
·          
·          
·         Cleard Foreign Exchange Operations Exam today..paper was little bit tricky..no numericals, no case studies..just theoretical but concept based questions..ECB,FTP,LC,LRS,ECGC,EXIM, pre & post shipment are the some areas which covers more than half of the question paper.
·          
·          
·          
·          
·          
·          
·          
·         forex operation question 27.10.2018
·          
·          
·          
·         fro nre to fcnr which rate apply
·          
·         as per latest what is mandatory for lrs "pan"
·          
·         how much invest in jv - 400%
·          
·         coprporate donate what amount - 1% of forex earning or $5 m which ever is less
·          
·         one from high seas sale
·          
·         marine insurance policy indemnity se related
·          
·         fedai rate declare which rate in month end
·          
·         one is ralated to var and fbil
·          
·         if forward is more than spot then what - interest on base less than counter
·          
·         regarding lou and loc - ans is both are dicontinued
·          
·         one is if there is no loc and lou then what is the option for importer
·          
·         one forfaiting
·          
·         what is requirement to be an exporter
·          
·         if account is standard then in which case there is no need to report ecgc before disbursement
·          
·         ek bpo se related
·          
·         one is from eefc
·          
·         one is for tt buying
·          
·         ftp target for 2020
·          
·         advane under import of services without guarntee - $ 5 lakh
·          
·         condition for granting loan against nri deposit
·          
·         lc amendment- mt707
·          
·         one from urbdg 758
·          
·         urr 722
·          
·         one from demand guarantee
·          
·         standby lc
·          
·         one is lc term prevail against sanction ye ans h question i forget
·          
·         if lc not require transport , invoice then what - option given not remember
·          
·         incoter added in 2010 - dap dat
·          
·         one is if in lc there is no presentation date only expiry given then what will be presentation date
·          
·         for what we can not issue lc
·          
·         if lc is in fob then import licence what we endorse option - cif exw fob
·          
·         who issue softex forms
·          
·         one is edi port - sdf
·          
·         if some mistake in shippong bill then what will appraising officer do - mark and point to commisioner
·          
·          
·          
·         ~forex operation question 27.10.2018
·          
·         fro nre to fcnr which rate apply
·          
·          
·          
·         as per latest what is mandatory for lrs "pan"
·          
·          
·          
·         how much invest in jv - 400%
·          
·          
·          
·         coprporate donate what amount - 1% of forex earning or $5 m which ever is less
·          
·          
·          
·         one from high seas sale
·          
·          
·          
·         marine insurance policy indemnity se related
·          
·          
·          
·         fedai rate declare which rate in month end
·          
·          
·          
·         one is ralated to var and fbil
·          
·          
·          
·         if forward is more than spot then what - interest on base less than counter
·          
·          
·          
·         regarding lou and loc - ans is both are dicontinued
·          
·          
·          
·         one is if there is no loc and lou then what is the option for importer
·          
·          
·          
·         one forfaiting
·          
·          
·          
·         what is requirement to be an exporter
·          
·          
·          
·         if account is standard then in which case there is no need to report ecgc before disbursement
·          
·          
·          
·         ek bpo se related
·          
·          
·          
·         one is from eefc
·          
·          
·          
·         one is for tt buying
·          
·          
·          
·         ftp target for 2020
·          
·          
·          
·         advane under import of services without guarntee - $ 5 lakh
·          
·          
·          
·         condition for granting loan against nri deposit
·          
·          
·          
·         lc amendment- mt707
·          
·          
·          
·         one from urbdg 758
·          
·          
·          
·          
·          
·         urr 722
·          
·          
·          
·         one from demand guarantee
·          
·          
·          
·         standby lc
·          
·         one is lc term prevail against sanction ye ans h question i forget
·          
·          
·          
·         if lc not require transport , invoice then what - option given not remember
·          
·          
·          
·         incoter added in 2010 - dap dat
·          
·          
·          
·         one is if in lc there is no presentation date only expiry given then what will be presentation date
·          
·          
·          
·         for what we can not issue lc
·          
·          
·          
·         if lc is in fob then import licence what we endorse option - cif exw fob
·          
·          
·          
·         who issue softex forms
·          
·         one is edi port - sdf
·          
·          
·          
·         if some mistake in shippong bill then what will appraising officer do - mark and point to commisioner
·          
·          
·          
·          
·          
·         Foreign Exchange Operations Recollected question (27/10/18)-
·          
·         1. LRS scheme availble to?
·          
·         2. question abt Gift/donation.
·          
·         3. one abt medical treatment?
·          
·         4. PAN mandatory in LRS?
·          
·         5. travellers limit 3000USD per visit or per annum?
·          
·         6. foreign currency not permissible to- Nepal
·          
·         7. forward contract limit- USD 1 million
·          
·         8. question on RFC ac.
·          
·         9. direct question on PIO.
·          
·         10. whi can open SNRR ac
·          
·         11. question abt prohibited investment.
·          
·         12. what is green clause lc.
·          
·         13. question on tolerance limit in Lc.
·          
·         14. question abt advising bank.
·          
·         15. question abt MT707.
·          
·         16. 3-4 question abt bill of lading.
·          
·         17. 2 new INCOTERMS.
·          
·         18. SOFTEX form.
·          
·         19. export to warehouse question.
·          
·         20. 5-7 indirect question abt pre and post shipment.
·          
·         21. question on forfaiting.
·          
·         22. question on bill of entry.
·          
·         23. 2-3 question on trade credit.
·          
·         24. 1 question abt nature of transaction and rate applied.
·          
·         25. 1 abt ECIB(WTPC)
·          
·         26. 1 question on standby credit.
·          
·         27. LRS statement submission.
·          
·         28. normal transit period
·          
·          
·          
·         29. ECB cost ceiling.
·