Tuesday, 25 December 2018

Credit thrust

Credit Thrust: It means the main focus area for a bank or a specific branch should

give. If a branch is in rural, thrust should be on agri sector loans, and so on. This gives

an opportunity for a bank/branch to gather maximum profit with minimum staff, as the

customer is ready. Precaution: While disbursement, the financials and history to be

checked to prevent NPA in future.

Credit Priorities are Same as Credit thrust.

Credit Acquisitions: It means sanctioning the loans to customers by closing their

loans with other banks. In short, acquiring other bank‘s customers for business growth.

Points to remember:

1 Whether the loan in other bank is in standard condition

2 Why is the other bank ready to let go the loan

3 Credit history of the borrower

4 Adequate collateral

Statutory & Regulatory restrictions on Advances :

No banking company shall-

(a) grant any loans or advances on the security of its own shares, or

(b) enter into any commitment for granting any loan or advance to or on behalf

of-

(i) any of its Directors,

(ii) any firm in which any of its Directors is interested as Partner, Manager,

Employee or Guarantor, or

(iii) any company(proprietor/partner/pvt ltd/public) in which any of the

Directors of the banking company is a Director, Managing Agent,

Manager, Employee or Guarantor or in which he holds substantial

interest, or

(iv) any individual in respect of whom any of its Directors is a partner or

guarantor.

Restrictions on Grant of Loans & Advances to Officers and Relatives of Senior

Officers of Banks

The following guidelines should be followed by all the banks with reference to the

extension of credit facilities to officers and the relatives of senior officers:

(i) Loans & advances to officers of the bank

No officer or any Committee comprising, inter alia, an officer as member, shall, while

exercising powers of sanction of any credit facility, sanction any credit facility to his/her

relative. Such a facility shall ordinarily be sanctioned only by the next higher sanctioning

authority. Credit facilities sanctioned to senior officers of the financing bank should be

reported to the Board.

(ii) Loans and advances and award of contracts to relatives of senior officers of the bank

Proposals for credit facilities to the relatives of senior officers of the bank sanctioned by

the appropriate authority should be reported to the Board.

Credit Appraisal :



CREDIT RISK ASSESSMENT (CRA)

The CRA models adopted by the Bank take into account all possible factors into

appraising the risks, associated with a loan.

These have been categorized broadly into financial, business, industrial & management

risks are rated separately.





These factors duly weighted are aggregated to arrive at a credit decision whether loan

should be given or not

Validation of proposal:

It is done considering 5 key factors below:

1. CIBIL Score and Report: It is one of the most important factor that affects your

loan approval. A good credit score and report is a positive indicator of your credit

health.

2. Employment Status: Apart from a good credit history, banks also check for

your steady income and employment status.

3. Account Details: Suit filed or written off cases are carefully examined by banks.

4. Payment History: Banks check for any default on payments or amount overdue

cases, which might project a negative overview of your overall report.

5. EMI to Income Ratio: Banks also consider the proportion of your existing loans

when compared to your salary at the time of loan application. Your chances of loan

approval gets reduced if your total EMI‘s exceed your monthly salary by 50%.

Apart from your CIBIL Score, loan eligibility criteria differs from bank to bank and across

loan types. However, some of the basic requirements in terms of documentation are:

 Identity Proof: Aadhar Card, Valid Passport, Driving License, Voters ID or PAN

Card

 Address Proof: Aadhar Card, Valid Passport, Driving License, Voters ID or Utility

Bills

 Proof of Employment: Salary slip, Official ID card or letter from company

 Income Proof: Latest 3 months Bank Statement, salary slip for last 3 months

 3 Passport size photographs





Dimensions of Credit Appraisals

Six ―C‖ s

1. Character



You are considered to have good credit character when you live up to your

financial and credit agreements. Paying bills on time and meeting financial

obligations are signs of good character.

Your credit score and your credit history are good ways for a bank to learn about

your character or credit reputation and how well you pay your credit obligations.

2. Capacity

Capacity reflects your ability to repay a loan or other financial agreement.

Potential creditors want to see that you‘ll have enough cash left over after paying

your fixed monthly expenses to repay a new credit or loan account.

3. Capital

A potential bank also will assess your capital. Wondering if you have any?

Subtract all your debts from your assets, including any property that you may own,

and this is your capital. Banks and creditors like to see that you have enough

capital to handle another loan or credit account before approving you for new

credit.

4. Conditions

Banks look at conditions such as the stability of your employment, your other

debts and financial obligations, and how often you‘ve moved in the past year when

considering whether to approve you for a loan. The longer you‘ve been in a job

and the less frequently you‘ve moved the more stable your life conditions appear

to potential creditors and banks.

5. Collateral

Collateral is any property or possession that can be used as security for a

payment of a debt. For example, a home or automobile serve as collateral against

the loans you might take out to purchase them. Banks like collateral because it

guarantees them against a total loss if you fail to repay your loan. If that happens,

your collateral may be sold or repossessed to repay your financial obligation.

6. Cash Flow

adequate cash flow to repay a new loan.

Income in each month

Are you paid regularly, or does your income fluctuate based on seasonality or

other factors?

A Bank wants to make sure you have enough cash flowing your way on a regular

basis so that you can pay for a new credit obligation.

Basic principles of Information security

Basic Principles of Information Security:



For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles. There is continuous debate about extending this classic trio. Other principles such as Authenticity, Non-repudiation and accountability are also now becoming key considerations for practical security installations.



 Confidentiality: Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Breaches of confidentiality take many forms like Hacking, Phishing, Vishing, Email-spoofing, SMS spoofing, and sending malicious code through email or Bot Networks, as discussed earlier.



 Integrity: In information security, integrity means that data cannot be modified without authorization. This is not the same thing as referential integrity in databases.

Integrity is violated when an employee accidentally or with malicious intent deletes important data files, when he/she is able to modify his own salary in a payroll database, when an employee uses programmes and deducts small amounts of money from all customer accounts and adds it to his/her own account (also called salami technique), when an unauthorized user vandalizes a web site, and so on.



On a larger scale, if an automated process is not written and tested correctly, bulk updates to a database could alter data in an incorrect way, leaving the integrity of the data compromised. Information security professionals are tasked with finding ways to implement controls that prevent errors of integrity.



 Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service (DoS) and distributed denial-of service (DDoS) attacks.



 Authenticity: In computing, e-business and information security it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they are.



 Non-repudiation: In law, non-repudiation implies one's intention to fulfill one’s obligations under a contract / transaction. It also implies that a party to a transaction cannot deny having received or having sent an electronic record. Electronic commerce uses technology such as digital signatures and encryption to establish authenticity and non-repudiation.



In addition to the above, there are other security-related concepts and principles when designing a security policy and deploying a security solution. They include identification, authorization, accountability, and auditing.



 Identification: Identification is the process by which a subject professes an identity and accountability is initiated. A subject must provide an identity to a system to start the process of authentication, authorization and accountability. Providing an identity can be typing in a username, swiping a smart card, waving a proximity device, speaking a phrase, or positioning face, hand, or finger for a camera or scanning device. Proving a process ID number also represents the identification process. Without an identity, a system has no way to correlate an authentication factor with the subject.



 Authorization: Once a subject is authenticated, access must be authorized. The process of authorization ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity. In most cases, the system evaluates an access control matrix that compares the subject, the object, and the intended activity. If the specific action is allowed, the subject is authorized. Else, the subject is not authorized.



 Accountability and auditability: An organization’s security policy can be properly enforced only if accountability is maintained, i.e., security can be maintained only if subjects are held accountable for their actions. Effective accountability relies upon the capability to prove a subject’s identity and track their activities. Accountability is established by linking a human to the activities of an online identity through the



security services and mechanisms of auditing, authorization, authentication, and identification. Thus, human accountability is ultimately dependent on the strength of the authentication process. Without a reasonably strong authentication process, there is doubt that the correct human associated with a specific user account was the actual entity controlling that user account when an undesired action took place.


Iibfadda.blogspot.com 

Monday, 24 December 2018

Cyber fraud and management:: prevention



Cyber fraud and management:: preventions
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security 
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites
---------------------------------------------------------

BCSBI recollected question and Exam Tips:;



BCSBI recollected question and Exam Tips:;

Very basic questions from IIBF prescribed book
Kindly visit BCSBI site for Latest Update’s
QUESTIONS ASKED IN TODAYS BCSBI.. ( based on memory) PART 2
1. Case studies based on nominee
2. two nominees applicable in which clause.. E OR S.. or F OR S
3.BSCBI is compulsry for banks to follow or not
4. educational. loan for 25 lakhs with 10 percnt margin... how much you insist for collateral
5. same. partners for different companies... wthr right of sett off can be applied or not for one of the firms debts
6. questions on HUF KARTA
7.BANKS CHALLENGE IN IMPLEMENTING DIGITAL TECHNOLOGY
8.banks time for calling customers over phone
9. mobile phone ettiquete
10.norms.for customers to approach BCSBI for guidance for geting loan.. a the limit of the loan
11.questions on customer orientation
12. under which sectn of NI act cheques has to be paid by the bank.... to be continued


1. Customer is defined in 
a. RBI Act b. NI Act c. BR Act d. KYC Policy 
2. Partnership firms M/s ABC and M/s CBA has same three partners. Account of M/s ABC is overdrawn by Rs. 75,000 and the other firm’s account has Rs. 90,000 as credit balance. Can bank use the right of set off? (2 marks) 
a. Can use as same partners b. Cannot set off as two different firms 
Don’t remember the other options
3. In which of these circumstances bank should not disclose customer details?
a. Request under Banker’s Books Evidence Act 1891
b. Under Section 133 of Income Tax Act
c. When asked by State /Central Govt official
d. In public interest 
4. A non-customer deposits Rs. 3000 to be credited to the account of Mr. Z in another station by NEFT. He had wrongly mentioned the account number and the amount is now in Bank’s suspense Account. What is the relationship between bank and Z?
a. Debtor-Creditor
b. Trustee etc 
5. A document duly stamped and given by a customer authorising another person to act on his behalf 
a. Power of attorney 
b. Mandate 
6. Incorrect statement about HUF 
a. Lady member can perform the role of Karta 
b. Karta and coparceners may possess self-acquired properties other than HUF property and these can be attached for HUF dues
c. On death of a coparcener, his share may be handed over to his wife, daughters and other female relatives 
7. Two of three trustees approach bank to open an account and allow the two of them to operate as the third trustee is abroad. As per trust deed, trust is to be jointly operated by three of them 
a. Get power of attorney from third trustee 
b. Account cannot be opened since trust deed mandates operation by three trustees.
8. Borrowing powers of the Board of Directors in a company are mentioned in which document?
a. Articles of Association
b. Memorandum of association
c. Certificate of Incorporation
d. Board resolution
9. In case of fixed deposit, interest can be charged as 
a. Daily basis on customer request 
b. Applied monthly or bimonthly as required provided that compounded amount does not exceed the amount to be paid quarterly 
c. Any periodicity requested by customer
d. Only at the end of maturity 
10. FCNR accounts can be opened in ---------------- and for a period of --------
a. Any freely convertible currency with period of 5 years
b. Any freely convertible currency with period of 3 years
11. Full form of DICGC 
12. Amount eligible to be transferred to DEAF
a. Any amount unclaimed in deposit account for a period of 10 years or more
b. Any amount remaining unclaimed in any account for a period of 10 years
c. Both a and b 
d. Any amount unclaimed for a period of two years or more 
13. In order to meet implied needs of a customer, ------------- is required from banker
a. Creativity and presence of mind
14. Good delivery constitutes which all elements ? 
a. Speed, timeliness , accuracy, courtesy and concern 
15. Transaction cap of mobile banking for purchase of goods and services 
a. As per each bank’s rule 
16. Mobile banking can be provided through 
a. Mobile banking App
b. USSD
c. SIM Kit
d. SMS service 
17. An asset can be classified as NPA when 
a. Interest or Principal is overdue for 90 days or more 
b. When CC Account is out of order for 180 days
c. When bill of exchange not honoured for 120 days etc 
18. Maximum amount that can be granted under Skill Loan Scheme?
1.5 lakhs
19. In order to set up extension counter in a hospital in a Tier I city, bank needs to take approval from 
a. RBI
b. No permission required 
c. Ministry of Finance etc 
20. Demat account can be used to hold 
a. Shares
b. Mutual funds 
c. Debentures
d. All of these 
21. Demat account cannot be use to hold 
a. Deposit to be handed over to broker
b. Exchange traded funds
c. Mutual funds etc 
22. Other negotiable instruments 
a. Interest warrant 
b. Bankers draft etc 
23. Which section of NI Act says that Bank should honour customer’s cheques?
a. Section 31 
24. Not a characteristic of negotiable instruments.
a. in writing
b. date of payment must be certain
c. Transferrable
d. Duly stamped
25. Which one of the following is not a structural difference between marketing of goods and services?
a. Intangibility
b. inseparability
c. Homogeneity
d. perishability
26. Marketing Mix does not contain
a. Product
b. Price
c. Place and promotion
d. Image of the organisation
27. Which one of the following are not permitted to carry out regular transactions for customers?
a. Business correspondents 
b. Business facilitators.
28. Which one of the following is not a difference in marketing goods and services?
a. Services are produced and consumed simultaneously
b. Services are intangible
c. Services provided are uniform
29. Constraints in digital banking 
a. Embracing of new technology
b. Customer education
c. Safe and friendly environment 
Choices are combinations of above
30. Biometric authentication in micro ATMS done by 
a. Business Correspondents
b. UIDAI by biometric association with its database
31. In mobile banking for debit transactions following checks are made
a. Face to face interaction with users 
b. Two factor authentication
c. End to end encryption of mPIN
Choices are combinations of above 
32. Estimates committee has made recommendation that succession certificate should not be insisted where amount of credit to the depositor does not exceed Rs. 25,000. What is the correct instruction?
a. If nomination/Survivor clause is present then succession certificate should not be insisted for any amount. 
33. Account opened with Anyone or survivor clause, all three of the account holders die together in an accident, the nominee has produced the death certificate and amount outstanding in account is Rs. 20,000. Action to be taken by bank
a. Ask nominee to provide Succession certificate 
b. Ask nominee to provide letter of administration
c. Probate to be given
d. Transfer the money without asking for documents (a) to (c).
34. As per Goiporia committee, Enquiry or May I Help You counter should be present in 
a. Head Office
b. Regional Office
c. All Urban and Metro branches
d. All branches except very small branches 
35. ---------------is a matrix of different components like source of funds, level of income, volume and frequency of transactions, origin and destination of funds etc. 
a. Transaction profile
b. Organisation Profile
c. Marketing Profile etc 
36. Main grievances of small depositors does not include
a. Difficulty in opening of account 
b. Delay in updating of passbook
c. Difficulty in closing of account
d. Account being classified as dormant/inoperative without any notice. 
37. What is meant by Grievance Escalation System?
If the customer is not satisfied with the reply offered by bank, then he can approach higher authorities for redressal of grievances
38. If branch manager is not able to respond to a complaint within how many days should he escalate the matter to regional office?
7 days 
39. In order to reduce the complaints filed to Banking Ombudman, what is suggested?
Appointment of internal Ombudsman
40. What all functions does not fall under customer service committee of the board?
a. Triennial audit of customer satisfaction surveys
b. Formulation of Comprehensive Deposit Policy 
c. Annual Survey of customer satisfaction
d. Salary increase to employees for better customer service
41. Which of the following is not part of mandatory displays in branches?
a. Information available in booklet form
b. Details of CEO of the bank
c. Banking Ombudsman details
d. Details of Regional Manager etc
42. What does not come under COPRA Act?
a. Right against unfair trade practices
b. Right to have access to variety of goods
c. Right to free education
43. Which of the following needs are most important for a person?
a. Emotional needs
b. Interpersonal needs etc 
44. Which are the three interpersonal needs?
a. Need for inclusion, Need for control and Need for affection
45. What is meant by encoding of message ?
Sender needs to use the appropriate language or expression
46. Correct order for communication.
a. Conceiving the message, Encoding the message, decoding the message and providing feedback
47. Which of the following about BCSBI is wrong?
a. Membership in BCSBI is compulsory
b. Membership is voluntary 
c. Its an independent and autonomous body
d. Registered as society
48. Who has authority to approve research activities in BCSBI?
Governing Council
49. Function of Chief Executive Officer in BCSBI 
a. Preparation of annual budget for submission to the Society
b. Sanction expenditure and investments of BCSBI
c. Financial and managerial powers etc
50. Who is the raison d’etre (main purpose) of BCSBI ?
a. RBI 
b. common man
c. Customer service 
51. BCSBI modelled on basis of which country?
UK
52. BCSBI rating of member banks is using a scoring scale of 
a. High, Above average, average and below average
53. In order to get credit counselling from BCSBI which is correct 
a. A fee has to be paid
b. Can apply only through member banks 
c. Concerned bank is free to accept the debt restructuring plan in full or with modifications
54. Customer of a bank not a part of BCSBI can escalate complaint to 
a. BCSBI
b. Banking Ombudsman
c. Customer Service Department of RBI
55. Which of the following not included under Code of Bank’s Commitment to Customers?
a. Deposit accounts
b. Remittances within India
c. Foreign Exchange services
d. Merchant banking
56. BCSBI puts following obligations on the customers?
a. No obligations
b. Obligation of customers varies from bank to bank 
57. Objectives of Code of Bank’s commitments to customers?
a. Fair treatment of customers
b. Increase transparency
c. foster confidence in banking system
Choices are combinations of three 
58. As per BCSBI Code regarding Do Not Call registry (Correct One)
a. Bank will not transmit unsolicited commercial information if you have registered with ‘Do not call registry’
b. Bank will enrol customer in Do Not Call Registry after 6 months of opening account etc 
59. Change in interest rate on loan products will be informed within 
a. Fortnight 
b. One-month etc 
60. As per BCSBI Code, if there is any change in fee or new fee is introduced, it will take effect 
a. Retrospectively if needed
b. revised charges retrospectively and new charges after one month
c. Prospective effect after giving notice of one month
61.As per BCSBI code, In case of revision in fees it will be communicated to customer by( Incorrect option)
a. Account statements
b. Email and SMS alerts 
c. TV advertisements 
d. Notice board at branches 
62. As per BCSBI code regarding privacy of customer(Incorrect option)
a. Bank will treat personal information as private and confidential till he is a customer of the bank
b. Bank will treat personal information as private and confidential even when he is no longer a customer of the bank. 
63. As per BCSBI code on CICs, which of the following is wrong 
a. Bank will provide information about credit availed by customer to CIC at periodic intervals
b. On request, will give information about CIC(s) to which details are shared
c. Bank will not share copy of credit information obtained from CIC 
64. In BCSBI Code, 
a. You denotes the customer and we denotes the bank
b. ‘You’ denotes the member bank and ‘We’ denote BCSBI etc 
65. As per BCSBI Code, when customer makes a complaint Bank will inform the customer
a. how to do so 
b. where a complaint can be made
c. Whom to approach for redressal 
d. same complaint is not raised again by customer 
options are combinations
66. As per BCSBI Code, for collection of dues customers should be contacted between 
a. 7 hrs and 1900 hours 
67. Nominee can be two persons in the case of accounts opened as 
a. Either or Survivor
b. Former or survivor
c. Joint accounts with joint operation etc 
68. in case of revision in minimum balance to be maintained in current account and as customer’s current account does not meet the minimum balance in the last quarter bank as per BCSBI code should 
a. Inform customers 30 days in advance of any change in minimum balance
69. As per BCSBI Code, in case of inoperative/dormant accounts
a. Bank should inform three months before account is made as inoperative
b. Inform when account is made inoperative etc 
70. In case of cheque collection policy, we will provide you compensation for delay in collection of instruments as per 
a. Compensation policy of respective bank
b. Compensation policy of RBI
c. compensation policy of IBA etc 
71. In case a cheque is lost in transit as per cheque collection policy,
a. Bank will help in obtaining duplicate cheque and offer compensation
72. In case of a cheque issued by B to A, amount in figures is Rs. 10,000 and in words is ten thousand which is striked off and written as five thousand. Alteration is duly signed by B. In that case, bank should 
a. Honour the cheque and pay the amount given in figures
b. Return the cheque as material alteration is not allowed
73. As per BCSBI Code, while opening a Term deposit we will (incorrect one)
a. Get instructions from you for disposal of deposit at maturity 
b. Inform about procedure to withdraw deposit before maturity
c. None of these
74. As per BCSBI code, on receiving a loan application (incorrect one)
a. acknowledges the receipt of application
b. Communicate in writing reasons for rejection of loan application
c. Provide a provisional sanction letter on receipt of loan proposal
75. As per BCSBI code, bank will return all securities/documents/title deeds to mortgaged property within --- days of the repayment of all dues
a. 15 days 
76. In the event of unauthorized transaction in internet banking after customer has received means to access Internet banking, maximum liability will be 
a. Full amount 
b. Nil 
c. Rs, 10,000/- 
77. Request for cancellation/closure of credit card will be processed in 
a. 7 days 
78. As per BCSBI Code, prepayment penalty of fixed rate loans is waived till 
a. 10 lakhs 
b. 5 lakhs
c. 10 lakhs etc 
79. For a unit to be classified as a sick unit, it should remain as ------------for three months or more or if there is erosion in the net worth due to accumulated losses to the extent of --- of net worth 
a. NPA ,50%
b. Doubtful,50%etc 
80. In small accounts, balance at any time should not exceed ---------- and total credits in a year not to exceed ----------
a. Rs. 50,000/- and Rs. 1,00,000
81. Banks can allow small accounts to operate for a period of 
a. up to 1 year 
b. up to 2 years 
82. A customer approaches a bank for opening an account without any of the required KYC documents, bank can open 
a. Small account 
b. Refused to open the account 
83. As per Consumer Protection Bill of 2015, cases not admitted within --- days will be deemed admitted 
a. 21 days 
84. Customer orientation means 
85. As per BCSBI Code, when customer avails a safe deposit locker (incorrect one)
a. Bank will not link fixed deposit to allocation of lockers
b. explains all the rules of allocating a locker
c. Explain the lesser and lessee relation created 
86. In case of illiterate persons, nomination can be given 
a. Thumb impression to be attested by two witnesses
b. No need to authenticate thumb impression
c. Authorized official should authenticate in the presence of customer etc 
87. Number of grids in grid based cheque truncation system 
a. Six
b. Ten 
c. Three 
d. Four 
88. In order to provide customer satisfaction, bank should 
a. Hire new staff in place of retirees 
b. Staff to be trained in handling complaints 
c. Deploy more staff in counters 
etc



-------------------------------------------------------



AMLKYC Recollected Questions and Exam Tips::::



AMLKYC   Recollected Questions and Exam Tips::::

Kindly focus on case studies in Macmillan,FATF Latest amendments   latest amemn international organization for AML, FATF  latest recommendations,PMLA act latest developments, Reports sent to FIU_IND


1.high medium low risk categories kyc review period 3 questions came directly
2.Gave example of transactions and asked wat type of money laundering is that-funnel accts,deposit structuring,multiple tier account 3ques
3.IBA study group paper published 3 questions from that

4.Placment,layering, integration 1 case study each topic
5.hawala is wat type of ml
6.ml word is coined by the guardian in -watergate scandal
7.FIU IND based questions 6-8
8.5-7case studies one came from text book itself
9.OVD based questions 3
10.given options with type of customer and the documents they submit and asked which customer is eligible for opening sb
11.reporting entity have-designated director
12.designated director is appointed by
13.report submission questions 3
STR within 7 days
CTR within 15th of next month
14.kyc policy is revised by n within
15.key elements of STR

Certified credit professionals exam members review::


Certified credit professionals exam  members review::
Frst of all abt toughness.. I thnk paper was tougher dan caiib papers.. Esp i found it tougher prsnly..
Regarding paper.. One qstn was der frm factoring.. Pari passu charge, 1 qstn frm bfeak evn point.. No need to study fund flow nd cash flow as der was no qstn frm dat part.. Lc calculation with eoq given 5 marks numerical, payback, arr, npv, irr 5 mark numerical, mpbf, turnover tandon committee 5 mark numericals.
. Export case study.. Priorty sector classfication case study.. Ratios numerical 3-4 marks like inventory turnover given find cost of goods sold. Mse service sector enterprise max loan.. Nd medium sector service sector max loan.. Numericals der were 20-30 marks.. Read btwn lines to build concept.. As 4 option were given nd u hv to find out which one is wrng.. 30-40 qstn were lyk dat..
Exam was tough i felt personally..Questns on NPV,IRR (to be read very minutely from the book )payback period ,project Viability ,RATIOS like Interest coverage ratio, Gross profit ,DER ratios,priority sector lending,pari passu charge,CP in detail confusing questions,LC limit ,frequency,No of LCs ,time period, Working capital 1st nd second method lending case studies, Forex
PCFC , green clause LC ,education loan,minor,companies,partenership Kimbersley process ,credit rating agencies , Sarfaesi,Cersai ,registration of charges,BEP,Balancesheet , MSMED act 2006 and very minute topics from the book .Concepts to be cleared as options are confusing.
Today it was my first attempt for CCP exam and by God’s grace passed the exam. Thanks to this group for valuable information and guidance. In my opinion Paper was tough. Reading Taxman only is not enough. Concepts must be clear as der r full of case studies and numericals throughout the paper based on LC , IRAC norms, treatment of stressed assets,BG, BEP, WC requirement assessment under different methods, Project appraisal and Prisec case studies and documentation. I din face much questions on retail credit, fund flow cash flow and ratio analysis. All the best to CCP aspirants and who r not I will advice dem dat dis exam is worth a try.
Today it was my first attempt for CCP exam and by God’s grace passed the exam. Thanks to this group for valuable information and guidance. In my opinion Paper was tough. Reading Taxman only is not enough. Concepts must be clear as der r full of case studies and numericals throughout the paper based on LC , IRAC norms, treatment of stressed assets,BG, BEP, WC requirement assessment under different methods, Project appraisal and Prisec case studies and documentation. I din face much questions on retail credit, fund flow cash flow and ratio analysis. All the best to CCP aspirants and who r not I will advice dem dat dis exam is worth a try.
https://iibfadda.blogspot.com/

Digital Banking Recollected questions:::

Digital Banking Recollected questions:::
1.CTS abbreviation cheque truncation system
2. What is firewall?: A software programme for protecting against unauthorized access to the information.
3.BBPS … Bhatart Bill payment sytem
4.MDR: merchant discount rate
5. minimum amount which can be remitted under RTGS by a customer: Minimum Rs. 2 lac and no Maximum.
6.Max amount of NEFT can be remitted ..no limit
7. AEPS stands for : Aadhar Enabled Payment System.
8. CPPC stands for : Central Pension Processing Cell.
9. IBPP stands for : Internet Bill Presentation & Payment.
10. Rupay Platform refers to: National Payments Corporation of India (NPCI) initiated the launch of RuPay card in India. It was
done with the intention of integration of payment systems in the country. It has led to lower transaction cost as
processing is being done within country. Also, transactions will be faster.
11. Encryption means: Conversion of plain language into secret language, i.e., coding and The extent of coverage under
12. Maximum RTGS Charge for Rs.2 lac to 5 lac: Rs.25.00 + service tax
13. Application under ASBA can be applied for: a) IPO b) Right Issue c) Mutual fund
14. E-sahyog portal:belongs to Income Tax
15. A Proxy server is for: To provide security against unauthorized users
16. Phising?: To steal the customers personal / confidential data
17. In case of failed ATM transaction customer will get money in 7 working days after compliant
18. CVV: Customer Verification Value
19.NPCI: National Payment Corporation of India.
20. NUUP: National Unified USSD Platform.
21.IMEI: International Mobile Equipment Identity.
22. CVD: Customer Verification Data.
23.STP straight through process
24. . Forward Market Commission is established for:.- Commodity futures
25. Full form of ALU: Arithmetical Logical Unit
26. Full form of HTTP: Hyper Text Transfer Protocol
27. Full form of INFINET? Indian Financial Network
28. GBM: Govt. Business Module
29. IBPP stands for: Internet Bill Presentation & Payment
30. IMPS: Immediate Mobile Payment Service - Mobile to account
31. Starting of a computer is called: Booting
32. Universal set of standards and guidelines for communication by EDI is called: EDIFACT.
33. Full form of ISDN: Integrated Services Digital Network.
34. RTGS amount limit for customers: Min Rs.2 lac and no max
35. Which bank has max share in INFINO PAYTECH Ltd : ICICI Bank
36. USSD: Unstructured Supplementary Service Data.
37. LAN: Local Area Network
38. AEPS stands for : Aadhar Enabled Payment System
39 ATM : Anywhere, anytime,
40. BCP- Business continuity Plan
41. First committee on computerization in banks was headed by: Dr C Rangarajan.
42. In an Organisation communication between the same organization, what type of system applicable: Intranet.
43. In CBS, signatures are loaded through scanning..
44. WAN: Wide area network
45.WAN uses ….interconnecting computers at different Geographical locations
46.CHI : Clearing Housing interface
47.ECE: electronic clearing system
48.APB: Aadhaar pay bridge
49. When in a computer network one network protocol encapsulates a different payload protocol, it is called: Tunnel.
50 Computer Security Day : 30th November
51. customer’s account should be credited within how many days of the complaint?: 7 working
52. First step towards computerisation in Banking: Setting up ALPM (Advance Ledger Posting Machine)
53. CIDR: central identities data repository
54.BBPCU:Bharat bill payment central unit

https://iibfadda.blogspot.com/

MSME recollected questions



MSME recollected questions
1. Micro, small & medium sector
2. Priority sector classification (esp foreign banks less than 20 branches etc)
3. One sum on calculation of NWC
4. CLUSTER development features
5. TIFAC full form, CODISSIA located at?
6. Mahila schemes implemented by SIDBI
7. Which are NOT included under plant & machinery
8. HUF, LLP questions on minor admissibility
9. Common seal compulsory for companies/LLP
10. GRAY sick area
11. Ots implemented by? - individual banks
12. Highest investment by overseas investors is under which sectors
13. Study report Of DIC recommendations
14. Federation of msme for West Bengal state? ITCOT located in which state? MSME council located? Msme as per constitution is state/central/concurrent subject?

FOREX operation Recollected


FX OPERATION:-
Recollected questions are:
1) How many incoterms?
2) Full form of DAT
3)Few questions from doc letter of credit .
4)Nearly 8 questions on LRS
5)NRI remittances limits etc
6)Basic questions on URR 725,
7)URC 522
8)ISP 98
9)Known holiday in forex
10)One question on section of fema
11)Ecgc scheme
12)Question on customs related
13)TT buying TT selling
14)Bill discounting
15)Insurance docs in LC
16) three numericals on cross rates

https://iibfadda.blogspot.com/

Current Affairs on 24.12.2018

Today's Headlines from www:

*Economic Times*

📝 Increase validity period of e-Visa to 10 years: Niti Aayog

📝 Blackstone gets lenders nod to acquire Golden Jubilee

📝 Nysaa Retail to invest Rs 100 cr to add 80 stores

📝 Crude drops more than 11% in a week as supply weighs

📝 GA, KKR in talks to acquire EuroKids preschool chains

📝 Jet Airways announces festive discount on domestic and international fares

📝 Kotak Bank sees corporate loan book swelling by 26 per cent in FY20

📝 Reliance Jio subscribers may face disruption if Reliance Communications deal fails

*Business Standard*

📝 Uber picks India as 'world lab' for mobility, transport innovations

📝 Shriram Transport to M&M Finance, volume dip deflates vehicle financiers

📝 MNC drug majors outshine Indian peers, draw investors' attention

📝 Satin Creditcare plans to demerge small and medium finance unit into NBFC

📝 HFCL forays in railway telecommunications network, wins 2 global contracts

📝 Mondelez India's net profit jumps 47% to Rs 3.26 billion in FY18

📝 Bharat Stage VI shift to hit Maruti Suzuki's 2019 diesel model sales

📝 Rays Power Infra plans to enter electric vehicle space with B2B services

📝 GST Intelligence unit unearths Rs 2.2-billion fake tax-invoices scam

*Financial Express*

📝 FPIs infuse Rs 4,000-cr in 3 weeks on strengthening rupee, easing crude prices

📝 369 infrastructure projects show cost overruns of over Rs 3.58 lakh crore

📝 Apple’s $1 billion bet imperils a tech hub’s rare bargain homes

📝 Google foes get chance to pick holes in $2.7 billion EU appeal

📝 Petroleum products should be under GST, says Industry body

📝 Allahabad Bank working hard to meet Rs 1,000 crore recovery target in quarter 3: MD

*Mint*

📝 GVK group in talks to refinance up to ₹1,400 crore debt

📝 India Inc raises Rs 6 trillion from equity, debt markets in 2018

📝 Huawei gear barred from $3 billion UK emergency network boost

📝 Avoid cap on remuneration of independent directors: CII to govt

📝 Elon Musk says Tesla should have mid-range Model 3 orders by year-end

📝 GST Council to consider 5% GST on under-construction homes.