Thursday, 23 January 2020

MSME

ABCD OF MSME :::: Excellent Content plz read everybody..

1.Keynote address delivered by Shri S. S. Mundra, Deputy Governor, Reserve Bank of India at the 2nd CII
National Conference on MSME Funding held in New Delhi on August 23, 2016 ).
Thank you for inviting me to deliver the keynote address at this second edition of the Conference on
MSME Funding. I compliment the CII for having chosen a very relevant theme for the Conference
‘Propelling MSME Growth through Enhanced Financial Access and Support’. The theme lays emphasis on
two crucial pillars that are pertinent for the sector i.e. enhancing financial access and ensuring adequate
support to enable MSMEs to attain faster growth.
2.It is universally recognized that small businesses are the best vehicles for generate jobs. A IFC
/Mckinsey Study has estimated worldwide MSME population at 420 to 510 million, of which 360 to 440
million alone, are in emerging markets. The report also estimates that the formal SMEs contribute up to
45 percent of total employment and up to 33 percent of national income (GDP) in emerging economies
and these numbers could be significantly higher when informal SMEs are included. The Asia SME Finance
Monitor 2014 published by the Asian Development Bank has estimated that 96% of all enterprises in the
Asian region fall under the MSME category, absorb close to 2/3rd of the working force and contribute to
about 42 % of GDP.
3. According to MSME Ministry’s Annual Report for 2015-16, MSME sector in India today is a network of 51
million enterprises providing employment to 117.1 million persons and contributing 37.5 per cent of
India’s GDP2
. The development of this sector is, therefore, crucial in generating significant levels of
employment across the country, more so since we have a large young and educated population which is
on lookout for employment.
MSME – Significance beyond job creation
4. While job creation is certainly critical, small businesses play a far greater role than just providing
employment. Let me state two key contributions of MSME sector here.
5.One, the MSME sector is a nursery for entrepreneurship and a school for innovation. Countless medium
and large corporates in India have evolved out of being micro and small sometime in not so distant past. I
am sure many in the audience here, who own fairly large businesses today, would have cut their teeth in
business through the route of micro and small enterprises.
6. Secondly, MSME sector is crucial for the success of the national agenda of Financial Inclusion. Let me
explain. Normally, when we talk about financial inclusion, we do so largely from the perspective of an
individual or at best a household. However, to my mind, universal financial inclusion cannot be considered
to have been achieved unless it is ensured that the micro and small businesses are financially included.
Credits to these small family run or individual run entities from the formal financial channels would make
these businesses sustainable and help them move out of poverty and propel them to a better quality of
life.
7. The surmise that I am trying to drive at is that if this is the sector that is the bulwark for such criticaldevelopmental paradigms, there are compelling enough reasons for all stakeholders- be they the
Associations, the Financial Institutions, the regulators or the Government, to put all their might together
in a convergent fashion so that the right environment is created to propel growth of MSMEs in our
country.
8. For achieving this objective, there is a need to create an ecosystem which can facilitate handholding
and nurturing of MSME units particularly at the nascent stages. Also, there is a need to eliminate a host of
impediments – of permits, of inspections, of red tape and provide a set of enablers – skill development,
infrastructure, markets, technology etc. However, of all the enablers, probably none is more important
than Credit. The IFC/Mckinsey has estimated the credit gap for formal and informal MSMEs worldwide at
around $ 3.9 trillion globally, of which $2.1 to 2.6 trillion is in emerging markets.
The ABCD of Credit
9. As I said, credit is perhaps the most critical component for MSME entrepreneurs. Provision for Credit is
essentially dependent on four pivotal issues which I would call ‘ABCD’ of credit. Let me take you through
each of them and also explain what we are doing to iron out these issues.
a) The Á of Credit –Access/Availability
10. The 4th All India survey of MSMEs states that close to 90 per cent of MSMEs are dependent on
informal sources, which by any standards is a worrisome figure. Since that survey, some headway must
have been made in improving MSMEs’ access to formal financial channels; however, it still remains a
challenge. The public sector banks today have close to 3000 specialized branches which specialize in
lending to MSME units. Private sector banks have built up products and processes, which enable quick
disbursal of loans. Most banks have switched over to centralized credit sanctioning, which enables better
turnaround time. Many others have increased the credit limits to the field level functionaries. While these
steps have improved access, there is still a huge unmet demand for credit for MSMEs. (There is a total
finance requirement of INR 32.5 trillion ($650 billion) in the MSME sector, which comprises of INR 26
trillion ($ 520 Billion) of debt demand and INR 6.5 trillion ($130 Billion) of equity demand).As per
provisional data for period ended March 2016, total outstanding loan of the banking system to MSME
sector stood at around 11.1 trillion rupees in 20.6 million loan accounts. Contrast this to the estimated
need of INR 26 trillion and number of MSMEs at 51 million.
11. An important piece of the problem is adequacy of banking outlets. Small entrepreneurs are spread
across remote locations in the country where physical bank branches are not available. Also, the banking
correspondent mechanism is yet to mature to a level where they can play a key role in credit disbursal.
Second and perhaps a more import dimension is availability of credit at a time when it is required by the
entrepreneur. Ability of small entrepreneurs to withstand life cycle shocks is extremely limited and hence
availability of timely credit becomes critical for their survival. The formal financial system, due to a variety
of reasons, which may include cumbersome procedures, lack of understanding of the business model,
inability of the entrepreneur to meet the requirements of the banks etc., is unable to meet this immediate
need of the entrepreneur.
b) ‘B’- Banks and Business
12. ‘B’ in the ‘ABCD’ paradigm of credit fundamentally refers to the information asymmetry between the
two Bs – Banks and Business.
The United States Agency for International Development (2009) defines a financially literate SME
owner/manager as “someone who knows what are the most suitable financing and financial management
options for his/her business at the various growth stages of his/her business; knows where to obtain the
most suitable products and services; and interacts with confidence with the suppliers of these products
and services. He/she is familiar with the legal and regulatory framework and his/her rights and recourse
options.”
13.I don’t think that majority of the MSME entrepreneurs in the country today meet the criterion.
Financial literacy in the context of a MSME focuses on an individual’s ability to translate financial literacy
concepts to business needs. Financial literacy is essential for effective money management and low levels
of financial literacy hinder the understanding of available financial products and services. MSE
entrepreneurs are also constrained by lack of operational skills, accounting and finance acumen, business
planning etc. which underscores a need for facilitation by banks/other agencies.
14. However, it is not a one way street. Large-scale retirements in banks in recent years have also
adversely impacted the collective skill-sets available at the field level in understanding, appraising and
monitoring the MSME loan portfolio. The poor underwriting skills leads to avoidable under or ovefinancing, which can have a telling effect on the health of the MSME units, particularly in adverse life cycle
situations.
c) ‘C’- Collateral Requirements
15. The formal financial institutions particularly banks consider lending to MSMEs as highly risky since the
entrepreneurs often do not possess adequate collateral to support the credit. Very often, the loans are
rejected, despite the project prima facie, being feasible. While there are several dispensations to tide over
the problem, the credit culture has not matured enough to a level existing in developed economies where
lending is done against the assets of the firm including its movable assets. This also necessitates that we
build up strong financial infrastructure, which would support the banks in lending to these sectors without
worries and using all types of assets available to secure the loan. It is also pertinent for banks to realise
that though the loan to the individual entities in the sector may be riskier on a solo basis, overall on a
portfolio level, these are less vulnerable than loans to corporate.
d) ‘D’- Documentation
16. Many of the MSMEs, particularly the Micro units, do not have adequate documentation to match the
rigours of a formal financial system. Absence of documentation drives the small entrepreneurs to informal
sources that are willing to provide credit with minimum documentation. Further, a vast majority of the
MSMEs are informal, which brings down the credit score of the entrepreneur and hinders the ability of the
formal financial system to lend to them. Banks, on their part will need to leverage on modern technology
algorithms and Big data so that they can differentiate between a good borrower and a not so good one
even in the absence of conventional documentation.
17. Having analysed various impediments in finance to the sector let me dwell on some of the steps
taken by RBI, Government of India and other Apex institutions in bridging these gaps.
(i) Access/ Availability
RBI has initiated several measures to improve the availability of banking services, especially in the rural
and far-flung areas where access to formal finance is arduous.
18. New institutions: As you are aware, two new universal banks have started operations while in-
principle approval has been granted to 10 entities to set up Small Finance Banks that would primarily
focus on lending to unserved and underserved sections including small business units, small and marginal
farmers, micro and small industries and unorganized
sector entities. These small finance banks have been mandated to extend 75 per cent of its Adjusted Net
Bank Credit (ANBC) to the sectors eligible for classification as priority sector lending (PSL) by the Reserve
Bank. At least 50 per cent of its loan portfolio should constitute loans and advances of up to Rs. 25 lakh.
Many of the SFBs have prior experience of working with small businesses as MFIs/NBFCs and we believe
that they will be able to bring in technology backed innovative last mile practices to serve their
customers.
19. Increased branch penetration/ Specialized branches: RBI has advised banks to set up ‘brick and
mortar’ branches in villages with population of more than 5000 in a phased manner. Coupled with a more
mature Banking Correspondent mechanism, this would give considerable fillip in meeting the banking
needs of the MSMEs particularly in rural areas. Besides, creating presence of physical branch, there is
also a need to have large number of bank officials with appropriate skill sets and knowledge to handle
the life cycle needs of the small businesses. Already, Public Sector banks have established specialized
MSME branches in every district to cater to the needs of the small businesses. We are already working
towards improving the skill sets and entrepreneurial sensitivity of the field level functionaries.
20. P2P lending: New players have entered the MSME lending landscape in form of P2P companies. These
entities use an online platform to match lenders with borrowers to provide unsecured loans and mostly for
receivables financing. P2P lending has great potential as an alternative form of low-cost finance as it can
reach to the needy where formal sources are unable to reach or unwilling to lend. RBI has been mindful of
a need to regulate these entities without stifling their ability to innovate and is currently in the process of
issuing final guidelines on P2P lending.
21. Policy intervention for Life Cycle Issues: We have advised the banks to keep a provision for
additional credit limits (Standby Credit Facility for term loans and an additional provision within the overall
working capital limits) in order to provide timely financial support to Micro and Small enterprises facing
financial difficulties during their lifecycle. Banks have also been advised to carry out mid-term review of
regular working capital limits and fix up timelines for credit decisions. I am happy to say that most banks
have put in place similar provisions in the last one year or so.
22. Co-origination of loans: While several steps have been taken to address the problems related toaccessibility, there are certain structural problems which would take their own sweet time in getting
sorted out. One of this is the issue of reaching the last mile. Much as we have encouraged the banks to
establish brick and mortar branches across remote villages, we must be conscious that they would always
be driven by viability assessments/
cost considerations. One possible solution for this problem could be convergence of efforts between banks
on one hand and the NBFCs, MFIs on the other, who have ‘feet on the ground’ in such locations, better
understanding of the local conditions and business viability, better knowledge about the credit worthiness
of individuals, their repayment capabilities etc. Could we envisage a framework for co-origination of
loans by banks and the NBFCs/MFIs with risk participation? While it would ensure skin in the game
for both parties, it would benefit the entrepreneurs in terms of cost of credit, which on account of blending
could be substantially lower. This could probably be the most ideal structure to serve the micro
enterprises who are the most deprived in terms of availability of credit.
(ii) Banks and Business
23. Let me now turn my focus to steps for bridging the information asymmetry between the banks
and the businesses. As I mentioned earlier, this is not a one-way street. Not only are the small
entrepreneurs often ignorant about banking products and practices, several bankers have little
understanding of the lifecycle credit needs of small businesses. Towards covering this base, RBI has
started a capacity building initiative called the National Mission for Capacity Building of Bankers for
financing MSME Sector (NAMCABS) in a mission mode. The field level functionaries must appreciate the
importance of two critical pillars of financing MSME sector viz., timeliness and adequacy of credit. I am
happy to state that close to 3300 officials of the banks have undergone this programme in the last one
year.
24. Credit Counsellors : For bridging the information asymmetry on the MSME borrowers side, RBI is
initiating a process for putting in place a framework for accreditation of credit counsellors who are
expected to serve as facilitators and enablers for micro and small entrepreneurs. Since MSMEs are
typically enterprises with little credit histories and with inadequate expertise in preparing financial
statements, credit counsellors will assist the borrowers in preparing their project reports and also help
banks make better informed credit decisions.
25. Revival and Rehabilitation of MSMEs: Another key step in the direction of supporting the firms in
distress is the issuance of guidelines on the Framework on Revival and Rehabilitation of MSMEs, which
provides an institutionalized framework for rehabilitation of enterprises which are potentially viable, but
are under temporary duress. The Framework provides for a structured mechanism, which could be
triggered either by the banker or by the entrepreneur at the first signs of stress. The problem resolution is
scaled up to a committee with a time bound schedule. I see this as a very powerful tool and urge upon
the bankers to get this process rolling at the earliest.
(iii) The difficult ‘C’s -Credit and Collateral
26. The issue of finding the right balance in securing a loan without pushing the borrower to informal
sector has been a bugbear for the banking system. This is sought to be addressed through creation and
development of right institutional structures. Let me delve upon some of these efforts:
27. Movable Asset Registry: Movable assets, as opposed to fixed assets such as land or buildings, often
account for most of the capital stock of private firms and comprise an especially large share for micro,
small and medium-size enterprises. Hence, movable assets are the main type of securities that firms can
pledge to obtain bank financing. I am happy to state that CERSAI, in active coordination with Government
of India and Reserve Bank has established the movable asset registry, which when mature would have a
multiplier effect in lending to the sector.
28. TReDS: In order to solve the problem of delayed payment to MSMEs, RBI has licensed three entities
for operating the Trade Receivables Discounting System (TReDS). The system would facilitate the
financing of trade receivables of MSME enterprises from corporate and other buyers, including
government departments and public sector undertakings (PSUs) through multiple financiers. The
objective is to create Electronic Bill Factoring Exchanges which could electronically accept and settle
bills so that MSMEs could encash their receivables without delay. It is expected that the TReDS will
commence operations within this current fiscal. It would be important that the use of TReDS is
made mandatory for, to begin with corporate and PSUs and later for the Government
departments. I would urge the Chambers and the MSME Ministry to proactively examine this
aspect as success of TReDS initiative can be a game changer for the sector.
29. Utility of the Credit Guarantee Scheme: Realizing the problems of small borrowers in posting
collaterals, RBI has asked the banks not to insist on collateral in case of loans up to Rs 10 lakh extendedto units in the MSE sector. Also, Credit Guarantee Fund Trust for Micro and Small Enterprises (CGTMSE)
has been set up to encourage the Member Lending Institutions to extend credit based on the viability of
the proposal rather than insisting on security or surety. Based on practical experience however, I tend to
believe that these provisions have not led to desired outcomes. Let me elaborate.
On one hand, the guideline on collateral-free loans has led banks to at times devise ways of denying
credit to the MSMEs borrowers, while on the other extreme, the provision for credit guarantee has
potential to cause deterioration in quality of credit appraisal and due diligence, consequently straining
the resources of the CGTMSE. Clearly, both outcomes are undesirable. I would rather advocate that
borrower is compensated by way of a better pricing in loan for the availability of collateral. Further, I
would also like to see the CGTMSE to evolve a framework for making the pricing risk-based rather than
having a uniform risk premium related to the past performance and quality of individual portfolios.
Eventually, this activity should also move to an open market system.
(iv)The Cumbersome ‘D’- Documentation
31. The absence of credit history and the need for documentation often pushes the micro
entrepreneur away from conventional banking channels to the more informal sectors. This has to be
addressed through a constant process of simplification of procedures and more importantly by leveraging
technology.
32. Udyami Mitra portal set up by SIDBI leverages IT architecture of Stand-Up Mitra portal and
aims at instilling ease of access to MSMEs’ financial and non-financial service needs. The Portal, as a
virtual market place endeavours to provide 'End to End' solutions not only for credit delivery but also for
the host of credit-plus services by way of hand holding support, application tracking, multiple interface
with stakeholders (i.e. banks, service providers, applicants).We could see development of more such
technological interfaces in the coming days making it easier for MSME entrepreneurs to borrow from the
banking system. RBI is committed to support such initiatives with appropriate safeguards and consumer
protection measures.
33. Role of Associations: The entrepreneur and Industry bodies have a significant role to play in
linking, maintaining and sustaining the borrower-banker relationship. This could be in handholding,
enabling and capacity building of the new entrepreneurs. As you are aware, the BCSBI has formulated a
Code of Bank's Commitment to Micro and Small Enterprises for voluntary adherence by the banks. The
industry associations must also spread awareness about various facilities available/guidelines issued by
the regulators to bridge the information asymmetry.
Conclusion
34. Let me conclude by going back to the theme of propelling growth of MSMEs. In using the term
‘propel’ you have underlined the sense of urgency that is required in this area. Our demographics compel
us to push forward this agenda and make quantum jumps so that entrepreneur can start and drive
businesses without worrying about finance. We are committed to this paradigm shift and the slew of
measures that are being taken by the RBI

Wednesday, 22 January 2020

Forex recollected questions

Forex recollected questions 

1) How many incoterms?
2) Full form of DAT
3)Few questions from doc letter of credit .
4)Nearly 8 questions on LRS
5)NRI remittances limits etc
6)Basic questions on URR 725,
7)URC 522
8)ISP 98
9)Known holiday in forex
10)One question on section of fema
11)Ecgc scheme
12)Question on customs related
13)TT buying TT selling
14)Bill discounting
15)Insurance docs in LC
16) three numericals on cross rates

Monday, 20 January 2020

IT security recollected questions on 19.01.2020

Recollected questions on IT security
19.01.2020


1. Major change in It act 2008 and IT act 2000
2. which act is ammened after CTS ? choices r Rbi a t BR act  Indian evudence act
3.It security s resoonsible fir all employes and driver is CiSO
4.Ciso will report to Hirm
5. Threat vulnerability case study
6. Threat vector
7.crime s not bcos of oppurtnty need ratiaisation answer s inteligence
8.Which metal dector is used in inland indepth
9. which metal detector cannot diferentiate metals
10. which does not comes under indepth Security
11.SQL injection
12. case study qn on Rootkit
1e.RTP
14.ROP
15.unit twating /whitebox/ blackbox testing
16. warm site/ cold site
17. COBIT developed by which agency of USA
18.which ia bench mark of Indian security stds COBIT OR IASA
19. what has to be hand over to conpany in case of Escrow arrangement- Source code
20. When it has to handover and who should demand the codes under escrow agreemnt
30.salomi technique
31. Acess control case study
32. Acess control policy is for Physical acess or al type access
33. For software protection no physical security s needed or physic security is fully needed or partly if it s a single pC.
34.Maker checker checjer has role power more than maker.
35which is cheaper RFID or Barcode reader
36. wether both bar code reader and RFID can be scanned with same scanner?
37.when a sytem ahould be Tagged with RFId as soon as it is bought or wen it is brought yo the company erc.
38. Arranging the sequence of Physical.movembt of   Hardwares like listing sequencing tagging etc. 
39. life cycle of aoftware devepmnetn lik planning devolping testing implementing and the mam twist is wether maintannce comes under life cycle of developing or the life cycl ends with inplementing only.?
40.which fire extinguisher to b used in setver room Co2
41.CAPtCha is case sensitive
42.stenography/ cryptography.
43 Malware/ spyware/ Addware/ Botner
44. wether Botnet iz a malwRe,?
45. Wanna cry is a ransomware
46. Some question was abt layers in Osi model
47.Ddos
48.dual core process
49. Trapdoor
50.Bit glass
51. Digital india aims at - bringing internet  and e governancce to all parts of society
t2. Cobit is computer governance or IT governamce
53. which ia important in bank customer data prootection along with adata centre or Only dafa centres hvng other data?
54. Atm jackpotti g
55. Green dispensor
56.Load balancing
57. wether security policy of a company is confidential or it can be known to all
58.PGP
59.Dumbster Drving
50. which technique if used for mallicious intention bcomes crime - Sniffing
60. Iso 27700 /27001/27002 _ 2 questions
61. open source application - MS word
62. PCI dss used for??
63. Iaas Paas
76. In buffef overflow attacker targets_ stack
77. secuirty to be ensured untill last mile
78. -Network attac hed storage
79. why disk duplex is better than disk miroring
80.Zeus is a malware attacking banks
81. Zombies
82.spiral model/ iterative model/ waterfall model case study
83.jitter technology
84. pDC (plan do chek)
85. which std is used for life çycle Iso/iec 5288:2008

Questions are modearaate. Taxman book is more than enough to pass. If V COMPLete Cyber crime and fraud managemnt exam before completing IT security it will be easier since 30% questions can be related.

In Taxman book at the end of Each topic few topics were given under the title "KEY WORDS". Most questions are from that.

Saturday, 18 January 2020

IT security recollected on sep 2019

IT Security Certificate  recollected on Sep 2019

Some of the recalled questions/topics are as following...

2-3 questions on Escrow
Security governance
Cert in
Major change from it act to it amendment act
BC DRP steps
2 questions on firewall
RTO
RPO
CISO reports to whom
Who are responsible for IT security
Maker checker difference
Spyware
VoIP
Black/white box testing
Salami attack
ISMS
PDC and DRC
2 questions on fault tolerant systems
Disadvantage of check list audit
2-4 questions on physical security
ITAM 2 questions
What cant be disclosed under RTI act 2005
Schema
Modem
Green server
Telnet uses which port
2-3 questions on security standards
E wastes
2-3 questions related to software development
COBIT
Threat vector
DoS
SQL
Cross site scripting
Steganography
Cryptography
Beta testing
Multiplexers
CAPTCHA
Dual core processor

IT security recollected questions on oct:2019

IT SECURITY
***********
Giv priority to Technical terms...
***************
26.10.2019 MEMORY BASED RECOLLECTED QUESTIONS
Salomi technique

Accountability- biometric login wat d user has/knows/is

Access control
Access privilege

Maker checker principle

Ciso/cfo role

Anti piracy

Thteat/vulnerability/impact

RFID radio frequency identification

Perimeter security

3 most common metal detector

Fire extinguishers

E waste

BYOT/BYOD /work from home

Commonly used sever

Router/modem/switch/gateway

White box/black box testing

Alpha/beta testing

ISO certfctn standard specifctn

COBIT

STEGNOGRAPHY/RANSOMWARE/CYBER TERRORISM/SOCIAL ENGG

DOS/DDOS

CAPTCHA

MALWARE/SPYWARE/ADWARE/ROOTKIT/BOTNETS

FASTFLUX/STUXNET

HOTSITE/WARMSITE/COLDSITE

IS AUDIT QUALIFCTNS

GUIDELINES FOR FRAUD PREVENTION

FSDC

MSME recollected questions on 28.12.2019

Investment in P&M, Equipment, Partnership, public and private limited company, Joint Hindu Family, Partnership, women entrepreneurs categories, ITCOT, US small business act, KVIC, SIDC, BCSBI loan application disposal time norm, venture capital fund, smera, cgtmse, angel funds, hybrid capital, collateral free loan, pmegp, red and green clause LC, back to back LC, 5 Cs, credit appraisal, ratios analysis and balance sheet related questions, nayak and other methods of lending,  risk types, PS targets, BDS, Tequp, RRTUFs, back ended subsidy, clusters, rehabilitation n restructuring, drt, arc, mudra, wto, clearancs for setting up unit,  items included in P&M etc... reading of entire book and updated changes is must.

Friday, 17 January 2020

Forex for individual:; RECOLLECTED



Forex for individual:; RECOLLECTED



foreign exchange facilities for individual, 2Mark's Sebi route, converter debentures, sale of immovable property, FEMA violence, JV/WOS, ESOP With Ad NRO, FD I, Tire I Capital, NRI investment, 1 Mark's question Difference Between FCNR (B) and FCNR (A), death claim, LRS investment, Rout, FFMC, NRI/ PIO sale Property, FERA cancellation, ESOP/ FCNR, Director Investment, TT, FCA ODI, Premature withdrawal NRI deposit, 0.5 Mark's questions asked Telephone Cards, Emigration, RFC D, TC, MTTS, blank money, close relative NRI, EEFC crystalline etc







Question asked in foreign exchange facilities for individual, 2Mark's Sebi route, converter debentures, sale of immovable property, FEMA violence, JV/WOS, ESOP With Ad NRO, FD I, Tire I Capital, NRI investment, 1 Mark's question Difference Between FCNR (B) and FCNR (A), death claim, LRS investment, Rout, FFMC, NRI/ PIO sale Property, FERA cancellation, ESOP/ FCNR, Director Investment, TT, FCA ODI, Premature withdrawal NRI deposit, 0.5 Mark's questions asked Telephone Cards, Emigration, RFC D, TC, MTTS, blank money, close relative NRI, EEFC crystalline etc

Micro finance 70 recollected questions



 Micro finance 70 recollected questions

Q1.C.rungrajan committee on microfinance
Q2. Breath length and depth meaning.
Q3. Difference between poverty lending approach and financial system approach.
Q4. Microfinance focus on poorest of the poor.
Q5. Nabard and it's role.
Q6. Nationalization of banks and it's purpose.
Q7.IRDP programm substitute the SJGSY program.
Q8.what is facilitater and it's role.
Q9.what is GRT group recognition test and it's purpose.
Q10.one question on Money lenders.
Q11.break even analysis and CPV analysis 3 questions.
Q12.what is microcredit.
Q13.what is microfinance.
Q14. What is sustainability.
Q15 what is BRI bank Ryat Indonesia.
Q16 .what is unit diseas.
Q17.chikola group of Kenya is example of which model.
Q18.Difference between SHG and JLG model
Q19 detailed question on grameen bank model.
 Q20. What is SHG bank linkage model...
Q22. Assumptions of grameen bank model of Bangladesh.
 Q23.diffrence between direct cost indirectcost setupcost and cost of fund.
Q24 .capital=assets-liability.
Q25.for NBFC model minimum networth requires rs.5 crore.
Q26.malegam committee and its recommendation.
Q27.qualifying assets and its significance
Q28.what is most accepted and widely usedmodel of microfinance in india.
 Q29.what is ghostborrower or multiple lending.
Q30.details of BC model.
Q31.what is reckless lending.
Q32. Details of SHG2 model part2.
 Q33. What is refinancing.
Q34. National rural livelihood mission.
 Q35 .Swarn jayanti gramin Swarojgar yojna
Q 36.what is mutual fund.
 Q37. What is merchant banking.
Q38.details of Revolving Fund.
 Q39. Financial inclusion definition and scope.
Q40. What is kyc and it's purpose
Q41 .Illiterate person can open which type of exam.
Q42 .Difference between impact accessment and social performance.
Q43.what is social rating
Q44. What is minimalist and integrated approach.
Q45.what is micro Insurance.
 Q46. Role of SEBI.
 Q47.role of IRDA.
 Q48. What is cash flow statement
.Q49. What is flat rate of interest.
 Q50. What is travel expanses.
 Q51.what is operating expense Ratio.
 Q52. What is asset depricitation.
 Q53 what is accounting stanard 2
. Q54. What is average case load.
Q55. What is Target group.
Q56. What is PAR.
Q57. What is market risk.
Q58. What is bank rate.
Q59.what is reprising risk.
 Q60. What is riskmanagement loop
Q61 what is schedule and nonshedule bank.
Q62. What is human risk.
 Q63.what is operational risk.
Q64.what is merchant banker.
 Q65. What is trading in stock exchange.
 Q66.two questions on mutual fund.
Q67.three question on Break Even Analysis.
Q68. What is regulatory risk.
 Q 69.what is Repayment rate.
 Q70.trust and Trust feed and what NBFC banking Model and what is business Correspondent model (BC Model)...... these All are 70 Recollected Questions of microfinance held on 15 july 2018. best of luck to All 

Monday, 13 January 2020

Information system for bankers recollected questions on 12.01.2020

Information system for bankers dated 12.01.2019 Morning Batch (Recollected questions from Memory)
1. ________is the most important phase before rolling the solution to production (UAT)
2. The most important idea of DRP is ________ (No disruption to services)
3. Which of the following is example of STP? (NEFT/RTGS)
4. Meaning of Truncation in CTS?
5. The settlement is managed by RBI through __________ (CCIL)
6. UPI technology is introduced by ______________ (NPCI)
7. Which among the option is responsible to make changes centrally to interest rates, charges (NBO)
8. RTGS works in the principle of (FIFO)
9. Which among the given option is not component of AIS?
10. Which among the following is a Trojan Horse?
11. Meaning of data integrity ?
12. What is the meaning of Automated Data flow to regulator?
13. Meaning of common end state?
14. Who will report the frauds done by collusive merchants who use skimmed cards at POS terminal
15. Which feature given below throws ambiguity on where the police complaint to be filed in case of online frauds? (JURISDICTION)
16. The reporting of IS audit during the audit phase, and the progress is monitored by (Audit Department)
17. GASSP principlt is for (System Security)
18. Meaning of cache memory
19. DDOS affects which attribute of information system? (Availability)
20. Artificial Intelligence falls in which generation language? (Fifth Generation)
21. Meaning of Data manipulation
22. Normalisation explanation
23. Authentication meaning
24. Which among the following is broad category of SQL (Object Oriented language)
25. Which of the following is not a logical operator (EQUAL)
26. Delineation of scope is a sub component in which phase of SDLC? (Feasibility Study)
27. Characteristics  of program construction (Robustness, Reliability, Usability etc)
28. Parallel Implementation explanation
29. Functions of Modem
30. Multiplexing technique explanation
31. Star topology explanation
32. Attenuation meaning
33. Meaning of gateway component in network
34. Which layer in OSI model is responsible for End to end message delivery (transport layer)
35. Network layer features
36. How many layers are in TCP/IP protocol (4 layer)
37. Essential idea of BCP?
38. Critical System example
39. Payroll is example of (Batch Processing)
40. Real time processing meaning
41. Which among the following is minor threat (Disk crash)
42. First Step of Disaster Life Cycle? (Preparatory Procedures)
43. When do activity of Emergency response team starts (On or after the disaster occurrence)
44. Insurance after the Disaster is taken cared by (Salvage Team)
45. Mirror Site + Hot site is for (Critical System)
46. Which is the foundation of effective BCP (BIA & Risk Assessment)
47. Effectiveness of BCP is checked only through (Checking)
48. Recovery time of 8-24 hours is characteristic s of (warm Site)
49. UPS Characteristics (online & Offline UPS)
50. Defense in path meaning
51. Meaning of BUG
52. Which of the following is example of E money? (M PESA , BITCOIN, Credit card etc)
53. Full form of PPI
54. As a security measure RBI instructed which of the following (allow international facility in Debit & credit card as per written request)
55. INFINET works in (TCP/IP based network)
56. SFMS is in line of (SWIFT)
57. OECD guidelines, integration feature explanation
58. COBIT explanation
59. Computer offences are penalized by which act?
60. Examples of detective controls
61. IS Auditors responsibility
62. Which of the following key is not associated with Cryptography (Foreign Key)
63. As per the RBI guidelines the present cards are (EMV Chip & PIN Based)
64. Stream Cipher explanation
65. End to end Encryption
66. Meaning of false positive
67. Meaning of Tuning
68. IDS are placed in which layer?
69. Which of the following is best know in the family of ISO? (ISO/IEC 27001)
70. Responsibility of information owner
71. Steps in SDLC (Ordering the steps )
72. The attack which is prone in input validation technique (Brute Force)
73. Sniffing meaning
74. What type of model is used in CBS (Relationship table)
75. Mirroring technique

Sunday, 12 January 2020

Financial needs of modern business enterprise (Working Capital)

Financial needs of modern business enterprise may be classified into two categories
(a) Fixed capital, and
(b) Working capital.
Modern Industries and capital intensive by nature and its Fixed Capital includes lands and building, Plant
and Machinery, and tools and implements.
The requirement of finance to purchase fixed capital is essentially long term in nature.
The working capital, short term in nature, is required to purchase raw materials and meet day to day
administrative and other such expenses.
There are various sources of finance for a modern industrial unit. These sources are of two types
(a) Internal sources and (b) External Sources
Internal sources include paid up capital in the form of share subscription, ploughing back of profits and
reserves.
The external sources include debenture issue, public deposits, loans from Commercial banks and other
specialized institutions.
Lending operation of the commercial banks to the Industrial Units and other Business Enterprises are
governed by the guidelines issued by the Reserve bank of India.
As mentioned above, Banks finance is largely divided into two categories , i.e Term Credit and working
capital.
Term Credit refers to the funds required for investment in fixed or permanent assets like land, building,
plants, machineries, other fixed assets etc,. Fixed Capital in the nature of Term Credit is required for the
establishment of business. Tem Credit facilities generally is allowed for longer term in nature.
Working Capital refers to the capital which is required to meet day to day expenses of the organization and
which is required to meet day to day expenses of the organization and which is employed in the current
assets like raw materials, debtors, bill-receivables etc. Thus working capital is required to utilize fixed
assets.
Working capital plays a very important role in business. It acts as a lubricant to run the wheels of fixed
assets. The effective provision and efficient utilization of working capital can lead to success of the
business.
Overview of Working Capital Assessment
Meaning of Working capital
Working capital is the amount of funds necessary to cover the cost of operating the business cycle of the
entrepreneur. This refers to the investment of the business unit in short term assets, cash, short term
securities, account receivables and inventories. It is the level of fund which a company must possess to
finance its day to day operation.
Definition: Working Capital, in banking perspective, is defined as:
❖ Funds required for acquisition of build up Current Assets generally for a period of one operating
cycle.
❖ Funds required for financing short term assets or Current Assets such as cash, Debtors and
inventories to enable business/industry to operate at the expected level.
❖ Funds required for meeting day-to-day operations like purchase of raw materials, spares & stores,
meeting manufacturing expenses like wages, power & fuel and storage & selling expenses of
finished goods etc. These expenses generally form part of Working capital or that capital of fund
which is required for keeping the wheels of production going on.
❖ Thus working capital represents the total funds required for running the operating cycle and
finance manufacturing, production and sales. Therefore it is called operating Capital or Short term
capital. Total funds required for the continuous operations of the business on a going basis.
❖ Financed as Cash Credit, Overdraft, Short Term Working Capital Loan etc,.
❖ Assessed for one year and renewed annually.
Basic Financial Concepts
1. Gross Working capital
2. Net Working Capital:
3. Working Capital Gap
A. Commercial Banks have traditionally been assessing working capital credit requirements on the
basis of the various components of chargeable assets held by a unit (i.e raw material, stocks in
process, finished goods , receivables, other current assets viz advance payments to suppliers
etc).
➢ Concept of Operating Cycle in working capital assessment
Assets which are part of the operating cycle or which get converted into cash within the operating
cycle or within one year are as:
1. Cash & Bank balance
2. Raw Material, Stock-in-Trade, Work in Progress (SIP), Stores & Spares, Finished goods.
3. Trade receivables ( Book Debts ,Sundry Debtors)
4. Advance Paid to suppliers of RM/Stock In Trade
5. Advances recoverable in cash or receivables
6. Balance with customs, Tax Authorities, port authorities, municipal authorities etc
7. Other current assets required in operations for manufacturing and trading process activity.
Operating Cycle Concept of Working Capital
The operating cycle concept of working capital envisages measurement of the average time taken by an
enterprise in manufacturing the goods and selling them for cash so that the funds can be deployed for
starting another batch of production. In other words, the operating cycle commences when cash is
initially injected into the system for purchase of the basic raw material components required for
production. The system completes one cycle when cash is realized out of the sale proceeds of finished
goods.
The process of manufacturing unit has to pass through the following stages to complete its operating
cycle.
(i) Conversion of cash into raw material –
(ii) Conversion of raw material into stock in process and to finished goods.
(iii) Conversion of finished goods into receivables/debtors or cash.
How to Measure Operating Cycle: The operating cycle is measured in terms of days of average
inventory need to be held for every major category of working capital components.
Computation of Important Concepts on the basis of Analysis of Financial Statements ( CMA)
Annual Consumption of Raw Material = Annual Purchases of Raw Material + Opening Stock of
Raw Material- Closing Stock of Raw Material.
Cost of production = Consumption of Raw Material ( Imported & Indigenous) + Consumables Spares
& Stores+ Power& Fuel+ Direct Labor+ Repairs & Maintenance+ Other manufacturing Expenses +
Depreciation+ Opening stock of SIP- Closing Stock of SIP.
Cost of production is treated as the denominator in computing the Holding Period in respect of stock
in process, while assessing working capital requirements of a manufacturing unit.
Cost of Sales (Cost of Goods Sold during an accounting year ) = Cost of production + Opening Stock of
Finished Goods- Closing Stock of Finished Goods. This is taken as denominator in the computation of
holding level of the stock of Finished Goods in the course of assessment of working capital
requirement.
Gross Sales: Gross Sales include excise component ( tax levied on manufacture of goods ).
There are various factors that need to be considered while accepting estimated Holding levels of
the various components of Working capital.
Though there are various methods used for assessing the quantum of Working
Capital Requirement for a Business Enterprise, the following are commonly used.
Broadly there are two types
(i) Balance Sheet Based (Working capital Cycle)
Under Balance Sheet Method comes, Traditional Method, Turnover method & PBS
(ii) Cash Budget Based

Saturday, 11 January 2020

The Day of the Exam: 15 Tips to Boost your Exam Performance

The Day of the Exam: 15 Tips to Boost your Exam Performance


So you’ve come all the way (with the help of GoConqr!) and tomorrow is finally the moment of truth, the day of the exam. At this stage you have studied almost all that you can study to be 100% ready for the big day. You have been planning, revising and studying and so there is little more you can do, right?

However hard you studied in the run up to exams, the most important work is yet to be done. What to do before an exam? Regardless of how much you have studied, it is possible that your exam performance may not reflect your hard work studying for hours on end. That is why we want to give you a few nigh before exam tips to maximise your performance on the day of the exam.

Exam Tip #1
Wake up early so that you do not need to rush through having breakfast and getting ready.

Exam Tip #2
Check the venue and time of the exam to make sure that you have not confused the day/time/venue.

Exam Tip #3
Have a balanced breakfast and eat nothing risky (probably not the best day to have a super-hot curry!).

Exam Tip #4
Before leaving home, check that you have everything that you will need – ID, stationery, map to the exam venue, etc.

Exam Tip #5
Head to the exam with plenty of time. A lot of unexpected events can happen on your way there and you do not want to be late!

Exam Tip #6
If there are people around who are panicking, avoid them. They are not doing you any favour!

Exam Tip #7
Go to the toilet before the exam starts. Exams can be quite long and there is no time to waste.

Exam Tip #8
Remember to write your name on the exam paper. You would not believe how many people have forgotten to do it!

Exam Tip #9
Read all the questions carefully before starting and quickly plan how much time to allocate to each.

Exam Tip #10
Start answering the questions that you feel most confident about. There is no need to answer the questions in order.

Exam Tip #11
If your brain freezes, just start writing anything and you will soon start remembering more details.

Exam Tip #12
Don’t spend more time than you planned on a particular section/question or you might run out of time to answer other questions and gain those extra marks! Also,  leave any questions that you are unsure about for the end.

Exam Tip #13
Don’t be afraid to ask the examiner if you are not clear on a question.

Exam Tip #14
Use every minute of the exam and if you have time left, review your answers before handing back the paper.

Exam Tip #15
Stay calm, you have done your homework and have nothing to fear!

Thursday, 9 January 2020

Certified auditing and accounting recollected questions

"Certified Auditing and Accounting Professional"



1. AS 21 CASE STUDY 5M
2.LFAR   CASE STUDY 5M
3.CASH flow statements 2 simple questions
4.GST plus which tax -VA7
5.1Q from MIS
6.ITEM IN SCHDULE3
7. 2 Q from BRS
8.1Q from capital and revenue expenditure
9.1Q  CAPITAL RECEIPTS
10. NPA provision related 2 q
11.3 Q from NPA types like doubt full, loss...
12.ADVANCES 5M - schedule 9
13.interest earned schdule 13
14.item in schedule 6
15.identify  which is SLR Security
16.profit on sale of investment
17.Brokarage ---Interest earned or other income?
18.assets and liabilities
19.direct tax which is incorrect
20.26QB
21.24Q,27Q, 26Q, 25Q which is incorrect

22.foresnsic audit
23.BASEL 3
24.CRAR, RWA
25.MOC
26. 15 TO 20 questions from B module of auditing in books

27.Tier 1 capital items
28.Book audit question no1 page 482
29. Book audit question no1 page 500
30.Ratio calculations
31.Book audit question no1 page 24

32.AS 7 cashflow statements

33.user of financial statements

34.stewadship accounting  page no 10

35.recognition  of income 

Wednesday, 8 January 2020

Ratio related terms abbreviations

List of abbreviations used in ratios terms
A&S Associates and Subsidiaries
Adj TNW Adjusted Tangible Net Worth
BEA Break Even Analysis
BF Bank Finance
DE Debt Equity
DSCR Debt Service Coverage Ratio
DTA Deferred Tax Asset
DTL Deferred Tax Liability
EBIDTA Earning before Interest, Depreciation, Taxation and Amortization
FACR Fixed Assets Coverage Ratio
GST Goods and Services Tax
NS Net sales
NWC Net Working Capital
OCA Other Current Assets
OCL Other Current Liabilities
PAT Profit after Tax
PBDIT Profit before Depreciation, Interest and Tax
PUC Paid up Capital
ROCE Return on Capital Employed
ROE Return on Equity
SC Sundry Creditors
TCA Total Current Assets
TNW Tangible Net Worth
TOL Total Outside Liabilities
TTA Total Tangible Assets
WC Working Capital
WDV Written Down Value

Tips to fail in exams

Tips to fail in exams::
A collection of thoughts on how
to  fail  in  written  exams  for
Promotions.  Equally  useful  for
JAIIB,  CAIIB,  Diplomas,
Certifications  and  all  Banking
Exams.

A. Always cry for time not
available. Because people
who clear exams are free in
their job or they do not
work at all. Blame them.
B. Please do not leave any
opportunity to wish your
all the known and
unknown in Groups /
Social Media. Else they
may forget you!
C. Do not buy any single book
as it is not reimbursed by
Bank. Just collect PDFs
even for books readily
available in Market at dirt
cheap prices.
D. Join all WhatsApp,
Telegram, Kaizala,
Facebook, Snapchat, Hike
Groups and Lists where
word Promotion is used.
Keep on reading all
messages.
E. If that is not enough
prepare your own Group
and keep on sharing
material in PDF, PPT from
various sources.
Knowledge is important. It
is not a copyright job of
Faculties only.
F. Collect maximum possible
eBooks in PDF and save in
a folder well organised by
topics. Don’t read any of
them You can read them
next year.
G. Keep on asking for latest
QSS in Groups. Older
edition was published in
1881 and become
obsolete in 2018.
H. Be a silent reader in
Groups you joined. Do not
ask any doubt as that may
prove you less
knowledgeable. So keep
silence.
I. Blame Group Admins for
useless Groups you joined
after a thorough search.
They should keep on
sharing eBooks, Material in
soft copy.
J. Never ever share any idea
for preparing. If you do so
you will get another and
that will create
competition.
K. Pass E-Lessons using
already available keys on
Social Media. What I know
about ETHICS is a
web-based application
used for WebCAS and
OTMS.
L. Never practice MCQs. If
you do that you get
confused of options. So
read directly answers. You
have got memory and willremember options directly.
After all Paper Setters will
copy these questions only.
M.Do not practice any
Rationale, Situation
Analysis, For & Against,
Case Study, Essay. Why I
should I develop my
writing skills! Descriptive
Exams are Disruptive!

Information system banker recollected questions

Information system banker exam.
Some questions.....shared by members

CyAT
CAA
Digital Signature
BCP
Digital forensics
Normalisation
Internal audit
DBA responsibility
Telecommunications system audit
Power off switches
Cyber terbunal judge or magistrate
DS reissuance
Central depository of DS
Audit trail significance
Bottom up methodology
Audit plan
BCP
IDS
Virtual keyboard
IFMS full from
EFT
RBIA
Inherent risk
Insider threat
IS Audit policy
Information security officer role
DBA responsibility
Stress testing
BCNF
Critical applications
Poor architecture system
SDLC
Prototyping model
RTO application
IT Act 2000
Punishment for copyright as per IT Act
Controller of Certifying Authorities operates the National Repository of Digital Signatures (NRDC)
Function of modem, which is not an OOP Lang.  C C++ Java C#, questns abt DRP, Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP
DDL DML DCL TCL commands, CA CCA-Digital certificates
Digital signature complete
Cyber apellate tribunal presiding officer
System testing
Compliance testing
Substantive testing
Telecom control
Db forms
Db commands
Risk based audit
It audit
Dba roles n resp
Prototyping model
Sdlc full
Interface testing
Rbeit ltd reg it subsidiary of rbi
Non repudiation
Bot stroke worms
Certified information System Banker

13.01.2019 3 PM Batch
Moderate Difficulty
Passing Mark 60
Each question carries 1 mark ( 100 questions )

Scored 55 marks

Recollected questions
DR centre location
Data warehouse
Audit charter/policy
Is audit 5 -10 questions
RAM and cache memory
Static RAM
Metadata
Which DB model used in CBS
Characteristics of a table
Many to Many relationship in DB
Simple ,self,outer join
Adaptive maintenance
Multiplexing
Packet switching
Full Duplex method
Bridge,router,switch,gateway
Diff between router and switch
Function of osi model layers 5 questions
Which protocol used in banking http,smtp,tcp/ip
Real time processing
Emergency response
Mirror site and reciprocal agreement
Trojan horse
E money
INFINET
CFMS
SFMS
Spoofing, piggybagging
Pervasive principle in GASSP
Classification of control
Boundary sub system
Audit trail
Attenuation
Types of noise (cross talk)
False positive and negative
Firewall
Intrusion detection systems and tuning
In what circumstances user ID and password will be given to user(emergency access)
Remote Access
OS tasks
Travelling virus procedure
Public and private key encryption

Certified Risk management recollected questions on 28.12.2019

1. Calculate geometric mean, harmonic mean.
2. Question on probability related to card.
3. Calculation of duration, mod duration and convexity.
4. Problems on forex. Spot rate given , buy and sell problem
5. Theoretical questions were also many
6. Gap calculation regard to net interest income.
7. Risk weight assets given. Calculation of cet 1, tier 2 and at 1. Tier 1 along with ccb.
8. Calculation of vertical disallowance, horizontal disallowance and capital charge of market risk.

CCP recollected questions on 25.05.2019

Credit professional Recollected questions 25/05/19
Shared by member
4 to 5 Questions on
1)LC Assessment
2) 1st And 2nd Method of Lending
3) PSLC Certificate
4) LC CIF Value
5) New restructuring upto 25 crore

Other single marker were like
Altzman Score use,
payback period,
Syndication (Club),
Diff types of LC,
 PMJDY,
exposure norms,
banks capital market exposure,
AoA, MoA,
 easy questions on DER,
Current Ratio

Saturday, 4 January 2020

BCSBI recollected

BCSBI recollected question and Exam Tips:;

Very basic questions from IIBF prescribed book
Kindly visit BCSBI site for Latest Update’s
QUESTIONS ASKED IN TODAYS BCSBI.. ( based on memory) PART 2
1. Case studies based on nominee
2. two nominees applicable in which clause.. E OR S.. or F OR S
3.BSCBI is compulsry for banks to follow or not
4. educational. loan for 25 lakhs with 10 percnt margin... how much you insist for collateral
5. same. partners for different companies... wthr right of sett off can be applied or not for one of the firms debts
6. questions on HUF KARTA
7.BANKS CHALLENGE IN IMPLEMENTING DIGITAL TECHNOLOGY
8.banks time for calling customers over phone
9. mobile phone ettiquete
10.norms.for customers to approach BCSBI for guidance for geting loan.. a the limit of the loan
11.questions on customer orientation
12. under which sectn of NI act cheques has to be paid by the bank.... to be continued

1. Customer is defined in
a. RBI Act b. NI Act c. BR Act d. KYC Policy
2. Partnership firms M/s ABC and M/s CBA has same three partners. Account of M/s ABC is overdrawn by Rs. 75,000 and the other firm’s account has Rs. 90,000 as credit balance. Can bank use the right of set off? (2 marks)
a. Can use as same partners b. Cannot set off as two different firms
Don’t remember the other options
3. In which of these circumstances bank should not disclose customer details?
a. Request under Banker’s Books Evidence Act 1891
b. Under Section 133 of Income Tax Act
c. When asked by State /Central Govt official
d. In public interest
4. A non-customer deposits Rs. 3000 to be credited to the account of Mr. Z in another station by NEFT. He had wrongly mentioned the account number and the amount is now in Bank’s suspense Account. What is the relationship between bank and Z?
a. Debtor-Creditor
b. Trustee etc
5. A document duly stamped and given by a customer authorising another person to act on his behalf
a. Power of attorney
b. Mandate
6. Incorrect statement about HUF
a. Lady member can perform the role of Karta
b. Karta and coparceners may possess self-acquired properties other than HUF property and these can be attached for HUF dues
c. On death of a coparcener, his share may be handed over to his wife, daughters and other female relatives
7. Two of three trustees approach bank to open an account and allow the two of them to operate as the third trustee is abroad. As per trust deed, trust is to be jointly operated by three of them
a. Get power of attorney from third trustee
b. Account cannot be opened since trust deed mandates operation by three trustees.
8. Borrowing powers of the Board of Directors in a company are mentioned in which document?
a. Articles of Association
b. Memorandum of association
c. Certificate of Incorporation
d. Board resolution
9. In case of fixed deposit, interest can be charged as
a. Daily basis on customer request
b. Applied monthly or bimonthly as required provided that compounded amount does not exceed the amount to be paid quarterly
c. Any periodicity requested by customer
d. Only at the end of maturity
10. FCNR accounts can be opened in ---------------- and for a period of --------
a. Any freely convertible currency with period of 5 years
b. Any freely convertible currency with period of 3 years
11. Full form of DICGC
12. Amount eligible to be transferred to DEAF
a. Any amount unclaimed in deposit account for a period of 10 years or more
b. Any amount remaining unclaimed in any account for a period of 10 years
c. Both a and b
d. Any amount unclaimed for a period of two years or more
13. In order to meet implied needs of a customer, ------------- is required from banker
a. Creativity and presence of mind
14. Good delivery constitutes which all elements ?
a. Speed, timeliness , accuracy, courtesy and concern
15. Transaction cap of mobile banking for purchase of goods and services
a. As per each bank’s rule
16. Mobile banking can be provided through
a. Mobile banking App
b. USSD
c. SIM Kit
d. SMS service
17. An asset can be classified as NPA when
a. Interest or Principal is overdue for 90 days or more
b. When CC Account is out of order for 180 days
c. When bill of exchange not honoured for 120 days etc
18. Maximum amount that can be granted under Skill Loan Scheme?
1.5 lakhs
19. In order to set up extension counter in a hospital in a Tier I city, bank needs to take approval from
a. RBI
b. No permission required
c. Ministry of Finance etc
20. Demat account can be used to hold
a. Shares
b. Mutual funds
c. Debentures
d. All of these
21. Demat account cannot be use to hold
a. Deposit to be handed over to broker
b. Exchange traded funds
c. Mutual funds etc
22. Other negotiable instruments
a. Interest warrant
b. Bankers draft etc
23. Which section of NI Act says that Bank should honour customer’s cheques?
a. Section 31
24. Not a characteristic of negotiable instruments.
a. in writing
b. date of payment must be certain
c. Transferrable
d. Duly stamped
25. Which one of the following is not a structural difference between marketing of goods and services?
a. Intangibility
b. inseparability
c. Homogeneity
d. perishability
26. Marketing Mix does not contain
a. Product
b. Price
c. Place and promotion
d. Image of the organisation
27. Which one of the following are not permitted to carry out regular transactions for customers?
a. Business correspondents
b. Business facilitators.
28. Which one of the following is not a difference in marketing goods and services?
a. Services are produced and consumed simultaneously
b. Services are intangible
c. Services provided are uniform
29. Constraints in digital banking
a. Embracing of new technology
b. Customer education
c. Safe and friendly environment
Choices are combinations of above
30. Biometric authentication in micro ATMS done by
a. Business Correspondents
b. UIDAI by biometric association with its database
31. In mobile banking for debit transactions following checks are made
a. Face to face interaction with users
b. Two factor authentication
c. End to end encryption of mPIN
Choices are combinations of above
32. Estimates committee has made recommendation that succession certificate should not be insisted where amount of credit to the depositor does not exceed Rs. 25,000. What is the correct instruction?
a. If nomination/Survivor clause is present then succession certificate should not be insisted for any amount.
33. Account opened with Anyone or survivor clause, all three of the account holders die together in an accident, the nominee has produced the death certificate and amount outstanding in account is Rs. 20,000. Action to be taken by bank
a. Ask nominee to provide Succession certificate
b. Ask nominee to provide letter of administration
c. Probate to be given
d. Transfer the money without asking for documents (a) to (c).
34. As per Goiporia committee, Enquiry or May I Help You counter should be present in
a. Head Office
b. Regional Office
c. All Urban and Metro branches
d. All branches except very small branches
35. ---------------is a matrix of different components like source of funds, level of income, volume and frequency of transactions, origin and destination of funds etc.
a. Transaction profile
b. Organisation Profile
c. Marketing Profile etc
36. Main grievances of small depositors does not include
a. Difficulty in opening of account
b. Delay in updating of passbook
c. Difficulty in closing of account
d. Account being classified as dormant/inoperative without any notice.
37. What is meant by Grievance Escalation System?
If the customer is not satisfied with the reply offered by bank, then he can approach higher authorities for redressal of grievances
38. If branch manager is not able to respond to a complaint within how many days should he escalate the matter to regional office?
7 days
39. In order to reduce the complaints filed to Banking Ombudman, what is suggested?
Appointment of internal Ombudsman
40. What all functions does not fall under customer service committee of the board?
a. Triennial audit of customer satisfaction surveys
b. Formulation of Comprehensive Deposit Policy
c. Annual Survey of customer satisfaction
d. Salary increase to employees for better customer service
41. Which of the following is not part of mandatory displays in branches?
a. Information available in booklet form
b. Details of CEO of the bank
c. Banking Ombudsman details
d. Details of Regional Manager etc
42. What does not come under COPRA Act?
a. Right against unfair trade practices
b. Right to have access to variety of goods
c. Right to free education
43. Which of the following needs are most important for a person?
a. Emotional needs
b. Interpersonal needs etc
44. Which are the three interpersonal needs?
a. Need for inclusion, Need for control and Need for affection
45. What is meant by encoding of message ?
Sender needs to use the appropriate language or expression
46. Correct order for communication.
a. Conceiving the message, Encoding the message, decoding the message and providing feedback
47. Which of the following about BCSBI is wrong?
a. Membership in BCSBI is compulsory
b. Membership is voluntary
c. Its an independent and autonomous body
d. Registered as society
48. Who has authority to approve research activities in BCSBI?
Governing Council
49. Function of Chief Executive Officer in BCSBI
a. Preparation of annual budget for submission to the Society
b. Sanction expenditure and investments of BCSBI
c. Financial and managerial powers etc
50. Who is the raison d’etre (main purpose) of BCSBI ?
a. RBI
b. common man
c. Customer service
51. BCSBI modelled on basis of which country?
UK
52. BCSBI rating of member banks is using a scoring scale of
a. High, Above average, average and below average
53. In order to get credit counselling from BCSBI which is correct
a. A fee has to be paid
b. Can apply only through member banks
c. Concerned bank is free to accept the debt restructuring plan in full or with modifications
54. Customer of a bank not a part of BCSBI can escalate complaint to
a. BCSBI
b. Banking Ombudsman
c. Customer Service Department of RBI
55. Which of the following not included under Code of Bank’s Commitment to Customers?
a. Deposit accounts
b. Remittances within India
c. Foreign Exchange services
d. Merchant banking
56. BCSBI puts following obligations on the customers?
a. No obligations
b. Obligation of customers varies from bank to bank
57. Objectives of Code of Bank’s commitments to customers?
a. Fair treatment of customers
b. Increase transparency
c. foster confidence in banking system
Choices are combinations of three
58. As per BCSBI Code regarding Do Not Call registry (Correct One)
a. Bank will not transmit unsolicited commercial information if you have registered with ‘Do not call registry’
b. Bank will enrol customer in Do Not Call Registry after 6 months of opening account etc
59. Change in interest rate on loan products will be informed within
a. Fortnight
b. One-month etc
60. As per BCSBI Code, if there is any change in fee or new fee is introduced, it will take effect
a. Retrospectively if needed
b. revised charges retrospectively and new charges after one month
c. Prospective effect after giving notice of one month
61.As per BCSBI code, In case of revision in fees it will be communicated to customer by( Incorrect option)
a. Account statements
b. Email and SMS alerts
c. TV advertisements
d. Notice board at branches
62. As per BCSBI code regarding privacy of customer(Incorrect option)
a. Bank will treat personal information as private and confidential till he is a customer of the bank
b. Bank will treat personal information as private and confidential even when he is no longer a customer of the bank.
63. As per BCSBI code on CICs, which of the following is wrong
a. Bank will provide information about credit availed by customer to CIC at periodic intervals
b. On request, will give information about CIC(s) to which details are shared
c. Bank will not share copy of credit information obtained from CIC
64. In BCSBI Code,
a. You denotes the customer and we denotes the bank
b. ‘You’ denotes the member bank and ‘We’ denote BCSBI etc
65. As per BCSBI Code, when customer makes a complaint Bank will inform the customer
a. how to do so
b. where a complaint can be made
c. Whom to approach for redressal
d. same complaint is not raised again by customer
options are combinations
66. As per BCSBI Code, for collection of dues customers should be contacted between
a. 7 hrs and 1900 hours
67. Nominee can be two persons in the case of accounts opened as
a. Either or Survivor
b. Former or survivor
c. Joint accounts with joint operation etc
68. in case of revision in minimum balance to be maintained in current account and as customer’s current account does not meet the minimum balance in the last quarter bank as per BCSBI code should
a. Inform customers 30 days in advance of any change in minimum balance
69. As per BCSBI Code, in case of inoperative/dormant accounts
a. Bank should inform three months before account is made as inoperative
b. Inform when account is made inoperative etc
70. In case of cheque collection policy, we will provide you compensation for delay in collection of instruments as per
a. Compensation policy of respective bank
b. Compensation policy of RBI
c. compensation policy of IBA etc
71. In case a cheque is lost in transit as per cheque collection policy,
a. Bank will help in obtaining duplicate cheque and offer compensation
72. In case of a cheque issued by B to A, amount in figures is Rs. 10,000 and in words is ten thousand which is striked off and written as five thousand. Alteration is duly signed by B. In that case, bank should
a. Honour the cheque and pay the amount given in figures
b. Return the cheque as material alteration is not allowed
73. As per BCSBI Code, while opening a Term deposit we will (incorrect one)
a. Get instructions from you for disposal of deposit at maturity
b. Inform about procedure to withdraw deposit before maturity
c. None of these
74. As per BCSBI code, on receiving a loan application (incorrect one)
a. acknowledges the receipt of application
b. Communicate in writing reasons for rejection of loan application
c. Provide a provisional sanction letter on receipt of loan proposal
75. As per BCSBI code, bank will return all securities/documents/title deeds to mortgaged property within --- days of the repayment of all dues
a. 15 days
76. In the event of unauthorized transaction in internet banking after customer has received means to access Internet banking, maximum liability will be
a. Full amount
b. Nil
c. Rs, 10,000/-
77. Request for cancellation/closure of credit card will be processed in
a. 7 days
78. As per BCSBI Code, prepayment penalty of fixed rate loans is waived till
a. 10 lakhs
b. 5 lakhs
c. 10 lakhs etc
79. For a unit to be classified as a sick unit, it should remain as ------------for three months or more or if there is erosion in the net worth due to accumulated losses to the extent of --- of net worth
a. NPA ,50%
b. Doubtful,50%etc
80. In small accounts, balance at any time should not exceed ---------- and total credits in a year not to exceed ----------
a. Rs. 50,000/- and Rs. 1,00,000
81. Banks can allow small accounts to operate for a period of
a. up to 1 year
b. up to 2 years
82. A customer approaches a bank for opening an account without any of the required KYC documents, bank can open
a. Small account
b. Refused to open the account
83. As per Consumer Protection Bill of 2015, cases not admitted within --- days will be deemed admitted
a. 21 days
84. Customer orientation means
85. As per BCSBI Code, when customer avails a safe deposit locker (incorrect one)
a. Bank will not link fixed deposit to allocation of lockers
b. explains all the rules of allocating a locker
c. Explain the lesser and lessee relation created
86. In case of illiterate persons, nomination can be given
a. Thumb impression to be attested by two witnesses
b. No need to authenticate thumb impression
c. Authorized official should authenticate in the presence of customer etc
87. Number of grids in grid based cheque truncation system
a. Six
b. Ten
c. Three
d. Four
88. In order to provide customer satisfaction, bank should
a. Hire new staff in place of retirees
b. Staff to be trained in handling complaints
c. Deploy more staff in counters
etc

Cyber crime recollected questions

Recollected questions:
Cyber crimes are handled by which orgnanisation in india
Type 1 crime
Preventive control
Detective control
Detterant control
Logical control
Sections and their fine with imprisonment in years
Committes of it security ,it governance, it controls
Netra by which organisation
Fast flux
Stux net
Phising
Shoulder surfing
Digital signature
Oldest agency in india
Few questions on cert in
Passive attack
Active attack
Direct attack
In direct attack
Logic bomb
Zeus
India own operating system boss in under whom
Confidentiality
Availability
Integrity
Conventional crime
Cyber crime
Same features of conv and cyber crime
Tailgating
imp topics are  1differences between viruses and worm
2 it act
3 different types of cyber crimes
4 various types of cards
5 gate way payment
6 prevention and detection control
7 pss act
8 2 tier authentication
9 passive and active attacks
mostly questions from 2  and 3 and 4...units

 Cyber terrorism
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites

Digital banking recollected

Digital banking recollected

Aeps

Nach

Upi

Virtual keyboard to safegaurd against keylogger

4 questions on process of chargeback

Nfc technology and RFID

Approx 8-10 question on security of POS terminals

2 que on MDR

What is cash withdrawal through pos called

Many questions were there from BC

, POS,

off us,

 on us transactions,

  pharming attack,

phishing attack,

 ATM skimming,

 business risk,

 memory scrapping,

 jackpotting,

 Financial inclusion,

Dispute Management System,

CTS,

Digital marketing,

 internet banking 2FA

, AEPS,

Keylogger Virtual keyboard,

Pinterest ,

Graffiti,

OOH,

brown level ATM,

 ekyc ,

FI is backed by       

wat is Graffiti.                                                 

wat is CRM customer Relationship Management.                                                         one questions on fraud in ATM card and Internet banking.                                                  wat is RTGS and Next generation RTGS

wat is Rupay Paysecure Solution.            Benefits of Rupay Card.                              wat is NACH and it's Role.                         

ABPS and NACH diffrence.                           .wat is ASA and KSA.                                     .one question on NFS and EKYC.              Offus and OnUs transaction Diffrence.  RTGS and NgTGS.                                 

NG rtgs works on ISO 20022.                      wat is CCIL clearing Corporation of India it's Role and Functions.                                        wat is Diffrence between DVP-lll (Delivery vs payment and Payment Vs Delivey) System..

 Diffrence between Compliance and convenience.          masquerading and Cyber mugging.   

wat is Jeckpotting.                                        wat is MILTDOWN and Spectrame.                  One question on Telebanking.                MMID and MPlpin wat Digit MMID 4 Digit                                                               

  wat is giftcard prepaid card and store value card diffrences.                                    .credit and charge card diffrences.           .questions on magnetic strip card EMV chipbased card.                                                     questuons on what Document requires for Representment in prearbitration process......                                                             operating system hardening is a Application server risk.                                       diffrence between Enduser risk and application server risk.                                   wat is mobile device risk.                             wat is Identity Theft.                                   Difference between Basic Phishing and Spear phishing. . ......

Digital banking Recollected Questions on 1st July 2018 paper.... 1.cyber mugging 2.Miltdown & Spectrate. 3.what is Jeckpotting in ATM. 4.NPCI.... 5.CCIL one question. 6 .one question on CIA confidentiality Availability and Integrity. 7 .one separete question on only Integrity. 8.what is Plastic card. 9.one question on prepaid card. 10.wat is single purpose and multy purpose Cards.                                                    11.diffrence between credit and charge card. 12.wat are benefit for using virtual key board. 13.diffrence between Emv chip card and Magnetic strip cards. 14.diffrence between NFC near feild communication and RFID Radio frequency Identifications...... 15.diffrence between openscheme (4th Party and 3rd party close scheme.....

Digital banking Recollected Questions on 1 July 2018.............                                    16.one Questions on MDR.                                 17.diffrence between transaction processing clearing and settlement.          18.one separate question on CTS and Clearing.                                                                19.wat is phishing Pharming and Cyber mugging.                                                                 20.one question on Aadhar  bridge system for giving Subsidy.                                                21 which is not a 24*7 system IMPS NPCI UPI or USSD.                                                           22.one question on what is SFMS.                 23.diffrence between In Us and Off Is ATM 24.wat is difference between IMPS and IMT.                                                                         25.diffrence between CDM ATM and POS

1 July Digital Banking Paper Recollected Questions.                                      26.diffrence between white and Brown level ATM.                                                           27.diiffrence between Clearing and Settlement process.                                           28.wat is keystroke Logging and benefits of vitual key board.                                            29.wat is difference between business Declines and technical Declines.                         30.difference between authorization and Settlement process.                                           31.wat is limit of chargebeck-90 days.       32.one question on prearbiration process and dispute management Collette.                    33.one question on smshing and Phishing attack.......                                                             34 diffrence between malware and Torzan.  35.wat is *99*99# and it's benefit.                   36 .mobile wallets are prepaid or postpaid.       37.one question on OTP and TWO factor Authonthication process.                                     38.What is end-user risk.                                     39.wat is mobile device risk.                                 40 one question on Spearphishing.                   41 .wat is query service on Aadhar Mapper.42.one question on firewell and intrusions detection system.                                                 43.diiffrence between encryption and Decryption.                                                        44.diffrence between GPRS and PSTN POS 45.diffrence between portable and Pooled terminal.                                                                   46.one question only on Mobile POS.          47.wat is EKYC and it's benefits.                         48.wat is Terminal Management System.    49.wat is Mural-Advertising.                                50.wat is OOH out of home.....

Recollected Questions on Digital Banking Paper 1 July. .51.wat is Graffiti. 52.wat is CRM customer Relationship Management. 53.one questions on fraud in ATM card and Internet banking. 54.wat is RTGS and Next generation RTGS 55.wat is Rupay Paysecure Solution. 56.Benefits of Rupay Card. 57.wat is NACH and it's Role. 58.ABPS and NACH diffrence. 59.wat is ASA and KSA. 60.one question on NFS and EKYC. 61. Offus and OnUs transaction Diffrence. 62.RTGS and NgTGS. 63.NG rtgs works on ISO 20022. 64.wat is CCIL clearing Corporation of India it's Role and Functions. 65 .wat is Diffrence between DVP-lll (Delivery vs payment and Payment Vs Delivey) System..

Recollected Questions. 66.diffrence between Compliance and Convenience. 67.masquerading and Cyber mugging. 68.wat is Jeckpotting. 69.wat is MILTDOWN and Spectrame. 70.one question on Telebanking. 71.MMID and MPlpin wat Digit MMID 4 Digit 72.wat is giftcard prepaid card and store value card diffrences. 73.credit and charge card diffrences. 74.questions on magnetic strip card EMV chipbased card.                                                       75.questuons on what Document requires for Representment in prearbitration process...... 76.operating system hardening is a Application server risk. 77.diffrence between Enduser risk and application server risk. 78.wat is mobile device risk. 79.wat is Identity Theft. 80.Difference between Basic Phishing and Spear phishing. . ......

 Q81.what is SSL full form and it's signal turns into which colour green blue Aur Red. Q82.one Drawback of Smishing. Q.83.the process of remain hidden Online is called..... Q.84.what is Back and Access.... Q 86.one question on Cash Advance. Q87.wat is diffrence between VOID and Refund. Q 88.SFMS. Q 89.Encoding deciding Difference.. Q90..wat is Rootkit. Q 91.Social engineering. Q 92.diffrence between IDS and IPS. Q.93.OTP and Two fector Authonthication. Q.94.KeyStroke Loggers