Friday, 3 January 2020

Single link for recollected questions on July 2019 iibf exams

In today's microfinance exam questions from,
1. Chikola group
2. Rrb bank established in the year
3. Rbi act, rrb act,
4. Bank rakyat Indonesia
5. Malegam committee recommendation
6. Shg bank linkage program
7. Sewa bank
8. Break even analysis also named as
9. As 2 deals with
10. Examples of cash flow like travel expenses interest expenses
11. 2 numericals from break even anaysis
12.average case load formula
13. Question from relationship risk
12.



Recollected Questions 21.07.2019 IT security recollected on 21.07.2019
ROBO backup
Skimmer and shimmer
RFID and Barcode shortcomings
ISO 27001
After Jillani committee 1996
What IT act took place
Downstream liability
Routers
A/B testing
VoiP eavesdropping
User level controls
PCI DSS
HIPAA
Defence in Depth
Green servers
Blade servers
E -wastes
Scavenging
ATM jitter
Mobile banking
TCP IP
VLAN
Cyptography
Steganography
IDS DNS
CLOUD computing
Threats
Vulnerability
SQL Injection
Cyber terrorism
Viruses worms
Malware
Stuxnet
Fault tolerence
Business continuity and Disaster recovery


DTP

Many case studies were there - calculations of duration,MD,convexity, mclr related problem, cal of market, credit risk weighted assets,

CTP

Certified treasurey professional questions dated 14.7.19
Friends to be honest paper was easy compared with the one dated 27.4.19
The following are the questions given
Numerical related to
FRA
Commercial paper numericals around 6-7 and also individual questions related to cp and cd such has issuers and maximum limit and minim limit and
Questions related to various measures of options : delta , gamma,rho,
Numericals on bond prices
Numericals of auctions
Dutch auction
French auction
Novation definition
Liquidity related questions
Direct quote
Reinvestment risk
Futures
Qustions related to bond yield
Transfer pricing
ECB
Option coupon bond
Zero coupon bond
The questions were mostly numericals so pleae go through the reference book
All d best friends

ISB

information System Banker Recollected questions
CyAT
CAA
Digital Signature
BCP
Digital forensics
Normalisation
Internal audit
DBA responsibility
Telecommunications system audit
Power off switches
Cyber terbunal judge or magistrate
DS reissuance
Central depository of DS
Audit trail significance
Bottom up methodology
Audit plan
BCP
IDS
Virtual keyboard
IFMS full from
EFT
RBIA
Inherent risk
Insider threat
IS Audit policy
Information security officer role
DBA responsibility
Stress testing
BCNF
Critical applications
Poor architecture system
SDLC
Prototyping model
RTO application
IT Act 2000
Punishment for copyright as per IT Act
Controller of Certifying Authorities operates the National Repository of Digital Signatures (NRDC)
Function of modem, which is not an OOP Lang. C C++ Java C#, questns abt DRP, Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP
DDL DML DCL TCL commands, CA CCA-Digital certificates
Digital signature complete
Cyber apellate tribunal presiding officer
System testing
Compliance testing
Substantive testing
Telecom control
Db forms
Db commands
Risk based audit
It audit
Dba roles n resp
Prototyping model
Sdlc full
Interface testing
Rbeit ltd reg it subsidiary of rbi
Non repudiation
Bot stroke worms
Certified information System Banker

13.01.2019 3 PM Batch
Moderate Difficulty
Passing Mark 60
Each question carries 1 mark ( 100 questions )

Scored 55 marks

Recollected questions
DR centre location
Data warehouse
Audit charter/policy
Is audit 5 -10 questions
RAM and cache memory
Static RAM
Metadata
Which DB model used in CBS
Characteristics of a table
Many to Many relationship in DB
Simple ,self,outer join
Adaptive maintenance
Multiplexing
Packet switching
Full Duplex method
Bridge,router,switch,gateway
Diff between router and switch
Function of osi model layers 5 questions
Which protocol used in banking http,smtp,tcp/ip
Real time processing
Emergency response
Mirror site and reciprocal agreement
Trojan horse
E money
INFINET
CFMS
SFMS
Spoofing, piggybagging
Pervasive principle in GASSP
Classification of control
Boundary sub system
Audit trail
Attenuation
Types of noise (cross talk)
False positive and negative
Firewall
Intrusion detection systems and tuning
In what circumstances user ID and password will be given to user(emergency access)
Remote Access
OS tasks
Travelling virus procedure
Public and private key encryption

ISB Recollected Questions and Exam Tips june18::::

Function of modem, which is not an OOP Lang.
C C++ Java C#, questns abt DRP,
Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP


International trade finance today's recollected

Its all about Limits on various transaction, FEMA Schedule:I, II, III, LRS, JV/WOS, different FC A/c and their purpose. Reading Macmillan BOOK thoroughly is sufficient to clear the Exam.

[08/07, 07:28] Ara: Vostro account
[08/07, 07:28] Ara: ECB is a form of bank loan, suppliers credit, buyer credit
[08/07, 07:28] Ara: Standby letter of credit is under ucp600 or ucp600 ,isp
[08/07, 07:28] Ara: Bill of Ladding 2 questions, export bill crystallization, guarantee maximum period, exim Bank duties 2mark, Duration of bill realisation, PCFC value above export order, deemed exporter, if domestic price increases above export price...
[08/07, 07:28] Ara: Deemed export 2 ques
[08/07, 07:28] Ara: Bank guarantee under
[08/07, 07:28] Ara: Lrs scheme available to individuals upto USD 250000 not to corporate, partnership, huf, trust
[08/07, 07:28] Ara: Buyer credit linked to Libor/ mibor
[08/07, 07:28] Ara: Documents should be presented within 21 days from
[08/07, 07:30] Ara: If the maturity date is a holiday then it should be presented before the date or after holiday
[08/07, 07:38] Ara: Merchant trade should be completed within 9 months
[08/07, 07:41] Ara: What is clean payment
[08/07, 07:41] Ara: High sea sale
[08/07, 07:42] Ara: Trade blog 1 que
[08/07, 07:43] Ara: Normal transist period is from the port to destination port or from manufacturing to destination port
[08/07, 07:47] Ara: India export rice in exchange of petrol, Diesel this is theory of comparative advantage , heckscher ohlin theory, theory of absolute advantage
[08/07, 07:50] Ara: In trade within country which is common as international trade. Dap ,Daa LC
[08/07, 08:00] Ara: Factoring forfeiting 4 questions
[08/07, 08:06] Ara: Transfer LC
[08/07, 08:11] Ara: Foreign exchange governed by dgft RBI, exim bank,
[08/07, 08:14] Ara: Lc is given on Fob value
[08/07, 08:20] Ara: If ABC company is having bank guarantee with x bank and they are entering to contract with y to supply goods and if ABC company fails what bank will do a) pay to y on the value of entered or b) pay a guarantee amount
[08/07, 08:21] Ara: Pre shipment 360 days
[08/07, 08:21] Ara: Preshipment interest is given upto 180 days
[08/07, 08:27] Ara: Bank guarantee should not be issued more than 10 yrs
[08/07, 08:29] Ara: Status holder are classified from one to five star
[08/07, 08:29] Ara: Softex is used for software export
[08/07, 08:36] Ara: Advance remittance up to usd200000

[08/07, 08:39] Ara: ABC company is dealing with goods and banking with x � bank , it buys goods from y and for y company x bank willing to finance is it a) vendor finance b) channel finance
[08/07, 08:49] Ara: Three , four star export house
[08/07, 08:54] Ara: Export of goods freely upto RS 500000
[08/07, 08:57] Ara: Project contractors after completion of project abroad may import without an authorisation good including capital goods used in project provided they have been used for atleast 1 yrs
[08/07, 08:58] Ara: Duty exemption scheme
[08/07, 08:59] Ara: Duty drawback scheme


[08/07, 09:03] Ara: Arbitration
[08/07, 09:03] Ara: Speculation
[08/07, 09:05] Ara: If on Oct 3 transaction is settled on Oct 5 assuming Oct 3,4,5 is working day this is a) spot b) forward c ) future d) ready
International Trade Finance exam yesterday.

Bill of Ladding 2 questions, export bill crystallization, guarantee maximum period, exim Bank duties 2mark, Duration of bill realisation,PCFC value above export order, deemed exporter, if domestic price increases above export price... Some more questions which I recollected.

 Thanks

Trade Finance Recollected Questions: Preshipment, Post shipment Finance, PCFC, Forfaiting, EXIM Bank, FTP, Trade Blocs, ECGC Confirmation, DEPB Scheme, EPCG, Limitation Clause, ECNOS full form, Combined Transport Document, Gift Exports limit, Adv payment limit on Import, Bonafide Baggage period, Drawback, Merchanting TradeTrade, Domestic Trade types.


 digital banking recollected
Jackpotting
Emv and non emv
Abps and aeps
Financial exclusion concept
10 questions on cards
Frauds like skimming etc
Risk based 5 questions
Mpin based 3 questions
Card dimension
8 straight forward questions from book
Confusing ones as all questions have 2 anwers type...be carefull before marking answers
Digital banking todays recollected questions

Otp full from
Pharming  attack on internet website's 
Mom and pop means
Technology solution in India which is not part of FI
Cyber mugging
X2x service code
Pos terminals related questions
Dimensions of plastic card
Difference between  gprs pos and pstn  pos
First pos mc developer in india
Chargeback related questions
Jackpotting in atm means
Meltdown and spectre means
Nfs managed by npci situated at
In Forex settlement the rupee leg is settled through

If I recollect I will append pls


Ccp-
Questions were conceptual. Really difficult questions from LG and LC. Questions from Syndication and MBA -5. LC - no numericals only conceptual case study 5 no. Syndication and Consortium -5 . EPS -5, IBC -5 , and questions covering the whole book. Interesting fact - none of this answer was the right answer nearly 15 -20 questions. Very confusioning

· Cleared CCP today.. Questions were from msme service n manufacturing sector, Npv and irr difference, eps calculation, calculation of tnw-1, minor question-2,case study on huf , bcsbi -2 questions, case study on lc and asked to select type of lc, max period of BG, deferred payment guarantee, cersai is done under, cersai is used for, break even point calculation-1,standard deviation on investment,time value for money etc...
· Forex operations review and Recollected exam
· 
· 
· 
· Usance Period
· 
· sanction of fresh/enhanced export credit limits should be made within 45
· 
· Limit for export under OPGSP
· 
· Schedule III of FEMA
· 
· Remittance exceeding USD10Mio per project consultancy service in respect of Infra Projects
· 
· commission to an agents abroad for sale of residential flats-USD25000 or 5% of inward remittance
· 
· reimbursement of pre-incorporation expenses
· 
· Donation - 1% or USD 5Mio
· 
· Pan mandatory for all LRS remittance
· 
· LRS reporting - Daily Basis
· 
· LRS not applicable to HUF,Partnership form, Trust
· 
· 2 new Incoterms incorporated in 2010
· 
· export realisation period
· 
· collectin bill
· 
· rate application from transfer from NRE to FCNR
· 
· who issue SOFTEX form
· 
· fedai last meetings
· 
· advance remittances toward imports of services are permitter without any limit
· 
· question on accruals in the account should be converted into rupees into rupee on last day of succeeding
· 
· month
· 
· who can open SNRR account
· 
· How much INR can be taken outside Inida
· 
· Export of gift articles not exceeding 5 lacs
· 
· NRO account Foreign nationals should not exceed more than 6 months
· 
· Vostro account is funded through which Form1/2/3/4
· 
· when we sent MT707
· 
· Travellers proceedings to which countries not exceeding USD 300 per visit
· 
· Target of FTP2015-20 export target of $900 billion by 2019-20
· 
· Article 13 of UCP 600
· 
· Green clause credit
· 
· Commercial invoice should be signed and dated
· 
· 10-12 questions on ECB,FDI,ODI
· 
· 3-4 questions on FTP
· 
· 
· 
·  Questions asked from UCP 600, LOC, LRS, FTP 2015- 2020, ECGC, PTA, ECB, etc.
· 
· 
· 
· Cleard Foreign Exchange Operations Exam today..paper was little bit tricky..no numericals, no case studies..just theoretical but concept based questions..ECB,FTP,LC,LRS,ECGC,EXIM, pre & post shipment are the some areas which covers more than half of the question paper.
· 
· 
· 
· 
· 
· 
· 
· forex operation question 27.10.2018
· 
· 
· 
· fro nre to fcnr which rate apply
· 
· as per latest what is mandatory for lrs "pan"
· 
· how much invest in jv - 400%
· 
· coprporate donate what amount - 1% of forex earning or $5 m which ever is less
· 
· one from high seas sale
· 
· marine insurance policy indemnity se related
· 
· fedai rate declare which rate in month end
· 
· one is ralated to var and fbil
· 
· if forward is more than spot then what - interest on base less than counter
· 
· regarding lou and loc - ans is both are dicontinued
· 
· one is if there is no loc and lou then what is the option for importer
· 
· one forfaiting
· 
· what is requirement to be an exporter
· 
· if account is standard then in which case there is no need to report ecgc before disbursement
· 
· ek bpo se related
· 
· one is from eefc
· 
· one is for tt buying
· 
· ftp target for 2020
· 
· advane under import of services without guarntee - $ 5 lakh
· 
· condition for granting loan against nri deposit
· 
· lc amendment- mt707
· 
· one from urbdg 758
· 
· urr 722
· 
· one from demand guarantee
· 
· standby lc
· 
· one is lc term prevail against sanction ye ans h question i forget
· 
· if lc not require transport , invoice then what - option given not remember
· 
· incoter added in 2010 - dap dat
· 
· one is if in lc there is no presentation date only expiry given then what will be presentation date
· 
· for what we can not issue lc
· 
· if lc is in fob then import licence what we endorse option - cif exw fob
· 
· who issue softex forms
· 
· one is edi port - sdf
· 
· if some mistake in shippong bill then what will appraising officer do - mark and point to commisioner
· 
· 
· 
· ~forex operation question 27.10.2018
· 
· fro nre to fcnr which rate apply
· 
· 
· 
· as per latest what is mandatory for lrs "pan"
· 
· 
· 
· how much invest in jv - 400%
· 
· 
· 
· coprporate donate what amount - 1% of forex earning or $5 m which ever is less
· 
· 
· 
· one from high seas sale
· 
· 
· 
· marine insurance policy indemnity se related
· 
· 
· 
· fedai rate declare which rate in month end
· 
· 
· 
· one is ralated to var and fbil
· 
· 
· 
· if forward is more than spot then what - interest on base less than counter
· 
· 
· 
· regarding lou and loc - ans is both are dicontinued
· 
· 
· 
· one is if there is no loc and lou then what is the option for importer
· 
· 
· 
· one forfaiting
· 
· 
· 
· what is requirement to be an exporter
· 
· 
· 
· if account is standard then in which case there is no need to report ecgc before disbursement
· 
· 
· 
· ek bpo se related
· 
· 
· 
· one is from eefc
· 
· 
· 
· one is for tt buying
· 
· 
· 
· ftp target for 2020
· 
· 
· 
· advane under import of services without guarntee - $ 5 lakh
· 
· 
· 
· condition for granting loan against nri deposit
· 
· 
· 
· lc amendment- mt707
· 
· 
· 
· one from urbdg 758
· 
· 
· 
· 
· 
· urr 722
· 
· 
· 
· one from demand guarantee
· 
· 
· 
· standby lc
· 
· one is lc term prevail against sanction ye ans h question i forget
· 
· 
· 
· if lc not require transport , invoice then what - option given not remember
· 
· 
· 
· incoter added in 2010 - dap dat
· 
· 
· 
· one is if in lc there is no presentation date only expiry given then what will be presentation date
· 
· 
· 
· for what we can not issue lc
· 
· 
· 
· if lc is in fob then import licence what we endorse option - cif exw fob
· 
· 
· 
· who issue softex forms
· 
· one is edi port - sdf
· 
· 
· 
· if some mistake in shippong bill then what will appraising officer do - mark and point to commisioner
· 
· 
· 
· 
· 
· Foreign Exchange Operations Recollected question (27/10/18)-
· 
· 1. LRS scheme availble to?
· 
· 2. question abt Gift/donation.
· 
· 3. one abt medical treatment?
· 
· 4. PAN mandatory in LRS?
· 
· 5. travellers limit 3000USD per visit or per annum?
· 
· 6. foreign currency not permissible to- Nepal
· 
· 7. forward contract limit- USD 1 million
· 
· 8. question on RFC ac.
· 
· 9. direct question on PIO.
· 
· 10. whi can open SNRR ac
· 
· 11. question abt prohibited investment.
· 
· 12. what is green clause lc.
· 
· 13. question on tolerance limit in Lc.
· 
· 14. question abt advising bank.
· 
· 15. question abt MT707.
· 
· 16. 3-4 question abt bill of lading.
· 
· 17. 2 new INCOTERMS.
· 
· 18. SOFTEX form.
· 
· 19. export to warehouse question.
· 
· 20. 5-7 indirect question abt pre and post shipment.
· 
· 21. question on forfaiting.
· 
· 22. question on bill of entry.
· 
· 23. 2-3 question on trade credit.
· 
· 24. 1 question abt nature of transaction and rate applied.
· 
· 25. 1 abt ECIB(WTPC)
· 
· 26. 1 question on standby credit.
· 
· 27. LRS statement submission.
· 
· 28. normal transit period
· 
· 
· 
· 29. ECB cost ceiling.
· 

Wednesday, 1 January 2020

Cyber crime and fraud management recollected on 28.12.2019


Cyber crime and fraud management recollected on 28.12.2019


Recollected questions:
Cyber crimes are handled by which orgnanisation in india
Type 1 crime
Preventive control
Detective control
Detterant control
Logical control
Sections and their fine with imprisonment in years
Committes of it security ,it governance, it controls
Netra by which organisation
Fast flux
Stux net
Phising
Shoulder surfing
Digital signature
Oldest agency in india
Few questions on cert in
Passive attack
Active attack
Direct attack
In direct attack
Logic bomb
Zeus
India own operating system boss in under whom
Confidentiality
Availability
Integrity
Conventional crime
Cyber crime
Same features of conv and cyber crime
Tailgating
imp topics are  1differences between viruses and worm
2 it act
3 different types of cyber crimes
4 various types of cards
5 gate way payment
6 prevention and detection control
7 pss act
8 2 tier authentication
9 passive and active attacks
mostly questions from 2  and 3 and 4...units

 Cyber terrorism
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites

Monday, 30 December 2019

Types of endorsement

Types of Endorsements:-

1)     Blank Endorsements: section 16(1) it means endorser only signs his name with adding any words or directions this endorsement makes the instrument payable to bearer.

2)     Endorsement in Full: - The endorser added the name of endorsee specifically.

3)     Conditional Endorsement: Here the endorser puts some conditions for endorsee Here the binding of conditions is between endorsee and endorser only.

4)     San recourse Endorsement: - Endorser added the words without recourse to me.

5)     Facultative Endorsement: - Where an endorser waives the condition of notice of dishonour.

6)     Endorsement on Bearer Cheque: - The endorsement on bearer cheque is meaning less as the cheque once bearer is always bear.

Crossing:-

General Crossing (Sec.123): Two parallel transverse lines on the face of instruments with or without word ‘Not negotiable’. It is direction to the paying bank that do not pay the cheque across the counter.

Special Crossing (Sec.124): In addition of general crossing the cheque bears the name of collecting bank either with or without the words ‘Not negotiable’.

Collection of cheques:-

Section 131: a banker who has in good faith and without negligence received payment for a customer of a cheque (not available for B/E and P/N) crossed generally or specially.  The present section gives protection provided following conditions are fulfilled…

a)    The bank must have acted in good faith and without negligence.

b)    Bank has received the payment as an agent for collection.

c)    Bank has collected the cheque in the duly introduced account of customer only.

d)    The cheque collected must be crossed.

Payment of cheques:-

Liability of drawee (paying banker): It is obligation of the banker to honour the cheques of a customer provided there is sufficient balance and the cheque is otherwise in order.  Section 31 of NI act provides that “The Drawee of a cheque:

a)    Must have sufficient funds in the account.

b)    Properly applicable to the payment of such cheque.

c)    Must pay the cheque when duly required to do so.

d)    In default of such payment, must compensate the drawer for any loss or damage.

Protection for paying banker in case of cheque:-

Regularity of endorsement Section 85(1): Paying banker’s liability is to ensure the regularity of the endorsement and is not concerned with genuineness of endorsement.  The genuineness of endorsement is the liability of collecting banker.  Therefore, protection is available to the paying banker in case of forged endorsements.

Payment in due course (Section-10):-

a)    In accordance with the apparent tenor of the instrument.

b)    In good faith and without negligence.

c)    To the person in possession of the instrument.

d)    Under the circumstances which do not afford a reasonable ground for believing that he is not entitled to receive the payment of the amount mentioned therein.

When bank should not pay:-

a)    The death of the drawer in case of individual’s account terminates the contractual relationship.

b)    Insane customers: in case of insanity.

c)    Insolvent drawers: The bank should stop the operation of such account as if drawer adjudged insolvent and balance in the account vested with official receiver/assignee.

d)    Countermanded by drawer: on receipt of valid stop payment instruction by the drawer.

e)    Others: when a cheque is post dated, with insufficient balance in the account, cheque is of doubtful legality, or cheque is irregular, ambiguous, materially altered or stale etc.

Dishonour of cheques (Sec. 138-147):-

The payee or holder in due course should give notice to drawer within 30 days of return of cheque with the reason “Insufficient balance” and demanding payment within 15 days of his receiving information of dishonour. Drawee can make payment within 15 days of the receipt of notice and only if he fails to do so prosecution could take place.  The complaint is to be made with in one month of the cause of action arising that is expiry of the notice period.

Punishments:

a)    Summary proceedings: fine up to Rs. 5000/- and imprisonment up to one year or both.

b)    Regular proceedings: fine up to the double the amount of cheque or imprisonment up to 2 years or both.

Sunday, 29 December 2019

Green Banking

Green Banking
Green Banking is when a normal bank takes into consideration all the social and environmental factors
while carrying on its basic operation of lending and raising deposits. It is also called ethical banking.
Green banks are regulated by the same authorities as traditional banks and have to abide by
the same rules.
All banks play an intermediary role in the economy; because of this the possibility for banks
contributing to sustainable development is high.
Banks can adopt a ‘carrot-and-stick’ approach, where environmental and social front-runners
would pay less interest than the market price for borrowing capital, while environmental
laggards would pay a much higher interest rate.
Some areas in which green banking is being adopted by banks are:
i. Online Banking facility and mobile banking– helps in saving paper, energy and
expenditure of natural resources.
ii. Green checking accounts like ATMs, Self-Service Kiosks, special touch screens.
iii. Supporting environmental friendly residential projects by offering various concessions
both for the project and individuals who avail home loans.
iv. Using solar and wind energy by installing wind mills for captive use.
v. Installing solar powered ATMs.
vi. Going in for rain water harvesting in their premises.

Whatvis priority lending certificate

What is priority lending certificate?
The priority sector lending certificates are certificates issued by banks that have over reached their priority sector
lending targets. PSLCs thus can be issued only up to the extent of their over lending to the stipulated sectors. Buyers of
PSLCs are usually those banks who could not meet their priority sector lending targets. The price of PSLCs will be
determined on the basis of demand and supply that will be reflected in the auction under the RBI‟s e-Kuber training
platform.
As per RBI guidelines, Banks can issue four types of PSLCS including three subsector PSLCs – agriculture, small and
marginal farmers, micor enterprises and one PSLC for general.

RBI plans to set up a ‘college of supervision’ (BL 27.12.19)

RBI plans to set up a ‘college of supervision’ (BL 27.12.19)



To ensure that irregularities in the financial sector, which are increasingly becoming complex and interconnected, do not escape the attention of its inspectors, the Reserve Bank of India is planning to set up a ‘college of supervision’. “Skill imparting is not a one-time affair. They (inspectors) have to be re-skilled from time-to-time because things are evolving, things are changing, becoming more complex. So, more emphasis can be given on improvement of skills. “...And, therefore, for better training, we are creating a college of supervision. We are also creating within the Department of Supervision and Regulation, an internal research and analysis group,” said RBI Governor Shaktikanta Das, during an interaction. The proposed college will improve the skillset of inspectors so that when they assess risk in regulated entities such as banks, non-banking finance companies, urban co-operative banks and payment system providers, they are mindful of the lurking dangers. This move comes in the backdrop of the letter of undertaking scam at Punjab National Bank, the IL&FS group and DHFL defaulting on debt servicing, and Punjab and Maharashtra Co-operative Bank being brought to its knees due to a large irregular exposure to a real estate company. Post these developments, the RBI created a unified Department of Supervision and a unified Department of Regulation. Earlier, there were three separate supervision departments (one each for banking, non-banking and co-operative banks) and three separate regulation departments (one each for banking, banking and co-operative banks).