Tuesday, 29 December 2020

Cyber fraud and prevention Recollected questions

 

Cyber fraud and management:: preventionss
Recollected questions:
Cyber crimes are handled by which orgnanisation in india
Type 1 crime
Preventive control
Detective control
Detterant control
Logical control
Sections and their fine with imprisonment in years
Committes of it security ,it governance, it controls
Netra by which organisation
Fast flux
Stux net 
Phising 
Shoulder surfing
Digital signature 
Oldest agency in india
Few questions on cert in
Passive attack
Active attack
Direct attack
In direct attack
Logic bomb
Zeus
India own operating system boss in under whom
Confidentiality
Availability 
Integrity
Conventional crime
Cyber crime
Same features of conv and cyber crime
Tailgating
imp topics are  1differences between viruses and worm
2 it act
3 different types of cyber crimes
4 various types of cards 
5 gate way payment
6 prevention and detection control
7 pss act
8 2 tier authentication
9 passive and active attacks
mostly questions from 2  and 3 and 4...units


 Cyber terrorism
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security 
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites

BCSBI Recollected question and Exam Tips

 

BCSBI recollected question and Exam Tips:;

Very basic questions from IIBF prescribed book
Kindly visit BCSBI site for Latest Update’s
QUESTIONS ASKED IN TODAYS BCSBI.. ( based on memory) PART 2
1. Case studies based on nominee
2. two nominees applicable in which clause.. E OR S.. or F OR S
3.BSCBI is compulsry for banks to follow or not
4. educational. loan for 25 lakhs with 10 percnt margin... how much you insist for collateral
5. same. partners for different companies... wthr right of sett off can be applied or not for one of the firms debts
6. questions on HUF KARTA
7.BANKS CHALLENGE IN IMPLEMENTING DIGITAL TECHNOLOGY
8.banks time for calling customers over phone
9. mobile phone ettiquete
10.norms.for customers to approach BCSBI for guidance for geting loan.. a the limit of the loan
11.questions on customer orientation
12. under which sectn of NI act cheques has to be paid by the bank.... to be continued


1. Customer is defined in 
a. RBI Act b. NI Act c. BR Act d. KYC Policy 
2. Partnership firms M/s ABC and M/s CBA has same three partners. Account of M/s ABC is overdrawn by Rs. 75,000 and the other firm’s account has Rs. 90,000 as credit balance. Can bank use the right of set off? (2 marks) 
a. Can use as same partners b. Cannot set off as two different firms 
Don’t remember the other options
3. In which of these circumstances bank should not disclose customer details?
a. Request under Banker’s Books Evidence Act 1891
b. Under Section 133 of Income Tax Act
c. When asked by State /Central Govt official
d. In public interest 
4. A non-customer deposits Rs. 3000 to be credited to the account of Mr. Z in another station by NEFT. He had wrongly mentioned the account number and the amount is now in Bank’s suspense Account. What is the relationship between bank and Z?
a. Debtor-Creditor
b. Trustee etc 
5. A document duly stamped and given by a customer authorising another person to act on his behalf 
a. Power of attorney 
b. Mandate 
6. Incorrect statement about HUF 
a. Lady member can perform the role of Karta 
b. Karta and coparceners may possess self-acquired properties other than HUF property and these can be attached for HUF dues
c. On death of a coparcener, his share may be handed over to his wife, daughters and other female relatives 
7. Two of three trustees approach bank to open an account and allow the two of them to operate as the third trustee is abroad. As per trust deed, trust is to be jointly operated by three of them 
a. Get power of attorney from third trustee 
b. Account cannot be opened since trust deed mandates operation by three trustees.
8. Borrowing powers of the Board of Directors in a company are mentioned in which document?
a. Articles of Association
b. Memorandum of association
c. Certificate of Incorporation
d. Board resolution
9. In case of fixed deposit, interest can be charged as 
a. Daily basis on customer request 
b. Applied monthly or bimonthly as required provided that compounded amount does not exceed the amount to be paid quarterly 
c. Any periodicity requested by customer
d. Only at the end of maturity 
10. FCNR accounts can be opened in ---------------- and for a period of --------
a. Any freely convertible currency with period of 5 years
b. Any freely convertible currency with period of 3 years
11. Full form of DICGC 
12. Amount eligible to be transferred to DEAF
a. Any amount unclaimed in deposit account for a period of 10 years or more
b. Any amount remaining unclaimed in any account for a period of 10 years
c. Both a and b 
d. Any amount unclaimed for a period of two years or more 
13. In order to meet implied needs of a customer, ------------- is required from banker
a. Creativity and presence of mind
14. Good delivery constitutes which all elements ? 
a. Speed, timeliness , accuracy, courtesy and concern 
15. Transaction cap of mobile banking for purchase of goods and services 
a. As per each bank’s rule 
16. Mobile banking can be provided through 
a. Mobile banking App
b. USSD
c. SIM Kit
d. SMS service 
17. An asset can be classified as NPA when 
a. Interest or Principal is overdue for 90 days or more 
b. When CC Account is out of order for 180 days
c. When bill of exchange not honoured for 120 days etc 
18. Maximum amount that can be granted under Skill Loan Scheme?
1.5 lakhs
19. In order to set up extension counter in a hospital in a Tier I city, bank needs to take approval from 
a. RBI
b. No permission required 
c. Ministry of Finance etc 
20. Demat account can be used to hold 
a. Shares
b. Mutual funds 
c. Debentures
d. All of these 
21. Demat account cannot be use to hold 
a. Deposit to be handed over to broker
b. Exchange traded funds
c. Mutual funds etc 
22. Other negotiable instruments 
a. Interest warrant 
b. Bankers draft etc 
23. Which section of NI Act says that Bank should honour customer’s cheques?
a. Section 31 
24. Not a characteristic of negotiable instruments.
a. in writing
b. date of payment must be certain
c. Transferrable
d. Duly stamped
25. Which one of the following is not a structural difference between marketing of goods and services?
a. Intangibility
b. inseparability
c. Homogeneity
d. perishability
26. Marketing Mix does not contain
a. Product
b. Price
c. Place and promotion
d. Image of the organisation
27. Which one of the following are not permitted to carry out regular transactions for customers?
a. Business correspondents 
b. Business facilitators.
28. Which one of the following is not a difference in marketing goods and services?
a. Services are produced and consumed simultaneously
b. Services are intangible
c. Services provided are uniform
29. Constraints in digital banking 
a. Embracing of new technology
b. Customer education
c. Safe and friendly environment 
Choices are combinations of above
30. Biometric authentication in micro ATMS done by 
a. Business Correspondents
b. UIDAI by biometric association with its database
31. In mobile banking for debit transactions following checks are made
a. Face to face interaction with users 
b. Two factor authentication
c. End to end encryption of mPIN
Choices are combinations of above 
32. Estimates committee has made recommendation that succession certificate should not be insisted where amount of credit to the depositor does not exceed Rs. 25,000. What is the correct instruction?
a. If nomination/Survivor clause is present then succession certificate should not be insisted for any amount. 
33. Account opened with Anyone or survivor clause, all three of the account holders die together in an accident, the nominee has produced the death certificate and amount outstanding in account is Rs. 20,000. Action to be taken by bank
a. Ask nominee to provide Succession certificate 
b. Ask nominee to provide letter of administration
c. Probate to be given
d. Transfer the money without asking for documents (a) to (c).
34. As per Goiporia committee, Enquiry or May I Help You counter should be present in 
a. Head Office
b. Regional Office
c. All Urban and Metro branches
d. All branches except very small branches 
35. ---------------is a matrix of different components like source of funds, level of income, volume and frequency of transactions, origin and destination of funds etc. 
a. Transaction profile
b. Organisation Profile
c. Marketing Profile etc 
36. Main grievances of small depositors does not include
a. Difficulty in opening of account 
b. Delay in updating of passbook
c. Difficulty in closing of account
d. Account being classified as dormant/inoperative without any notice. 
37. What is meant by Grievance Escalation System?
If the customer is not satisfied with the reply offered by bank, then he can approach higher authorities for redressal of grievances
38. If branch manager is not able to respond to a complaint within how many days should he escalate the matter to regional office?
7 days 
39. In order to reduce the complaints filed to Banking Ombudman, what is suggested?
Appointment of internal Ombudsman
40. What all functions does not fall under customer service committee of the board?
a. Triennial audit of customer satisfaction surveys
b. Formulation of Comprehensive Deposit Policy 
c. Annual Survey of customer satisfaction
d. Salary increase to employees for better customer service
41. Which of the following is not part of mandatory displays in branches?
a. Information available in booklet form
b. Details of CEO of the bank
c. Banking Ombudsman details
d. Details of Regional Manager etc
42. What does not come under COPRA Act?
a. Right against unfair trade practices
b. Right to have access to variety of goods
c. Right to free education
43. Which of the following needs are most important for a person?
a. Emotional needs
b. Interpersonal needs etc 
44. Which are the three interpersonal needs?
a. Need for inclusion, Need for control and Need for affection
45. What is meant by encoding of message ?
Sender needs to use the appropriate language or expression
46. Correct order for communication.
a. Conceiving the message, Encoding the message, decoding the message and providing feedback
47. Which of the following about BCSBI is wrong?
a. Membership in BCSBI is compulsory
b. Membership is voluntary 
c. Its an independent and autonomous body
d. Registered as society
48. Who has authority to approve research activities in BCSBI?
Governing Council
49. Function of Chief Executive Officer in BCSBI 
a. Preparation of annual budget for submission to the Society
b. Sanction expenditure and investments of BCSBI
c. Financial and managerial powers etc
50. Who is the raison d’etre (main purpose) of BCSBI ?
a. RBI 
b. common man
c. Customer service 
51. BCSBI modelled on basis of which country?
UK
52. BCSBI rating of member banks is using a scoring scale of 
a. High, Above average, average and below average
53. In order to get credit counselling from BCSBI which is correct 
a. A fee has to be paid
b. Can apply only through member banks 
c. Concerned bank is free to accept the debt restructuring plan in full or with modifications
54. Customer of a bank not a part of BCSBI can escalate complaint to 
a. BCSBI
b. Banking Ombudsman
c. Customer Service Department of RBI
55. Which of the following not included under Code of Bank’s Commitment to Customers?
a. Deposit accounts
b. Remittances within India
c. Foreign Exchange services
d. Merchant banking
56. BCSBI puts following obligations on the customers?
a. No obligations
b. Obligation of customers varies from bank to bank 
57. Objectives of Code of Bank’s commitments to customers?
a. Fair treatment of customers
b. Increase transparency
c. foster confidence in banking system
Choices are combinations of three 
58. As per BCSBI Code regarding Do Not Call registry (Correct One)
a. Bank will not transmit unsolicited commercial information if you have registered with ‘Do not call registry’
b. Bank will enrol customer in Do Not Call Registry after 6 months of opening account etc 
59. Change in interest rate on loan products will be informed within 
a. Fortnight 
b. One-month etc 
60. As per BCSBI Code, if there is any change in fee or new fee is introduced, it will take effect 
a. Retrospectively if needed
b. revised charges retrospectively and new charges after one month
c. Prospective effect after giving notice of one month
61.As per BCSBI code, In case of revision in fees it will be communicated to customer by( Incorrect option)
a. Account statements
b. Email and SMS alerts 
c. TV advertisements 
d. Notice board at branches 
62. As per BCSBI code regarding privacy of customer(Incorrect option)
a. Bank will treat personal information as private and confidential till he is a customer of the bank
b. Bank will treat personal information as private and confidential even when he is no longer a customer of the bank. 
63. As per BCSBI code on CICs, which of the following is wrong 
a. Bank will provide information about credit availed by customer to CIC at periodic intervals
b. On request, will give information about CIC(s) to which details are shared
c. Bank will not share copy of credit information obtained from CIC 
64. In BCSBI Code, 
a. You denotes the customer and we denotes the bank
b. ‘You’ denotes the member bank and ‘We’ denote BCSBI etc 
65. As per BCSBI Code, when customer makes a complaint Bank will inform the customer
a. how to do so 
b. where a complaint can be made
c. Whom to approach for redressal 
d. same complaint is not raised again by customer 
options are combinations
66. As per BCSBI Code, for collection of dues customers should be contacted between 
a. 7 hrs and 1900 hours 
67. Nominee can be two persons in the case of accounts opened as 
a. Either or Survivor
b. Former or survivor
c. Joint accounts with joint operation etc 
68. in case of revision in minimum balance to be maintained in current account and as customer’s current account does not meet the minimum balance in the last quarter bank as per BCSBI code should 
a. Inform customers 30 days in advance of any change in minimum balance
69. As per BCSBI Code, in case of inoperative/dormant accounts
a. Bank should inform three months before account is made as inoperative
b. Inform when account is made inoperative etc 
70. In case of cheque collection policy, we will provide you compensation for delay in collection of instruments as per 
a. Compensation policy of respective bank
b. Compensation policy of RBI
c. compensation policy of IBA etc 
71. In case a cheque is lost in transit as per cheque collection policy,
a. Bank will help in obtaining duplicate cheque and offer compensation
72. In case of a cheque issued by B to A, amount in figures is Rs. 10,000 and in words is ten thousand which is striked off and written as five thousand. Alteration is duly signed by B. In that case, bank should 
a. Honour the cheque and pay the amount given in figures
b. Return the cheque as material alteration is not allowed
73. As per BCSBI Code, while opening a Term deposit we will (incorrect one)
a. Get instructions from you for disposal of deposit at maturity 
b. Inform about procedure to withdraw deposit before maturity
c. None of these
74. As per BCSBI code, on receiving a loan application (incorrect one)
a. acknowledges the receipt of application
b. Communicate in writing reasons for rejection of loan application
c. Provide a provisional sanction letter on receipt of loan proposal
75. As per BCSBI code, bank will return all securities/documents/title deeds to mortgaged property within --- days of the repayment of all dues
a. 15 days 
76. In the event of unauthorized transaction in internet banking after customer has received means to access Internet banking, maximum liability will be 
a. Full amount 
b. Nil 
c. Rs, 10,000/- 
77. Request for cancellation/closure of credit card will be processed in 
a. 7 days 
78. As per BCSBI Code, prepayment penalty of fixed rate loans is waived till 
a. 10 lakhs 
b. 5 lakhs
c. 10 lakhs etc 
79. For a unit to be classified as a sick unit, it should remain as ------------for three months or more or if there is erosion in the net worth due to accumulated losses to the extent of --- of net worth 
a. NPA ,50%
b. Doubtful,50%etc 
80. In small accounts, balance at any time should not exceed ---------- and total credits in a year not to exceed ----------
a. Rs. 50,000/- and Rs. 1,00,000
81. Banks can allow small accounts to operate for a period of 
a. up to 1 year 
b. up to 2 years 
82. A customer approaches a bank for opening an account without any of the required KYC documents, bank can open 
a. Small account 
b. Refused to open the account 
83. As per Consumer Protection Bill of 2015, cases not admitted within --- days will be deemed admitted 
a. 21 days 
84. Customer orientation means 
85. As per BCSBI Code, when customer avails a safe deposit locker (incorrect one)
a. Bank will not link fixed deposit to allocation of lockers
b. explains all the rules of allocating a locker
c. Explain the lesser and lessee relation created 
86. In case of illiterate persons, nomination can be given 
a. Thumb impression to be attested by two witnesses
b. No need to authenticate thumb impression
c. Authorized official should authenticate in the presence of customer etc 
87. Number of grids in grid based cheque truncation system 
a. Six
b. Ten 
c. Three 
d. Four 
88. In order to provide customer satisfaction, bank should 
a. Hire new staff in place of retirees 
b. Staff to be trained in handling complaints 
c. Deploy more staff in counters 
etc

KYC AML Recollected Questions and Exam Tips

AMLKYC   Recollected Questions and Exam Tips::::




Kindly focus on case studies in Macmillan, international organization for AML, FATF  latest recommendations,PMLA act latest developments, Reports sent to FIU_IND





1.high medium low risk categories kyc review period 3 questions came directly
2.Gave example of transactions and asked wat type of money laundering is that-funnel accts,deposit structuring,multiple tier account 3ques
3.IBA study group paper published 3 questions from that
4.Placment,layering, integration 1 case study each topic
5.hawala is wat type of ml
6.ml word is coined by the guardian in -watergate scandal
7.FIU IND based questions 6-8
8.5-7case studies one came from text book itself
9.OVD based questions 3
10.given options with type of customer and the documents they submit and asked which customer is eligible for opening sb
11.reporting entity have-designated director
12.designated director is appointed by