Professional Documents
Culture Documents
KYC AML
BCSBI
1. If bank avail third party service for providing support, then third party will handle customer info with
different degree – False
2. Changes in interest rate of any product should be notified within how many days – 30
3. If customer wants to transfer active account to another branch, then what will u do
a. Transfer account within 30 days
b. Get self declaration on current address
4. What will u do in the event of delay or failure of executing instruction – Compensate customer
5. Premature withdrawl on deposit allowed – True
6. If customer wants bank to accept third party guarantor
a. Get confidential report on guarantor
b. Inform guarantor
7. A and B are joint holder, X is nominee and b dies, settlement of money will be done – Payable to A and
legal heirs of B jointly
8. Lonn details of customer are available to which institution – CIC and CERSAI
9. Bank should issue and activated and ready to Credit Card – False
10. If bank declare to shut down branch, then 2 months advance notice should be given - True
1. Bank’s Email id or other online tool should be avoided for ____ use – Personal
2. Which of the following can be considered to be necessary piece of information in order to avoid a
social media policy breach – All of the above
3. Always be aware of the bank’s service condition, statutory and regulatory guidelines, business ethics
etc, before randomly commenting on any issue – True
4. Objective for team barodians community page – all of the above
5. Team mate and co-workers should communicate and interact with each other gracefully without
crossing the line of basic - etiquettes
1. You should be aware of scam pages pretending to be official pages which may ask for _____ and then
send them to hackers – Personal Data
2. Never install of download any _____ from internet without written permission and validation by IT
department -Software
3. Email security risk includes attachment , scams , viruses – True
4. An email can contain infected attachment. if u ______ on a suspicious attachment, you risk infecting
system – Double tap/click
5. You should _____ reveal sensitive information about your company - Never
6. ____acts as a security barrier between a company’s private network and all external public facing
networks – Firewall
7. User should avoid unsafe surfing and ____ to the configuration setting on the computer established by
the IT department – adhere
8. When you are not around, _____ the confidential papers or removable media – Lock Up
9. Which of the online source may contain virus – download files from internet or web pages
10. The term phishing is most closely associated with - Identity Theft
1. I should use same password for both my private email account and the company business login – False
2. Virus may play prank or stop computer from working, but nowadays theycompromise security in more
dangerous way-
a. Virus spread by email
b. Deleting data
c. Corrupting data
3. Which of the following statement depict good password practice – my cat older than 9
4. In order to avoid loss and ensure the confidentiality of electronic information – True
5. It is important to use _____ program and scan all external media before opening - Antivirus
6. Your computer is protected by firewall and antivirus, what you have to do to effectively protect
computer – All the response
7. As a good practice which one of the following should be followed – Password should be confidential
8. Which of the following statement is correct – All the response
9. How do you know whether your computer is infected by a virus – Unplug the network cable
10. What is the biggest security risk associated with internet surfing – Virus infection
Preventive Vigilance
Rajbhasa