Professional Documents
Culture Documents
2. What is the timeframe for taking a decision on suspicious transactions pointed out by RFIA / SARG.
A: One month
3. The General Manager of Fraud Monitoring Cell (FMC), FPMD at Corporate Centre will be Nodal Officer,
of the Bank, for sending request of opening LOC to the Bureau of Immigration
7. SBI has developed a strategy to share customer information database between offices in two countries.
In this situation, it is MOST important to ensure (Negative Marking)
Data is encrypted in transit and at rest
Data sharing complies with local laws and regulation at both locations
A nondisclosure agreement is signed
Risk coverage is split between the two locations sharing data
10. Which is the most appropriate method to prevent unauthorized access to your desktop if you are leaving
your workstation for a short duration (Negative Marking)
Lock the Desktop using Windows Key + L
11. Who is the Designated Officer for receiving complaint under Whistle Blower Policy
12. Which of the following provide fixed income (Bond) price for valuationon a daily basis.
RBI
FBIL
SEBI
FEDAI
13. With reference to LGD, what is the difference between F-IRB and A-IRB
F-IRB permits to use prescribed LGD estimates and A-IRB permits to use own internal LGD
estimates.
A-IRB permits to use prescribed LGD estimates and F-IRB permits to use own internal LGD estimates
Both approaches allows to use internal LGD estmates
Both approaches are same, no difference
16. A landless labour having no document of identity and address proof approaches your branch for opening
of an account. What will you do
Option A. Will open the account after obtaining self attested….
17. In measuring the capital requirements for General Market Risk, which are designed to capture rge risk
of loss arising out of changes in the market interest rates which are the two principal methods
Optimum and Marginal
18. The Bank has approved _____ for handling Cyber Security incidents.
Cyber Security Policy and Standards and a SOP
19. Which of the following provide fixed income (Bond) price for valuation on a daily basis
SEBI
20. With respect to LGD, what is the difference between F-IRB and A-IRB
F-IRB permits to use prescribed LGD estimates and A-IRB permits to use own internal LGD
estimates
23. Wef 30 June 2019, applicable risk weightage for Unrated Corporate exposure above Rs.200 crores
1.5
25. Minimum total capital including CCB increased from 9.0% to ____ under Basel III
0.121
26. Monitoring of top Single and Group Borrowers in the Bank helps in mitigating which of the following risks
Credit Concentration Risk
27. Hackers get into the company’s systems and steal valuable data
Operational risk
28. Do we have policies on how / what you can and cannot use email for?
Yes, there are policies limiting what emails I can and cannot send while at work
29. The success of a computer forensic investigation depends on the concept of?
Chain of evidence
30. Which of the following refers to a series of characters used to verify a user’s identity?
Password
31. When an incident of suspected fraudulent activity comes to notice, who will take a prima facie view on
it?
Respective Controller
32. __________ involves using electronic means, including the Internet, to harass a person or a group of
people.
Cyberstalking
33. In a Banks SME loan portfolios, 200 accounts are NPA, amounting to 400 crores. Out of this recovery
could be made only in 100 accounts amounting to 300 crores. What will be the LGD of the portfolios?
0.5
34. Who is the Nodal Officer responsible for vetting the complaint and ensuring that it is as per the prescribed
checklist before reporting the case to CBI
CVO
40. For non-advance frauds, 100% provision will be made in the same ______
Quarter
41. Who is the competent authority for identification of fraud for cases below 5.00 lac
FIC at circles and Bus
42. Probability that borrower will fail to meet his contractual obligation due to borrower specific or market
specific reasons is called
Default Risk
44. Cash retention limit exceeding at a branch on many occasions is an example of key indicator
TRUE
45. As per RBI guidelines the probable loss over 10 day horizon for calculating VaR at ______ confidence
level
0.95
46. What is the risk weigh for AAA rated foreign sovereigns?
15
48. Authority to approve the market risk management policy of the Bank is
Risk management committee of the board
49. Risks falling under High Risk and Critical Risk categories
Exceed the risk tolerance levels and need to be monitored
50. Suspected Fraud portal contains details of accounts which are suspected as fraudulent by the auditors
under RFIA. The portal is maintained by
CPM Deptt
51. On cancellation of PGEL, on any Foreign Bank, the existing exposure is allowed to be continued till
Maturity of the exposure
54. Operational controls are commonly utilized in which of the following risk mitigation strategies
Avoid the risk
55. Which category of Agri loans can be covered as MUDRA loans under PMMY
All of the above
57. Unexpected Loss is calculated based upon a determined confidence level of ____ of assumed correlation
amongst exposure etc
Equivalent to 99.95%
58. As per bank’s IS policy, User account should be locked out automatically after ____ consecutive
unsuccessful login attempts.
3
59. The three Basel III pillars are _____, ______ and Market Discipline
Minimum capital requirements, Supervisory Reserve Process
60. The main exemptions which would normally be applicable to the Bank are
All of the above
62. A dashboard for fraud prone branches has been developed and made available to controllers by
Data Analytics Department, GITC
63. To prevent or timely identify fraudulent disposal of mortgage property Bank has mandated
Both 1 & 2 are correct
64. Which of the following is a potential fraud risk
All the three
66. Within __ days of appointment, the Insolvency Resolution Professional makes a public announcement,
inviting all the potential creditors to file claim
7 days
68. Which one of the following transactions does not make any economic sense
Having large number of accounts with the same bank with frequent transfers between different
accounts
72. Which of the following is the effective way to mitigate the risk of confidential data leakage to unauthorized
stakeholders?
Implement role based access controls
76. RBI has made mandatory to upload the KYC data to CKYCR is case of
Individual account and legal entity and during the time of KYC updation
77. Which of the following is the indicator of suspicious transactions in a customer account
All of the above
78. The CRA should be reviewed at half yearly intervals for the units
Having CRA SB-10 and worse
83. All accounts to be simultaneously examined from angle of possible fraud, when the account are classified
as NPA for limits above Rs crore
50
85. What action to be taken in cases where suo moto proceedings initiated by investigating agencies eg CBI
Decision too be taken on case to case basis
86. Investments carried out by the Bank shall fall into the following brad categories
Both a & B
87. Which of the following is not amongst the top Information Security Risk?
Distributed Denial of Service
89. In suspected fraud cases reported by RFIA, decision as Fraud or No Fraud to be taken by the FIC within
the time
1 month
90. Classification of frauds such as (i) Misappropriation and Criminal Breach of trust, (ii) cheating and forgery
etc are based on various sections of IPC
TRUE
91. In assessing the key variables associated with a potential mortgage loan, a bank will charge a higher
interest rate if the borrower has a relatively
High loan to value ratios