You are on page 1of 4
2e9 B) ‘THE INSTITUTE OF BANKERS, BANGLADESH (BB) 96% Banking Professional Examination, 2023 AIBB Information and Communication Technology in Financial Institutions (ctr), Subject Code : Time—3 hours Full marks—100 Pass marks—45 [N.B. The figures in the right margin indicate full marks. Answer any, five questions.J Marks. (@ What is software? Discuss about application software and 1+6=7 ‘system software with five example from each. (6) Why ICT is important for modern banking? 4 (c) What are the functionalities of a CPU? What is Cache memory? 3+1=4 (d) What is the use case of DBMS in a bank? A bank have 2+3=5 employees with information NAME, DESIGNATION, ID, SALARY. Draw a simple database table with example where ID is the primary key. 2. fa) Mention four systems in Bangladesh for sending fund transfer 1+4=5 instruction? What is the technology behind a bank’s user can withdraw cash using another bank’s ATM? Explain. _-(6) How ATM works in case of cash withdrawal? Describe with a 7 flow chart. . AE What are the modes of Agent banking? How Agent banking is 1+3=4 /-~ contributing in Financial Inclusion? (d) How does a hacker phising a website to get ID and password? 3+1=4 What measure should be done to protect it? done to minimize the ICT risk in a bank? (6) What are the difference between call center and contact center? 3+2=5 Define CDM and CRM. (c) How an OTP can secure an e-commerce transaction? 3 (d) What are differences between internet and intranet? 3 (e) Discuss about MFS. What is G2P in MFS? 3+1=4 7 (a) What are the types of Data Center (DC)? Write down the 1+3=4 / :) What is multifactor authentication? What measure should be 2+3=5 requirements of Tier-3 Data center. (6) What is Disaster Recovery (DR)? What the i: ake 14+2=3 trade off while designing BRS? > en (© Write down the advantages and” disadv. : antages of electronic 8 (@ Difference between incremental backup and differential 3+2=5 backup. Why backup is important? Ps [Please turn over We, Scanned with CamScanner Marks (a) Which type of software is necded to protect malware at Pc? 2+2=4 Write with examples what is firewall? a fit e local disk? 'b) What are the benefits of SAN storage over . s 8 Why data classification is necessary for a bank? Classify the 245=7 following data into Public, Private, Internal, Confident Restricted mode : . | Name, Agreement, Employee ID. NID, | Strategic ee Address, Proprietary, Financial Record, Email Address an ‘Address. : ; (d) What are roles of ERP, CBS, AML and switching software in 7 the banking? : , 4 (a) Discuss Threat Vs Risk in IT security domain. orden (b) Define Skimming and Jackpotting with respect to ATM. (c) Explain the following terms with the impact in modern 2+2=4 banking. (i) DDOS (if) Ransom ware. (d) How problem is differing from incident? Explain a bank has 3+5=8 been faced a cyber incident. How does the bank manage this incident? : (a) What is digital signature? Where and why it is used? 6 (0) “ICT involves huge cost.” Is it expense or investment? 8 Explain in the context of modern banking. (c) Discuss about Artificial Intelligence (Al). 6 (a) Mention two global IT’ security standards and two global IT 2+3=5 security frameworks. Differentiate among policy, standard and procedure. (8) Describe four common cyber crime activities in banking? 4 (c) Which below components are not asset? Software, Hardware, 2 A process, Personnel, A Program and a Product. (d@) Differentiate among Identification, Authentication and 3 Authorization with example. . (e) “Email is one of the key ways to exploit Vulnerabilities," 6 Justify the statement. ‘ (a) What is Cloud Computing? Do you think that bank can move 2+6=8 to cloud? Justified your answer. (4) What are the technologies behind 4'" Indu: i =! (AIR)? Differentiate between RegTech and Suptean voto 28s © Explain the importance of Security Operation Center (SOC) in 5 (d) What stands for USSD, API, DMZ, MICR? Write short notes on any four (04) of the following : (a) LAN (6) Crypto Currency . . (c) Phishing (d) BYOD Controls (e) PCIDSS . ) IR. ~ — 2 5x4=20 Scanned with CamScanner 3 tater erat ea fr tl nay wr or re HR AAT OH | AT CERT AEE EAE wat wed 31 @) aabewrT Ay acer ABST aan FbH HAbSMTA ICR OH COTTA Aros VareTPTy AUG FAT | 8 (&) ore ore TRAM caPHIT CT? es st) FRRE en CaftiBorR Ae war creat 2 : ~ © ae Bremer at BT A aah TCT NAME, 2+0=¢ DESIGNATION, ID, SALARY S27& WAR I Heer GBT CBARET STA SAAT CUM ID eR 1 _ 21) aeTeTot wafer gras Rohit wrath Poor Bart TTI aes 34+8=¢ SRT TAMA GAT TCA afPat GIR EA ATT CRA Safe She ATT PAT | (a) ata Scat cron ATM Mere re Fore aD GAIA At a SrA () cord ania, at gB cae H Sy acerd THAR Fore salle d40=8 BBGSUS Sealy AAR? (3) TRAE aa amené Net UT are Ber ert ae o+d=8 area foe ea? af HT FACS B Teal cua Vio? 1%) pie ia ote a café GRC (ICT) BS Fares H BAA Vro=¢ aat 8602 @ ser BI aay FOS CTBT aa TET aMferTTR FH Br CDM GR 0+2=¢ CRM aeeafite TPA (a) OTP terea-3 wart GrCTCAA Patrat eal wea? (a) SBCA aR BENG ca ae eTR A Me © (6) ama RAT AE ACTA FHA | TARA G2P A? w+d=8 81(®) wert (DC) at aeacemAR a Fr Teo CITT s+0=8 ACEP TR o t (a) fSarcm fieort Fe DRS arena EHD eace FF frTT d4Q=0 facawara Free ea? (a) Berar arf as at @ OMT EAT TT | v () Beart seat ax Sect seat at weg aes wre ST | GIVI COT CHAT? C1 (*) Pitre rem efegs FAS CHA HATTA APDGWIA eae? Q+2=8 Borreertry frye | ras eaTeT A? (@) Gre fe at CUI SAN Gorae aa BrP H Ae g @) aa oe at oy Be afer ar acne? PRPS g+¢=9- Public, Private, Internal, Confidential 42 Restricted wr: aM, Be, «i ay ee eee ee a) Trea Sarat (ERP), (CBS), 4 : sooner Geet Se fat (CBS), 4am (AML) eR Habe A 4 oa [br aes Scanned with CamScanner 4 at wt (@) BA Fateret corner caS (Threat) TPT fire (Risk) SIMO 8 eral (2) ATM 6 rt Pie eg prety AREAS HT 4858 (ot) gh TRI eTwTUTE FicoM FET TMT A RR=B () DDOS (i) Ransomware. @) Cre Sree Bre cae MIT? THT TIP | AA TICE eT oreey Sere Bed ag GIN RETR] TRAD Sore Ae Becoy ‘fSoreTaT PACT? 1 (me) FR ARBIET aT Re CHT aR CHTATT aH TAA VA? v (@) “eRe Foe sale are Plaga Tt were RIA v afebicrt sede tao aT fafacart (expense or investment)? TPIT TA (ot) fare gflasret (Al) FACS ICATIOAT SHA | » bl @) HAD cota SAG AfeCAR Brews eR carat Bia Qro=e FRSC GrmouTs Bert sat AH, ar APSA 4 wey hey PT | (8) TCs ANAT WH aCe AAT DIAG ASAT HATE afore what SHA | 8 (ot) Freon core Serer A AA: wEbeME, ew, ais aor, aiost, ad cote aR MAE CtreTs | () RECA, CATA ee SCART a ACT BTA TR © ares TFA | (8) SRee, SHARIA axed eae STON cel Bate 1” eqfSioa & madet TOT PPA | : bi (@) wide SHSe Ae OM fe TA ToT OETA HCE = Bd Bibw? SIA AATF AS fr | ne (2) 8 Fie Fes IR) aa CRT eryfGrTIR @ Fe RegTech, HR Vto=( SupTech a Hog kay FPA” (0 wet sone RARA ster CTR (SOC) a SPE TIT 1 (®) USSD, API, DMZ eae MICR oa fe" Fr | S01 Freqs ce careat vale feaca Here Blt fers : @x8=! () LAN . (8) fecbretal (Crypto Currency) (a) fee (Phishing) (§) BYOD Controls (8) PCIDSS (@) IVR. coy Scanned with CamScanner

You might also like