Question Asked In Caiib Exam

Question Asked In Caiib Exam

Question Asked In Caiib Exam :- Dear Readers, IIBF conducted Online Examination for CAIIB.  Candidates who were about to give their exam may be searching for the Memory Based Questions asked in CAIIB. Here we have given the CAIIB Memory Based Questions. Kindly make use of it and share it with all your friends.

Also Read :- CAIIB Whatsapp Group Links

Recollected Questions for CAIIB Exam :-

1. scada- full form

2.digital signature- Chapter 2 of IT act

3.Phreaking

4.phishing- do understand the concept

5.steganography

6.Cert in- 05 MARKS QUES- function

7.IB- world's oldest intelligence agency 

8.UAVs- why used so muchh?

9.NTRO- comes under pmo and provide tech intelligence to defence

10.information silo

11.2 FA- cash withdrawl from ATM

12.2d Bar code- also called Matrix code

13.word "hacking" has been removed in ITAA

14.IT act is adopted from model-UN commission on internatinal trade law.

15.fraud- defined in contract act.

16.why magstrip card migrated ti chip based

17.card cloning-labanese loop

18.advantage of rupay card

19.CDAC

20.rootkit-2q,  ip spoofing-1q

21.page-115-e commrece security-2marks

21.not digi wallet-ans-BBPS

22.in OLTP- ACID test- atomicity, consistency,isolation, durability

23.hacking punishment in IT act 2008-3y& 5l

24.example of direct evidience-eye witness

25.corroborative evidience-2q

26.online transcation more prone to-identity theft(i think)

27.what the feature called when a customer made a successful online transcation and staisfied with?

28.payment system governed in india-2 marks q with multiple options

29.IT act perceived to be based on-

30.Divulgde the sensetive personal information like user id pwd- 43A

31.65-tempering of source code

32.CISA- full form

33.r-commerce

33-4. cyber forensic -2q

34.physical vs digital evidience-1 q

35.hacker-blue-2q white-1q black-1q

36.means rea- asked in different context

37.preventive/detection/mitigation control-4 q

38.DML

39.RFID most vulnerable weakness

40.page 66-threat of hacking in banking-2q

41.Anonymous definintion

42.non-repudiation means non denial of ...pg 41

43.malware related 2 q

44.CIA triad

45.classify-owner, handle-custodian, operate-user

46.cyber squating, cryptolock

47.jhon doe order

48-threat vector  & landscape-3 question

49.APT agent

50.cyber word definition

51.ceri in stated- like data handling is costly


Question Asked In BFM Exam :-

Case Study on Bond Duration
Case study from RWA and LC
Case Study on TT Buying/Selling Rate
Case Study on NTDL
Case Study on Lc theory based
Stop\loss limit
Open position
Tenor of Gsec
Lot of theory questions from Treasury
Under IRB RWA calculated by which method
HTM Category
Corporate social responsibility
5 year bond with 3 year put option means
Capital charge
EMF 1,2,3
ECGC
Deposit insurance system encourage a bank to do?
Define CAR
Debt capital instrument min.maturity period
NIM calculation
GAP calculation
Yield in bonds calculations
Differential rate if interest numerical
Commercial paper raising criterion
Capital charge calculation as per Standard approach
RWA on credit exposure Case study
Horizontal vertical calculation
Forward price case study 3m 6m 12m 3 different currency are given

Question Asked In Information Technology Exam :-

1 questions from.access privilege controls
2.corporate it policy - definition and other things.
3. Questions from physical security- cctv, rfid ,video surveillance, logical security,.
4. Different international standards , iso 27001, isms us standards
5 rti 2005
6.it amendment act 2008
7.controls of software, 
8.network layer , transfer protocols
9 Different types of threats and malware, stuxnet, fast flux, 
10. Questions related to risk management.
11. Is audit framework and regulatory mechanisms- complete chapters.
12.hot site ,warm site ,root kits 

Some More Questions 

1.Information aset classification like user , custodian, owner
2 questions on authentication, Authorization
3.access privilege general questions with example
4.SHA 512 
5 PGP pretty good privacy
6.RFID, BARCODE DIFFERENCE
7.Password policy
8.question on TRAI
9.ISO 27001, ISO 27000
10.RISK=Probability×damage potential
11.Threat and vulnerability
12.Digital India mission and goals
13.need , opportunity, rationalization
14.fire extinguisher for electric and computer aswer is CO2 extinguisher
15.question on E waste 
16.question on metal detector
17.question on BYOD
18.green server
19.Router 
20.question on Modem
21.3D printing
22.Question on Alpha testing
23.question on cloud computing
24.question BPO 
25.Voip eaves dropping
26.question on
ISO 27000, ISO 27001, ISO/IEC ,ISO18000,ISO 14000
27.Sarbanes Oxley Act , CEO CFO must certify
28.COBIT V4, 5
29.sensor lighting
30.scavenging
31.active directory
32.UNIX LINUX difference
33.Schema definition
34.RDBMS 
35.TCP/IP 4layers
36.HTTP port, FTP port number,SMTP Port number,Telnet port number
37.qustion on firewall
38.Captcha
39.Escrow arrangements
40.question on sniffer
41.zero day attack
42.section on It act
43.spyware questions
44.malware question with general example
45.rootkits with general example.
46.DNS hijacking
47.fault tolerance general example
48.disk duplex, disk mirror difference
49.RTO, RPO difference with general example.
50.window backup

Some More Questions 

1) Infinet is a TCP/IP based network.
2) RTGS is a Y based topology 
3) A fund manager uses CFMS for balance with org.
4) You are using data from off site location , it is a - Corrective Measure
5) CAAT cannot be used as a among following - Antivirus.
6) Correct order of SDLC
7) Weaking of the signal as it travel through the channel - Attenuation
8) White Noise
9) undo and one more command is a - TCL command.
10) If you want to quickly detect problem in a system what should be used. Bottom Up, Top Bottom
11) Which type of medium is most secure. 
12) A company with office a multiple location - Reciprocal Agreement
13) 4 situational Questions on Hot, Cold, Warm site.
14) Cyat appointed by
15) Digital Signature 
16) Walkie Takie is - Half duplex
17) Which one is a passive attack 
18) what means by establish spurious association in a active attack
19) Cross Talk
20) 3 questions on field check, record check, batch check, file check.
21) Who is a subscriber.
22) best way to safe guard from Trojan horse
23) Sniffing
24) Aditor Notices same profile used by multiple people, what of the following
25) Few questions on control
26) CIA
27) What certificate a Auditor should do CCNA, CISCO, CISA, XYZ
28) GAP Analysis
29) BIA.
30) Which layer is not in OSI - INTERNET Layer
31) Worst implementation for a company
32) Critical data backup -Hotsite
33) CCA appointed by- Central government
34) Non critical data backup - Cold Site
35) NEFT - Deferred net settlement
36) Firewall prevents 
37) Audit charter - Options were almost similar
38) Echo Check
39) Duty of Database Administration
40) Bridge operates at - Datalink and Physical Layer
41) Testing is important topic, multiple question where there
42) Punishment for changing software code
43) Adaptive Maintaince
44) E Money
45) Full sale testing.

Post a Comment