Question Asked In Caiib Exam :- Dear Readers, IIBF conducted Online Examination for CAIIB. Candidates who were about to give their exam may be searching for the Memory Based Questions asked in CAIIB. Here we have given the CAIIB Memory Based Questions. Kindly make use of it and share it with all your friends.
Also Read :- CAIIB Whatsapp Group Links
Recollected Questions for CAIIB Exam :-
1. scada- full form
2.digital signature- Chapter 2 of IT act
3.Phreaking
4.phishing- do understand the concept
5.steganography
6.Cert in- 05 MARKS QUES- function
7.IB- world's oldest intelligence agency
8.UAVs- why used so muchh?
9.NTRO- comes under pmo and provide tech intelligence to defence
10.information silo
11.2 FA- cash withdrawl from ATM
12.2d Bar code- also called Matrix code
13.word "hacking" has been removed in ITAA
14.IT act is adopted from model-UN commission on internatinal trade law.
15.fraud- defined in contract act.
16.why magstrip card migrated ti chip based
17.card cloning-labanese loop
18.advantage of rupay card
19.CDAC
20.rootkit-2q, ip spoofing-1q
21.page-115-e commrece security-2marks
21.not digi wallet-ans-BBPS
22.in OLTP- ACID test- atomicity, consistency,isolation, durability
23.hacking punishment in IT act 2008-3y& 5l
24.example of direct evidience-eye witness
25.corroborative evidience-2q
26.online transcation more prone to-identity theft(i think)
27.what the feature called when a customer made a successful online transcation and staisfied with?
28.payment system governed in india-2 marks q with multiple options
29.IT act perceived to be based on-
30.Divulgde the sensetive personal information like user id pwd- 43A
31.65-tempering of source code
32.CISA- full form
33.r-commerce
33-4. cyber forensic -2q
34.physical vs digital evidience-1 q
35.hacker-blue-2q white-1q black-1q
36.means rea- asked in different context
37.preventive/detection/mitigation control-4 q
38.DML
39.RFID most vulnerable weakness
40.page 66-threat of hacking in banking-2q
41.Anonymous definintion
42.non-repudiation means non denial of ...pg 41
43.malware related 2 q
44.CIA triad
45.classify-owner, handle-custodian, operate-user
46.cyber squating, cryptolock
47.jhon doe order
48-threat vector & landscape-3 question
49.APT agent
50.cyber word definition
51.ceri in stated- like data handling is costly
Question Asked In BFM Exam :-
Case Study on Bond Duration
Case study from RWA and LC
Case Study on TT Buying/Selling Rate
Case Study on NTDL
Case Study on Lc theory based
Stop\loss limit
Open position
Tenor of Gsec
Lot of theory questions from Treasury
Under IRB RWA calculated by which method
HTM Category
Corporate social responsibility
5 year bond with 3 year put option means
Capital charge
EMF 1,2,3
ECGC
Deposit insurance system encourage a bank to do?
Define CAR
Debt capital instrument min.maturity period
NIM calculation
GAP calculation
Yield in bonds calculations
Differential rate if interest numerical
Commercial paper raising criterion
Capital charge calculation as per Standard approach
RWA on credit exposure Case study
Horizontal vertical calculation
Forward price case study 3m 6m 12m 3 different currency are given
Question Asked In Information Technology Exam :-
1 questions from.access privilege controls
2.corporate it policy - definition and other things.
3. Questions from physical security- cctv, rfid ,video surveillance, logical security,.
4. Different international standards , iso 27001, isms us standards
5 rti 2005
6.it amendment act 2008
7.controls of software,
8.network layer , transfer protocols
9 Different types of threats and malware, stuxnet, fast flux,
10. Questions related to risk management.
11. Is audit framework and regulatory mechanisms- complete chapters.
12.hot site ,warm site ,root kits
Some More Questions
1.Information aset classification like user , custodian, owner
2 questions on authentication, Authorization
3.access privilege general questions with example
4.SHA 512
5 PGP pretty good privacy
6.RFID, BARCODE DIFFERENCE
7.Password policy
8.question on TRAI
9.ISO 27001, ISO 27000
10.RISK=Probability×damage potential
11.Threat and vulnerability
12.Digital India mission and goals
13.need , opportunity, rationalization
14.fire extinguisher for electric and computer aswer is CO2 extinguisher
15.question on E waste
16.question on metal detector
17.question on BYOD
18.green server
19.Router
20.question on Modem
21.3D printing
22.Question on Alpha testing
23.question on cloud computing
24.question BPO
25.Voip eaves dropping
26.question on
ISO 27000, ISO 27001, ISO/IEC ,ISO18000,ISO 14000
27.Sarbanes Oxley Act , CEO CFO must certify
28.COBIT V4, 5
29.sensor lighting
30.scavenging
31.active directory
32.UNIX LINUX difference
33.Schema definition
34.RDBMS
35.TCP/IP 4layers
36.HTTP port, FTP port number,SMTP Port number,Telnet port number
37.qustion on firewall
38.Captcha
39.Escrow arrangements
40.question on sniffer
41.zero day attack
42.section on It act
43.spyware questions
44.malware question with general example
45.rootkits with general example.
46.DNS hijacking
47.fault tolerance general example
48.disk duplex, disk mirror difference
49.RTO, RPO difference with general example.
50.window backup
Some More Questions
1) Infinet is a TCP/IP based network.
2) RTGS is a Y based topology
3) A fund manager uses CFMS for balance with org.
4) You are using data from off site location , it is a - Corrective Measure
5) CAAT cannot be used as a among following - Antivirus.
6) Correct order of SDLC
7) Weaking of the signal as it travel through the channel - Attenuation
8) White Noise
9) undo and one more command is a - TCL command.
10) If you want to quickly detect problem in a system what should be used. Bottom Up, Top Bottom
11) Which type of medium is most secure.
12) A company with office a multiple location - Reciprocal Agreement
13) 4 situational Questions on Hot, Cold, Warm site.
14) Cyat appointed by
15) Digital Signature
16) Walkie Takie is - Half duplex
17) Which one is a passive attack
18) what means by establish spurious association in a active attack
19) Cross Talk
20) 3 questions on field check, record check, batch check, file check.
21) Who is a subscriber.
22) best way to safe guard from Trojan horse
23) Sniffing
24) Aditor Notices same profile used by multiple people, what of the following
25) Few questions on control
26) CIA
27) What certificate a Auditor should do CCNA, CISCO, CISA, XYZ
28) GAP Analysis
29) BIA.
30) Which layer is not in OSI - INTERNET Layer
31) Worst implementation for a company
32) Critical data backup -Hotsite
33) CCA appointed by- Central government
34) Non critical data backup - Cold Site
35) NEFT - Deferred net settlement
36) Firewall prevents
37) Audit charter - Options were almost similar
38) Echo Check
39) Duty of Database Administration
40) Bridge operates at - Datalink and Physical Layer
41) Testing is important topic, multiple question where there
42) Punishment for changing software code
43) Adaptive Maintaince
44) E Money
45) Full sale testing.
Post a Comment
Post a Comment