0% found this document useful (0 votes)
99 views27 pages

Banking Tech

The document contains multiple choice questions related to banking technology topics like NEFT, RTGS, digital payments etc. Some key details: - NEFT operating hours on normal days are 8am to 7pm and Saturday 8am to 7pm. The return discipline under NEFT is settlement batch time plus 2 hours. - Under NEFT, participating banks must credit the beneficiary customer after inter-bank settlement and receiving the End-of-Batch message. - The batch interval time in NEFT settlements with effect from July 10, 2017 is 1 hour, with 12 batches.

Uploaded by

amar dihingia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views27 pages

Banking Tech

The document contains multiple choice questions related to banking technology topics like NEFT, RTGS, digital payments etc. Some key details: - NEFT operating hours on normal days are 8am to 7pm and Saturday 8am to 7pm. The return discipline under NEFT is settlement batch time plus 2 hours. - Under NEFT, participating banks must credit the beneficiary customer after inter-bank settlement and receiving the End-of-Batch message. - The batch interval time in NEFT settlements with effect from July 10, 2017 is 1 hour, with 12 batches.

Uploaded by

amar dihingia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Care : Option in Bold is the answer. 1.

Prepaid Payment Instrument (PPI) for Mass Transit Systems


(PPI-MTS) issued may be reloadable in nature and at no point of time the value / balance in PPI can
exceed the limit of ____: a Rs.1000 b Rs.2500 c Rs.2000 d Rs.10000.

2. The return discipline under NEFT is settlement batch time plus ____ hours? a half-hour b one-
hour c two hours d two and half hour.

3. What are the operating hours of NEFT: a normal day 8 am to 5 pm and Saturday 8 am to 1 pm b
normal day 8 am to 7 pm and Saturday 8 am to 7 pm c normal day 9 am to 5 pm and Saturday 9 am
to 12 noon d normal day 9 am to 7 pm and Saturday 9 am to 12 noon.

4. What are the operating hours of NEFT: a normal day 8 am to 5 pm and Saturday 8 am to 1 pm b
normal day 8 am to 7 pm and Saturday 8 am to 7 pm c normal day 9 am to 5 pm and Saturday 9 am
to 12 noon d normal day 9 am to 7 pm and Saturday 9 am to 12 noon.

5. With effect from July 10, 2017, what is the batch interval time in NEFT settlements: a half-hour b
an hour c two hours d three hours

6. With effect from July 10, 2017, what is the no. of batches in NEFT settlements: a 11 b 12 c 23 d 25

7. Under NEFT, all participating banks are required to give the credit to beneficiary customer : a after
the inter-bank settlement has been completed. b after inter-bank settlement has been completed
and the End-of¬Batch (EOB) message is received by them. c after the End-of-Batch (EOB) message is
received by them. d after all the settlements have been completed and there is return message.

8. In the context of a computer, the key board is: a storage device b input device c output device d
memory device e processing device

9. It is mandatory for securitization /reconstruction companies to invest an amount _____ of each


class of security receipts (SRs) issued under a particular scheme and continue to hold the
investments till the time all the SRs issued under that class are redeemed completely. – a not less
than 15% b not more than 5% c not less than 10% d not more than 10%.

10. In order to ensure that the banks are not held liable to afford credit on the basis of number of
account alone by the beneficiaries, which of the following actions is required to be taken by the
banks: a to write to all customers about this b to put notifications in the websites c to put suitable
disclaimer on the funds transfer screen d all the above.

11. Credit card business can be conducted by banks only if their net worth is at least Rs.___: a Rs.100
cr b Rs.200 cr c Rs.300 cr d Rs.500 cr.

12. In order to ensure that a coloured photo copy or scanned coloured image of the cheque is not
used, which of the following features is included in the cheque under CTS 2010 standards? - a ultra-
violet ink b intaglio c void pantograph d UV enabled scanning.

13. An unauthorized electronic bank transaction has taken place by a 3rd party in the saving bank
account of Mr. Z. After receipt of bank notification about the transaction, the customer notifies the
bank within 2 days. Who will bear the loss of this transaction? – a. bank concerned b customer
concerned c bank and customer in the ratio of 50:50, d bank up to Rs.25000 and beyond that
customer

14. If some unauthorized electronic bank transaction is noticed by the customer in his accounts, he
can provide information to the bank. Which of the following is not a correct channel for this? a
report through website of the bank b report to toll free helpline of the bank c reporting to home
branch d report to any branch of bank.

15. A company has to make payment of dividend to large no. of its shareholders through electronic
medium. It should use: a RTGS system b EFT system c SWIFT system d ECS – Debit clearing system e
ECS – Credit clearing system

16. In cases where due to unauthorized electronic bank transaction, the loss is due to negligence by
a customer, such as sharin the payment credentials. Who will bear the loss: a bank will bear the
entire loss until he reports the unauthorised transaction to the bank b loss occurring after the
reporting of the unauthorised transaction shall be borne by the customer c all loss will be born by
the customer d until report to bank, customer and loss occurring after reporting by customer, bank.

17. In cases where the responsibility for the unauthorised electronic banking transaction lies neither
with the bank nor with the customer, but lies elsewhere in the system and when there is a delay of 4
to 7 working days after

receiving the communication from the bank, on the part of the customer in notifying the bank of
such a transaction, the per transaction liability of the customer shall be limited to Rs._____ in case of
a saving bank account?: a Rs.5000 bRs.10000 c Rs.25000 dno liability

18 In cases where the responsibility for the unauthorised electronic banking transaction lies neither
with the bank nor with the customer, but lies elsewhere in the system and when there is a delay of 4
to 7 working days after receiving the communication from the bank, on the part of the customer in
notifying the bank of such a transaction, the per transaction liability of the customer shall be limited
to Rs._____ in case of a basic saving bank deposit account? a Rs.5000 b Rs.10000 c Rs.25000 d no
liability.

19 On being notified by the customer, the bank shall credit (shadow reversal) the amount involved in
the unauthorised electronic transaction to the customer’s account within ____ days from the date of
such notification by the customer (without waiting for settlement of insurance claim, if any). : a 7
calendar days b 10 calendar days c 7 working days d 10 working days.

20 In cases where the responsibility for the unauthorised electronic banking transaction lies neither
with the bank nor with the customer, but lies elsewhere in the system and when there is a delay of 4
to 7 working days after receiving the communication from the bank, on the part of the customer in
notifying the bank of such a transaction, the per transaction liability of the customer shall be limited
to Rs._____ in case of a cash credit account with limit of Rs.40 lac. a Rs.5000 b Rs.10000 c Rs.25000 d
no liability.

21 Banks are to ensure that a complaint is resolved and liability of the customer, if any, established
within such time, as may be specified in the bank’s Board approved policy, but not exceeding ____
days from the date of receipt of the complaint, a 90 days b 60 days c 30 days d10 days.

22 Under NEFT, in order to streamline the system and complete the processing cycle on a near-real-
time basis, the concept of return within ____ of completion of a batch has been introduced : a T+1 b
last batch of the same day c two hours (B+2) d first batch of the next date.

23 Digital (electronic) signatures means: a a coded confirmation of drawer in electronic form


attached to an electronic record b a coded signature with digital equipment c a signature with
handwriting subsequently scanned d a confirmation with electronic and digital media e a code.
25 Data Storage unit of a computer is called – a random access memory, b hard disk, c memory unit,
d compact disk.

26 Under RTGS the transactions time 8 am to 4.30 pm is in respect of which of the following
category of transactions: a inter-bank transactions, b intra-bank transactions, c all transactions d
customer transactions.

27 The method in which the computer devices are inter connected in LAN, is called: a protocol b.
topology c multiplexer d token ring

28 ____ is a device, that takes the image of specimen signature card and converts it into a digital
from which is stored on the hard disk of the computer system. a modem b scanner c router d digital
signature.

29 ___is a mechanism under which there are multiple debit entries and single credit: a NEFT b RTGS
c ECS-Debit d ECS-Credit

30 Any participating bank or institution may, by giving a notice of ____, withdraw from the NEFT
System. a 10 days b 20 days c one month d two months.

31. The maximum merchant discount rate (MDR) for small merchants at physical POS can be 0.40%
with a maximum of: a Rs.100 b Rs.200 c Rs.500 d Rs.1000

32. The maximum merchant discount rate (MDR) for other merchants at physical POS can be 0.40%
with a maximum of: a Rs.100 b Rs.200 c Rs.500 d Rs.1000

33 What enables computers to interact with other network/ computer through telephone lines: a
internet connection b mouse c modem d monitor.

34. What is e-Kuber? a digital payment system operated by Mumbai Stock Exchange , b digital
payment system operated by Stock Holding Corporation of India c digital payment system operated
by RBI d payment and settlement system operated by Clearning Corporation of India

MCQs ON BANKING TECHNOLOGY

1. Under RBI NEFT System, what is the maximum limit of individual per day transaction
presently_______ ? a.No ceiling b. Max 5.0 cr c. Max 50 lacs d. Max 50000

2. Walk-in customers who do not have an account with remitting bank can also send remittance
through NEFT up to _________by paying cash. a.500000 b.5000 c.50000 d. cannot send

3. Settlement of NEFT batches closes at _______ hours on all working of the bank branch. a.5.00pm
or 17.00 hrs b. 8.0 pm or 20 hrs c. 9.00 pm or 21.00 hrs d. 7.0 pm or 19 hrs

4. Delay in credit to Party‘s Account or delay in refunding the NEFT amount to remitting bank branch,
penal interest payable is – a.RBI LAF Repo + 1% b. RBI LAF repo + 2% c.Bank rate d. Reverse Repo
rate

5. Delay in credit to Party‘s Account or delay in refunding the RTGS amount to beneficiary or to
remitting bank, penal interest payable is __________ a. REPO rate plus 2% b. SB rate of interest c.
Bank rate d. Reverse Repo Rate

6. Our bank uses SFMS as message carrier for NEFT transactions. The term ‘SFMS’ Stands for a.
Standard financial messaging service b. Standard financial messaging system c. Structured financial
messaging system d. Structured financial messaging service
7. Two authorisers are required to send high value NEFT transactions above the amount of a.
100000/- b. 200000/- c. 500000/- d.1000000/-

8. The maximum number of remittances allowed in a year for worker’s remittance to Nepal, Under
NEFT is a.12 b.10 c.5 d.3

. The RTGS timings during week days for inter bank transactions are a. 8.00am to 7.00pm b. 8.00am
to 7.45pm c. 7.00am to 9.00 pm d. 7.00am to 9.45 pm

10. The RTGS timing during week days for customer transactions is a. 8.00 am to 5.00 pm b. 8.00 am
to 4.00 pm c. 8.00am to 4.30pm d. 8.00am to 5.30pm

11. As per RTGS discipline, in respect of inward messages amount should be either credited to
beneficiary account or returned to the sender’s bank within______ hours of its receipt- a. 2 hours b.
3 hours c. 1 and half hours d. 2 and half hours

12. The term ‘SCAN AND PAY’ is used in the following type of payment system. a. Bharat QR Code
payment system b. Immediate payment system c. Mobile payment system d. ECS payment system

13. Bharat QR code merchant enrollment, the CIBIL rating of the merchant should be ____ a. 590
b.600 c. 700 d. 800

14. Under Bharat QR code merchant enrollment, the CIBIL rating of below 700 upto 590 or if no
rating is available, the proposal has to be sent to a. Next higher authority b. Regional head c. Circle
Head d. Head office

15. The term ‘BBPS’ stands for - a. Banking Bill payment system b. Banking Billing payment service c.
Bharat Banking payment service d. Bharat bill payment system

16. The following channel modes are supporting the ‘Bharat Bill Payment system – BBPS in Canara
Bank a. ATM and cards b.Net Banking and mobile banking c. AEPS and UPI d. All the above

17. CANVAS – is a web portal used for – a. It is the portal provided by NPCI to settle the BBPS related
disputes. b. It is the portal provided by NPCI to settle card related disputes c. It is the portal provided
by NPCI to settle ECS related disputes d. None

18. As per recommendations of _______Committee recommendations our bank has devised online
system for redressal of grievances of our customers - CPGRS - a. PR Nayak committee b. Damodaran
Committee c. Narashiman committee d. RBI working group

19. The Committee that suggested the cheque transaction system for inter-bank transactions: a. PR
Nayak committee b. Damodaran Committee c. Narashiman committee d. Saraf Committee

20. A system that is used to restrict the outside intrusion to access a computer system is called: a.
Firewall b. Antivirus c. Virus d. Adminsystem

21 The process that replaces the physical flow of cheques with electronic information or scanned
image a electronic clearing system b real time gross settlement c cheque truncation d electronic
funds transfer e all the above

22 The situation of reading of a data by someone other than the intended recipient is referred to as:
a: impersonation b: eavesdropping c: data alteration d: denial-of service attack
23 Which of the following is the system that makes image processing for inter-bank payment
purpose: a electronic clearing system b real time gross settlement c cheque truncation d electronic
funds transfer e all the above

24 Which of the following is the order in which the sorting is carried out in MICR system: a city, bank,
branch b instrument, city, bank c bank, instrument, city d instrument, bank, city e bank, city,
instrument

25 A system that permits more than one user to access the computer system, at the same time,
through dumb terminals attached to the main system is known as : a single user system b multi-user
system c large area net work d metro area network e c and d

26 Under computer network security, where the monitoring is done by personal performance
features such as eye-retina pattern or palm or hand geometry, it is called: a: physical security b:
logical security c: network security d: biometric security

27 Which of the following is a feature of a real time system? a where processing takes place in
batches b where the processing takes place on-line with time delays c where processing takes place
instantly without time delays d where processing takes place within one hour. e where processing
takes place online

28 The art and science of keeping files and messages secured is called: a: encryption b: decryption c:
pass phrase d: cryptography

29 The payment system in which there is a single debit and multiple credit: a electronic clearing
service (credit) b electronic debit service c electronic funds transfer d SWIFT e CHIPS

30. What is the name for the system which uses electronic means to collect payments from
customers made by the credit/debit card holders and installed at retailers: a ATM b FOS c CBT d CIF e
any of the above

31 Which of the following kinds of environment is provided througt, Centralised Banking Solution
software: aany time banking, b any where banking, cbank customer instead of branch customer d a
and b, e a to c

32 The part of the computer that makes use of primary memory: astorage unit, bcentral processing
unit, c output devices, dcomputer user, e all the above

33Which of the following makes use of the artificial intelligence: auser of the computers, bcomputer
machine, c operating systems, dapplication systems, e all the above

34 The resolution of the computer screen is determined by which of the following: a the colour, b
the memory, cthe pixels, dthe processor speed, e b and c

35 The network for common data communication for banks and Fls launched by RBI: a BANKNET, b
INFINET, c NICENET, d SWIFT, e INTERNET

36 Which of the following is the instrument of payment called Plastic Money :- aidentity card,
bplastic card, c debit card, dgreeting card, e banker's cheque

37.As per the revised uniform access criteria of RBI for centralised payment systems, the minimum
net worth should be: Rs.10 cr, b) Rs•25 cr, c) Rs.50 cr, d) Rs.100 cr
38.What is the minimum no. of free transactions including balance enquiry, by a customer by using
ATM of other bank? a) 2 per month, b) 5 per month, c) 10 per month, d)no such limit (Note: in 6
metro, the number is min 3 instead of 5)

39 Asymmetric Crypto system is used for:- a) Certification of digital signatures b) Authentication of


digital signatures c) Creation of digital signatures d) Recognising digital signatures

40. Through which of the following systems, the customer could leave the message for the
concerned desk which the person handling the desk could provide later on: a) telebanking,
b)internet banking, c)voice mail facility, d)ATM facility, e) mobile banking

41, Which of the following can be considered as part of the batch processing system: a RTGS, bsalary
payment rolls, cairlines reservations, drailway reservations e all the above

42 The term ATM stands for which of the following:- aautomatic teller mechanism, bautomated
teller mechanism, cautomated teller machine, datomic teller machines, e automated telephone
machines

43 The term EFT means: aelectronic foreign transfers, belectronic financial transfers, c electronic
funds transfer, delectrical funds transfer, e any of the above

44 The term SWIFT stands for which of the following:- aSociety for world-over international financial
transfers, bSociety for world-wide interbank financial transfers, cSociety for world-wide interbank
financial telecommunication, dSociety for worst international financial terrorism e Social world-wide
interesting financial telecommunications.

45. 1024 bytes are equal to: a. 1 kilobyte, b 1 megabyte, c 1 gigabyte, d1 terabyte, e 1 petabyte 46 A
megabyte is equal to which of the following:- a124 bytes, b1024 bytes, c124 kilobytes, d1024
kilobytes, e 124 gigabytes

47. 1024 megabytes are equal to which of the following:- a 1 kilobyte, b 1 gigabyte, c 1 byte, d1
terabyte

48.One terabyte is equal to which of the following: a1024 kilobytes, b1024 bites, c1024 gigabytes,
d1024 megabytes

49. 1024 terabytes are equal to: a. 1 kilobyte, b1 byte, c 1 megabyte, d 1 petabyte 50 The term RAM
stands for which of the following: aread able memory, brandom access memory creadable accessing
memory, dread & access memory The term ROM means: a) Read offline memory, b) Read only
memory, c) Read on memory, d) remove online matter

51.What is the amount per withdrawal that can be withdrawn by a customer by using ATM of other
bank? a) Rs.1000, b) Rs.5000, c) Rs.10000, d) no such limit

52.A truncated cheque is to be given the same treatment in law, as a physical cheque. Introduction
of truncated cheques has been made on the recommendations of which of the following
committees? a) Saraf Committee, b) Shere Committee, c) SS Tarapore Committee, d)Narasimham
Committee

54 The device that uses pressure sensitive electronics and separate sensors to monitor the
horizontal and vertical movements, is: a) a mouse, b) a joystick, c) a compiler, d) a line printer, e) a
touch screen
55.The program that takes a file of source code written in a high level programming language to
convert it into object code: a) joystick, b) light pen, c) compiler, d) touch screen, e) bar code reader

56 The device that converts an image into electronic form by shining light and sensing the intensity
of the reflection at every points: a) bar code, b)light pens, c)scanner, d)touch screen, e)compiler

57 The term OCR stands for which of the following: aOpen character recognition, b non-utility
software c b and d both d none

58. Which among the following is part of the National Payment System in India a RTGS & SWIFT, b
RTGS & NEFT, c NEFT & SWIFT, d All the above.

59. For violation of procedures of RTGS, RBI can impose penalty on banks under provisions of the
following: a Section 47, Banking Regulation Act, b Section 45-D, RBI Act, c Section 30, Payment &
Settlement System Act 2007, d Information Technology Act 2000.

60. The device that is a kind of computer which does not have its own CPU or storage: a standby
computer, b terminal, c mainframe computer, d personal computer, e none of the above.

61. A non-bank while label ATM operator (WLAO) is required to have a minimum net worth of: a
Rs.50 cr, b Rs 100 cr, c Rs 200 cr, d Rs 500 cr

62. What time gap is given in RTGS, between customer timings and inter-bank timings, to ensure
that a customer transaction where credit cannot be afforded to the beneficiary, would have to be
returned to the account of sender : a) 2 hr 30 min, b 1 hr 30 min, c 60 min, d 45 min

63. The program that initializes the machines to make it operational is covered under the category of
: A system software, b system hardware, c application software, d non-utility software, e b and d
both

64Which of the following is functions performed by email: a Internet surfing, b electrical mail
service, c electronic mail service, dencoded mail service, e electronic processing of post

65INFINET stands for: aInternational Financial Network, bIndoor Financial Network cIndian Financial
Network, dInternet Financial Network

66 A bank is required to reimburse to the customers the amount wrongfully debited in an ATM
within a maximum period of working days from the date of receipt of customer complaints. a30
days, b12 days, c7 calendar days, d7 working days

67 The term ANSI stands for which of the following: aAmerican National Standard Institute,
bAmerican Networking Standards Institute, cAsian National Standard Institute, dAfro-Asian
Networking Standard institute

68Which of the following is not a storage device: atape drives, bfloppy disc drive, chard disc drive,
dprinter driver

69Which of the following devices is a stack of metal platters that spins on one spindle like a stack of
fixed floppy disc.: a tape drive, bfloppy disk, chard disk, d DVD

70 The term SPNS stands for which of the following: aSharing Process Network System, bShared
Procedural Network System, cShared payment network system, dShortest possible networking
system
71 The term e-Commerce represents which of the following: aeconomical commerce, belectrical
commerce, celectronic commerce, delementary commerce

72 The computer program that ensures interface between the user and the computer hardware:
aapplication software, boperating software, cprocessing software, dcompiler einterpreter

73 The computer output that is printed on a paper is called: asoft copy, bhard copy, celectronic copy,
dtext copy, e a and c

74 Which of the following is the order in which the sorting is carried out in MICR system: a city ,
bank, branch b instrument, city, bank, c bank, instrument, city, d instrument, bank, city, e bank, city,
instrument

75 Which of the following device has the diameter of 120mm, thickness of 1.22 mm and a hole in the
centre: a floppy disk, b hard disk, c compact disk, dfloppy and CD, e hard disk and floppy disk

76The electronic signatures are issued by: abank with whom the account is maintained, b the
certifying authority appointed by Govt, c electronic signature controller of India, dIncome Tax Deptt.

77 The SWIFT system is used for which of the following purposes: adata transmission, bcustomer
information sharing, cfinancial transactions transmission, dtrading on stock exchange, e none of the
above

78 The term BIOS represents which of the following: a) Basic input and output system b) Basic input
output standard c) Base input outward system, d)basic inward outward standard, e) none of the
above

79 The process under which the computers can carry out their data processing at different branches,
is called : a) batch processing, b) distributed data processing, c) online processing, d) centralized data
processing e) all

80 A system that permits more than one user to access the computer system, at the same time,
through dumb terminals attached to the main system is known as: a) single user system, b)multi-
user system, c)large area net work, d)metro area network e) c and d

81The device that converts the digital signals to analog signals and analog signals to digital signals:
acentral processing unit, b modem, - efax, dcompact disk, e interpreter

82 The device that reads the magnetic track on the card when the card is inserted into the machine:
ainterpreter, bcard reader, cprocessor, dmagnetic reader, ab and d both

83 The term WWW is used for which of the following: a world wide web, bworld wise web, cweb
world wide, dwide world web, e wild world web

84 Which of the following is the part of binary number system: a ABC, b A1034, c. 1600 d 1010 e
11401

85 Which of the following is the part of hexadecimal number system: a A b A134, c 1600 d 1010, e
1101

86 Which of the following is a feature of a real time system? awhere processing takes place in
batches, bwhere the processing takes place on-line with time delays, cwhere processing takes place
instantly without time delays, dwhere processing takes place within one hour, e where processing
takes place online.
87 Which of the following systems has the feature that it could be used as an alternative to cheque
as a means of payment: a GIRO, bInternet, c FET, d SVIFD

88 Which of the following, better describes the term internet:- aa network of stand alone
computers, ba network of servers, ca network of networks, da network of world-wide computers

89 In SWIFT system, the banks are connected with which of the following: aInternet, bIntranet,
cCentral Processor, dRegional Processor, e Local area net work 90In which of the following, the data
is collected during a specific period and then processed : areal time system, bonline system, cbatch
system, dcentralized processing system e distributed data system

91The computer system is controlled by a sequence of instructions that are called acomputer
software, b computer program, c computer input device, d computer output device e operating
system

92.The computer related storage device used for the purpose of making permanent record:- a) CD-
ROM, b) Floppy disk, c) Hard Disk, d) WORM Drive

93.The funds that could be loaded into a card, which could be used as:- a) cash in case of need, b)
credit card, c) smart card, d) electronic cash, e) narrow money, f) broad money

94.One roll of this process is capable to hold the equivalent of 4 full filing cabinet drawers of
standard size page. What is this process: a) OMR, b) MICR, c) Microfilming, d) microfiche, e) all the
above

95.The computer based network which connects the computers over a local area is called a) local
area connection, b) local area network, c) wide area network, d) metro area network, e) none of the
above

96.The rate at which the transfer of data takes place is measured in terms of which of the following:
a) kbps, b) bpbs, c) kilobytes, d) gigabytes

97. What is the name for the system which uses electronic means to collect payments from
customers made by the credit/debit card holders and installed at retailers: a) ATM, b) POS, c) CBT, d)
CIP

98 Which of the following is not an input device in a computer system:- amother board, b) key
boardc mouse, dtouch pad, e bar code reader

99 The system that has a very high frequency radio signal to transmit data through space, is known
as: a optical fibre, b terrestrial cables, c microwave system, dcoaxial cables modem

100 IDRBT stands for which of the following: aInstitute for Development and Research in Banking
Technology, bInstitute for Development and Research in Business Technology, cInstitution of
Development and Research in Banking Technology, d institute for Development of Rural Banking
Technology, e None

101 The GIRO system is related to which of the following: adata transmission, bmoney transfer
system, cinformation highway, dinternet highway, e none of the above

102 The public key, in a electronic signature is used:- ato complete the private key, bto verify the
private key, cto supplement the private key, dall the above

103 One Yottabyte = 1024 : apetabytes, bzettabytes, c yotta bytes d exabytes


104 Which of the following takes care of processing of the information in a computer system:- a ALU,
b CPU cStorage unit, dControl Unit Processors

105.The term booting is used in connection with which of the following: aactivation of the computer,
b activation of Internet, c activation of the smart card, dactivation of ATM, e b and d above

106 Which of the following determines the speed of the computer system:- a) physical size of the
computer unit, b)physical size of the hard disk, c) capacity of the microprocessor, d)speed of the
monitor, e) all the above together

107 What is the name of the windows software that is used for managing data in a spreadsheet
format: a)MS Word:- b)MS Power Point, c)MS Access, d)MS Excel, e) b and d

108 What is the name of the windows software that is used for managing data in a data base format:
a MS Word, bMS Power Point, cMS Access, dMS Excel, e b and d

109 What is the name of the windows software that is used for managing text through the word
processing : a MS Word, b MS Power Point, cMS Access, dMS Excel, e b and d

110 The term ISP means which of the following: ainternal service provisions, binternet service
process c internet service providers, d interesting service process, e international society of people

111 What purpose is served in a computer by the screen saver: a stops the computer, bstops burning
of the computer, c stops running of a computer program, d gives good look to the computer system,
eall the above

112 An enterprise-wise framework for managing informational data with the organization is called
adatabase management system, bdata warehousing, cdata mining, ddata base

113 CBS facilitates introduction of ATMs, eBanking, tele-bankin mobile banking etc. that are
collectively called amulti-faced services, bmulti-city services, c multiple delivery channels, d all the
above

114 Which of the following benefit the CBS system does not offer to a bank: aenhanced customer
service level b lower transaction cost, c low risk and 24 hour banking, dnone of the above

115 An end-of-day transfer service to move funds deposited at branches of other financial
institutions to a concentration account at a central server is called:- a centralized money
management, b customer service management, c customer cash and funds management, dany of
the above

116 Under automated clearing system, in use, in banks, which of the following types of technologies
are available: aMICR and OCR, bMICR and ACS, c OCR and ACS, d OCR and OPEL

117 In a MICR cheque, which of the following code does not match the description: afirst 6-digit
code - cheque number, bcentral 09-digit code — city, bank and branch code clast 2-digit code —
transaction code such as saving or current account, d none of the above

118 Which of the following is the system component of MICR cheque processing: a) encoder, b)
cheque reader-cum-sorter, c) both a and b, d)none of the above

119 The processing machine that processes the cheques at high speed in the clearing house is called
a) processor, b)reader-cum-sorter, c)encoder, d)all the above
120 A system in which the collecting bank captures the electronic image of a cheque and sends the
electronic image (instead of the actual cheque) to the paying bank, for collection, is called:- acheque
electronic clearing, belectronic cheque, ctruncation of cheques/instruments, dimage transfer
network

121 Which of the following is a basic requirement for introduction of cheque truncation system in
banks: a

computer with scanner, b communication software/network capable of transferring images


cadequate storage space in electronic media, dall the above 122 A settlement system in which the
processing and final payment of funds transfer instructions takes place continuously, is called adebit
clearing system, b credit clearing system, c national clearing system, dreal time gross settlement 123
Which of the following is not the type of model, that is not used under real time gross settlement
system: a V-shaped, b Y-shaped, c L-shaped, dD-shaped

124 Which of the following kinds of risk can be better managed with the help. of real time gross
settlement system: asettlement risk in inter-bank settlement process, b reduction of settlement risk
in securities and foreign exchange transactions, csystemic risk in inter-bank settlement process, dall
the above

125 The pair of keys used in electronic signature is called:- aprivate key and master key, bpublic key
and master key, cpublic key and private key, d any of the above

126 Which of following does not match in case of message flow process in RTGS: ain V-shaped
process, the settlement request is sent by the sending bank directly to the settlement
agent/authority bin Y-shaped process, the settlement request is sent by the central processor to the
settlement authority after receiving the settlement mandate from the sending bank, cin T-shaped
process, the settlement request is sent by the sending bank directly to the settlement
agent/authority along with a copy to the receiving bank, dnone of the above

127 Structured Financial Messaging System (SFMS) is an system on the line of SWIFT: adata
messaging, belectronic data interchange, celectronic exchange of data, dany of the above

128 What kind of message can be exchanged on SFMS: afinancial messages of all kinds, bcoded
messages of any kind, cstructured message in conformity with published standards, d any of the
above

129 Under SFMS, the confidentiality of the messages is protected by way of: acoding, bdecoding,
cdecryption, dencryption

130 The mechanism where the buyer can purchase goods and services without actually making the
payment immediately is called :- aline of credit, b debit card, c credit card, d any of the above

131 In credit card mechanism, the provisional invoice on purchase of goods and services, is called a
Charge slip or sale draft, b) charge slip or draft invoice, c) sale draft or payment slip, d)any of the
above

132 In credit card operations, POS refers to:- apoint of sale, b place of sale, c provision of service,
dpayment or sale

133 The maximum amount upto which a merchant establishment is allowed to accept the payment
through card is called:- afloor limit, bfixed limit, ccard limit, dceiling limit
134 The maximum amount that a card holder is allowed to make payment by way of credit card, is
called afloor limit, bfixed limit, ccard limit, dceiling limit

135 The term 'hot card' refers to (a) lost card (b) stolen card (c) misplaced card (d) misused card.
Which combination is correct:: aa, b, c, ba, b, d, ca, c, d, db, c, d

136 The term 'hot listing' of the credit card refers to: aenhancing the credit limit, breducing the
credit limit, c list of card holders who default in payment of dues to the issuer, dany of the above

137 A transaction which is authorized by the buyer but later on disputed by the card holder, is called
acharge backs, b disputed transaction, cback-track transaction, dcontingent transaction

138 The card where the card-holder's deposit account is debited immediately at the time purchase
of goods or services: a debit card, bcredit card, csmart card, dATM card

139 Which of the following statement is correct with regard to Debit and Credit cards: ain debit card,
the card holder is allowed line of credit, b in credit card, the account is debited immediately on
purchases, cin case of debit card the card holder must have a deposit in accounts , d in case of credit
card payment is made by the merchant establishment

140 The credit card having a magnetic stripe or a computer chip in which value is stored is called:-
astored value card, bpre-paid card, cvalue added card, dany of the above

141 Which of the following relating to credit cards do not match: aconventional ATM card contain
magnetic stripe – false, ba card where the value can be replenished after the previous value has
depleted — re-loadable card, cclosed card — where the card can be used for specified limited
services only, dOpened stored value cards are called Electronic Purse or Electronic Wallet - true

142 The cards of several issuers that are mutually accepted are called:- aelectronic purse,
belectronic wallet, c chip cards, da and b

143 Doing business through use of electronic medium by sharing information between supplier,
govt., buyers and others, stands for:- ae-transactions, b e-commerce, ce-business, dany of the above

144 A process under which activities such as electronic presentation of goods and services, online
order taking and bill presentment, automated customer account inquiries, online payment and
transaction handling takes place is called : a e-transactions, b e-commerce, ce-business, d any of the
above

145 When banking activities are carried through electronic means, it is called :- a) e-banking, b)e-
business in banking, c)Internet banking, d)all the above 146 e-banking can be carried effectively,
where it is supported by a well-designed and effective and it is an integral part of financial
institution's delivery and service plan: a) manpower, b)call centre, c) data base, d)all the above

147 ……….is the transmission of textual matter from one place to another by electronic means:
aelectronic mail, bdigital mail, cinternet mail, dnone of the above,

148 Email systems work on the principal of providing each user with a located in a computer in
which message are stored and can be accessed:- apass word, bpersonal ID, cmail box, dmail channel

149 An email data communication system consists of which of the following: asource-destination
(computer), bdata communication device (modems), ccommunication channel (cable/phone line),
dall the above
150 To connect two computer systems at' different geographical places, the eMail system requires
which of the following: a dial-up lines, b leased lines, c packet switching network (PSN), d any of the
above

151 A white label ATM is an ATM:- awhich is installed by banks and non-bank entities jointly, b which
is installed by banks jointly, cwhich is installed by non-bank entities, d which is stopped for
operations due to some fraud

152 To get an internet connection, the users have to get connected to having internet servers:
atelephone companies, bmobile phone companies, cinternet service providers, dall the above

153 For electronic signatures, the cryptography is usually based on the use ofto generate two
different but mathematically related keys: ageometric function, balgorithmic function, c algebraic
function, dmathematical function

154 The device that connects different types of networks is called : a media, b hub, c bridge, d router

155 The technology that is capable of end-to-end switched digital service that is designed to
transport real time voice and video and non-real time data such as LAN data traffic is known as:
alayer 2 tunnelling protocol, b frame relay, cpoint to point to tunneling protocol, d ISDN

156 Banks and financial institutions generally make use of which of the following network:
atransponder, bvery small aperture terminal, cprimary rate interface, d point to point tunnelling
protocol

157 For which of the following reasons, the VSAT is popular with banks and financial institutions:
acost efficient networking, bimproved customer service, clow cost network growth, dall the above

158 If a computer is used to store confidential or sensitive information, in order to ensure that data
cannot be accessed, which of the following shall be made use of:- aclose circuit TV, bencryption,
cburied line sensors, dlocking and guarding

159 The process of access control is based on two important processes that are called a) locking and
guarding b document security and document encryption, c authorization and authentication, d all
the above

160 A system that is used to restrict the outside intrusion to access a computer system is called
aencryption, bfirewall, c lures or honey pots, dany of the above

161 Under computer network security, where the monitoring is done by personal performance
features such as eye-retina pattern or palm or hand geometry, it is called aphysical security, blogical
security, c network security, dbiometric security

162 Which of the following can be categorized as part of the biometric security technique:
asignature recognition and voice-print recognition, bfingerprint recognition and eye retina pattern
recognition c palm-print recognition and hand-geometry recognition, dall the above

163 The art and science of keeping files and messages secured is called :- aencryption, bdecryption, c
pass phrase, dcryptography

164 Encoding the contents of a message in such a way that hides the contents from outsider is called
aencryption, bdecryption, c pass phrase, d cryptography
165 The process of retrieval of plain text from the coded (ciphered) message is known as:
aencryption, bdecryption, cpass phrase, dcryptography

166 A string of characters that is used to mathematically encode the message to ensure that it can
be read only by someone in possession of that string or another related string, is called aencryption,
bdecryption, ckey, dpass word

167 Which of the following keys is kept secret by the owner of the key as it is used to sign: apublic
key, bprivate key, csecurity key, d general key

168 A sequence of bits which is created by running an electronic message through a one-way hash
function (a program) is called a encrypted signature, b decrypted signature, c electronic signature, d
pass word

169 The recipient of a digitally signed message can verify the authenticity of the message by use of
which of the following key: asender's private key, bsender's public key, creceiver's private key,
dreceiver's public key

170 The payer of keys that is used in case of electronic signatures is called:- asender-receiver key,
bpublic-private key, c encryption-decryption key, dvalidation-authentication key

171 Which of the following statements is not correct with regard to use of public and private keys;- a
a public key is used to encrypt information sent to a client who holds the private key, ba public key is
used to verify the electronic signatures of client, ca private key can be used to decrypt information
that was encrypted using the public key or generate electronic signatures, dnone of the above

172 Which of the following is correct with regard to the keys used in the process of electronic
signatures: aa party that performs the task of associating person with the key, pair used to create
the electronic signature is called certification authority, b) The owner of the certificate, issued by the
certification authority is known as client, c) the term that describes the certificate owner or client is
called 'subject', d) all the above

173. An electronic data base of certificates, the equivalent of digital Yellow Pages is called a)
certificates chest, b) certificates depositor, c) repository, d) certificate warehouse

174. The process of conversion of a variable length message into a fixed length key is called:- a)
conversion b) hashing, c) key fixation, d) none of the above

175. The encryption of message digest with sender's private key results in: a) encryption, b)
electronic signature c) decryption, d) key identification

176. Disaster avoidance can help toor risk, which may lead to disasters: a) minimize, eliminate, b)
minimize, reduce, c) maximize, eliminate, d) eliminate and avoid

177. Which of the following is a back up for hard copy documents: a) microfilming, b) microfiching, c)
imaging technology, d) all the above.

178. Disk mirroring stands for which of the following:- a) duplicqtion of CD-ROM, b) duplication from
hard drives c) duplication of data from one hard disk to another hard disk, d) all the above

179. A technique that enables the LAN administrator to provide for continuing service in case of
failure of critical components under Disaster management, is known as: adisk mirrorin b)
redundancy, c)drive arrays, d) hot backup
180. Under a local area network setup, two copies of backup are generated. One to be keptand
other : a onsite, off-site, b onsite, on other network, c off-site, on other network, dall the above

181 There areparties to a electronic signature, that include: a2, sender & receiver, b2, sender &
certification authority, c 3, sender, receiver and certification authority, dnone of the above

182 audit looks whether system and procedures are being followed and audit, in addition looks the
qualitative aspects of compliance, effectiveness and efficiency: acomputer, system, bcomputer,
network, cnetwork, system, dnetwork, computer

183 With a view to ensure that the user should not be able to misuse the system what provision can
be there as part of computer system security: ainstructions can be issued not to report outside
prescribed hours, bsomeone should guard the computer system all times, crestrictions on users may
be provided in the system, d all the above

184 The term Cyber Law stands for which of the following: athe Law governing Cyber Caffee
establishments only, bthe Law governing in-house computer activities cthe law relating to various
aspect of information technology, dany of the above

185 Banking records in an electronic form shall be treated records under the provisions ofAct: avalid,
NI Act, b invalid, B R Act, c valid, Information Technology Act 2000, dvalid, l T Act 1961

186 What is the minimum time period for which the electronic records are to be preserved atill they
are available in a computer system, b as per rules for physical records unless modified, cthere is no
need for maintenance of such records, dall the above

187 Where rules are published both in paper form and electronic form, the date of publication of
will be date of publication of such matter in any form: a first b last, c paper d electronic

188 Which of the following actions of a person can be included as part of the legal definition of
computer crime : asecuring access to computer or computer system, bdownload, copy or extraction
of data from a computer system, cintroduction of computer virus or causing denial of access to any
person authorized to access a computer system, dall the above

189 Which of the following actions of a person are not to be included as part of the legal definition
of computer crime : adamage to a computer system, bdisruption to a network of computers,
cproviding assistance to another person to get access to a computer system, dnone

190 Within the meaning of computer crime, a set of instructions that is designed to modify, destrdy,
record, transmit data or program residing within a computer is called:- acomputer virus, bcomputer
contaminant ccomputer hacking, d any of the above

191is a mechanism under which an account holder with a bank can authorise an ECS user to recover
an amount at a prescribed frequency by raising a debit in his account. a NEF, b RTGS, cECS-Debit, d
ECS-Credit

192 Local Area Network is the computer network. Which of the following statements explains it
better? A the network that links computers and peripherals within a municipal area B the network
that links computers and peripherals within a localized area C the network that links computers and
peripherals within a state area, D all the above

193 In a local area network, each independent computer system (i.e. terminal linked to server) is
called asub-LAN, bserver, cworkstation or node, dany of the above
194 Which of the following relates to helping in recovering from failures in a network system?
awork-station, bserver, c disk mirroring, d nodes

195 Which of the following is not related to helping in recovering from failures in a network system?
auninterrupted power supply, baudit trails, cdisk duplexing, dregular back-up

196 The method in which the computer devices are interconnected in LAN, is called aprotocol,
btopology, cmultiplexer, dtoken ring

197 Which of the following are two basic forms of LAN design used in information transmission?
acentralized design and concentrated design, bcentralized control and distributed control
ccentralized design and bifurcated design, dbifurcated design and interconnected design

198 Which of the following topology is not part of the centralized control network under LAN? abus
topology, bstar topology, ctree topology, dloop topology

199 Which of the following topology is not part of distributed control network under LAN? astar
topology, bring topology, c tree topology, dloop topology

200 In which of the following topology, if one of the workstations fail, the entire network under LAN
is disabled? aring topology, bstar topology, cbus topology, dnone of the above

201 In which of the following topologies under LAN, the central node is often the master? aring
topology, bstar topology, c bus topology, dloop topology

202 Under LAN the rules for communication between similar modules of processes, usually in
different nodes, are called:- a protocol, btopology, c multiplexer, dtoken ring

203 The commonly used adapters under LAN include which of the following: amultiplexer and token
ring, b multiplexer and Ethernet, c Ethernet and token ring dToken and Ethernet

204 A device, that receives signals from several communication lines and pass on to one
communication line and vice versa is called:- a protocol, btopology, c multiplexer, dmodem 205
Which of the following takes multiple low-speed lines and combines their individual data
transmission capacity needs so that a specific group of them can be transmitted on a single high
speed line? a protocol, btopology, c multiplexer, dtoken ring

206 A computer network is created to share (a) hardware (b) software (c) data (d) different locations
aa to d all, b a, b and c only, c b, c and d only, da and d only

207 Which of the following is helpful in proper functioning of a computer system (a) exceptional
transaction report (b) providing latest software and hardware (c) generation of audit trails aa to c all,
ba and b only, c a and c only, db and c only

208 In the bus topology (a) all devices are connected to a single continuous cable (b) transmission
travels in both the directions (c) if one station fails, the LAN stops functioning. aa to c all correct,
bonly a and b correct, c only a and c correct, d only b and c correct

209 In ring topology (a) the devices are connected in a closed loop (b) transmission is from one node
to another in series (c) data transmission is in one direction (d) if one station fails, the LAN stops
functioning : a a to d all, ba, b and d only, c a, c and d only, db, c and d only
210 In star topology (a) the central node is the master (b) each node is jointed to master by separate
link (c) it cannot handle large traffic as every transaction passes through the central node. aa to c all
correct, bonly a and b correct, c only a and c correct, d only b and c correct

211 In a core banking system (a) the branches are linked to central server (b) transactions are done
in the branch server and controlled by central server (c) the customer is offered any time any where
banking facilities. aa to c all correct, b only a and b correct, c only a and c correct, donly b and c
correct

212 The disaster recovery site in CBS is used (a) to avoid disruption in the business activities due to
failure of branch servers (b) to ensure that branches continue to have non-stop functioning (c) to act
as back up for providing reliable and continuous processing environment aa to c all correct, bonly a
and b correct, c only a and c correct, donly b and c correct

213 Which of the following is a benefit of CBS? (a) establishment of a reliable centralized data
repository for the bank (b) centralized management information, decision support and executive
information systems. (c) servers are mandatory at branches also (d) no extra cost for implementing
RTGS etc. aa to d all, ba, b and d only, c a, c and d only, db, c and d only

214 The CBS software does not comprise which of the following? abranch functional modules,
binterface to integrate systems like RTGS, c tools for business intelligence and management
information, dnone of the above

215 In CBS infrastructure, the networking can be done through (a) leased lines of WAN can be used
(b) ISDN link is used as a backup (c) to address any network failure, adequate redundancies are built-
in aa to c all correct, bonly a and b correct, c only a and c correct, donly b and c correct

216 The setting up of ATM was recommended by which of the following committee: aNarasimham
Committee, bSaraf Committee, c Rangarajan Committee, d Shere Committee

217 Which of the following explanation to ATM categories, does not match: anetworked ATM —
which is connected to some ATM network, b Offsite ATM — which is not connected to data base of
the bank, c Onsite ATM — the ATM which is within /outside the branch premises dstandalone ATM
the ATM which is not connected to any ATM net work

218 An ATM with a depository, which serves the customers for cash withdrawals only, is called acash
purse, bcash dispenser, c electronic purse, d standalone ATM

219 There are a no. of slots in the ATM for various purposes. Which of the following is not one such
slot? adeposit slot, bcash dispenser, ccard reader, d PIN

220 The special breed of ATMs capable of thinking for themselves, are called:- aEFTPOS, b EFTATM, c
HWAK, dCharge ATM

221 Which of the following is correct in the context of PIN :- a PIN stands for personal information
number, bPIN is similar to a pass word, cPIN is not inserted on the ATM card, dall the above

222 The smart card is similar to an ATM card or Credit card:- a with a loaded value, b with an
integrated circuit (IC), c with a charging facility, d all the above

223 The electronic signature are recognised equal to a handwritten signatures as per provisions of: a
NI Act 1881, b Information Technology Act 2000, c Indian Evidence Act, d Banking Regulation Act
224 The smart cards can be (a) intelligent memory chip cards (b) micro processor cards (c) simple
card without any integrated circuit:- a a to c are correct, b only a and c are correct, c only a and b are
correct donly b and c are correct

225 The intelligent memory chip cards are used in the following cases:- apay phones, b
identification, access control, cvoting applications, dall the above

226 Which of the following is a feature of a processor smart card (a) these are ideally suited for
banking applications as re-use of card is allowed (b) cards have a built in memory and processor
along with an operating system (c) these can protect themselves against fraudulent operations. aa to
c all are correct, bonly b and c are correct, c only a and c are correct, donly a and b are correct

227 is a smart card that contains electronic money. It is sometimes called the electronic wallet or the
stored value card (SVC):- a electronic purse, belectronic cash, c electronic card dall the above

228 Purchase now and pay later, is the feature of :- a smart card, b magnetic card, c credit card,
ddebit card

229 In which of the following type of card, the customer's account is debited before making the
actual purchase: asmart card, bmagnetic card, ccredit card, ddebit card

230 Where funds are loaded in a card to use these as cash, in case of need, it is called asmart card,
belectronic cheque, celectronic purse, delectronic cash

231 When the card holder authorises payMent by typing his PIN and his bank account is debited and
account of merchant establishment (point of sale) is credited, it is called:- a electronic token,
belectronic cheque, celectronic purse, delectronic cash

232 in a smart card, when a prepaid area is set aside to store electronic units of time or electronic
tickets for a specific service, it is called:- a electronic token, belectronic cheque, c electronic purse,
delectronic cash

233 A system of updation of computer records in which the there is direct linking of an operation to
a computer system so that the operation is immediately accepted by the computer system, is
called :- a real time operation b online update, c offline update, dbatch update

234 When at the end of the day, all transactions are entered into a computer system for the purpose
of updation of records stored in the computer, it is called:- a real time operation, b online update, c
offline update, dbatch update

235 A bank allows its customers to send instructions to the bank for availing certain services. It is
called a base level service, b simple transactional website, c fully transactional websites, d Internet
banking.

236 A bank allows its customers to affect banking transactions through its website such as transfer
of funds. It is called:- a base level service, bsimple transactional website, c fully transactional
websites, dany of the above

237 Which of the following is not a feature of internet banking:- ait removes traditional geographical
barriers, bthere are a no. of new types of risks, attached to this type of banking, c it poses a strategic
risk of loss of business to those banks, that could not respond in time, dnone of the above
238 Where the physical movement of a paper cheque is stopped and for collecting the payment, its
image is used by the collecting bank :- athe image is called truncated cheque, bthe image is called
electronic cheque c the cheque is called truncated cheque, dthe cheque is called electronic cheque

239 A cheque can be truncated in the clearing process, by:- aclearing house paying bank, ccollecting
bank, dany of these

240 After truncation, the paper cheque is kept in the custody of :- a bank or clearing house that
truncated the cheque, bpaying bank, c collecting bank, dclearing house

241 With a view to authenticate the electronic image of the truncated cheque, the bank or clearing
house that truncates the cheque:- a can send a separate confirmation in writing, bcan send an email,
ccan attach electronic signature, dany of the above

242 Truncation of a cheque can be done by using (a) MICR data (b) image processing (c) computer
software and hardware:- aa to c all, ba or b, c a or c, db or c

243 When truncation of cheque is done by using MICR data:- athe MICR code is captured, to
exchange with the other bank, bthe MICR line is captured to exchange with the other bank, c the
MICR cheque is captured to exchange the with other bank, dany of the above

244 For storage of data, when the data is captured on microfilm, the process is called ascanning,
bmicro-scanning, cmicrofiche, dmicro processing

245 An electronic purse has the maximumno. of storage space? aonly one, bup to two, cno limit, dno
storage space

246 Which of the following provides the facility of revolving credit:- asmart card, bcredit card c debit
card, dcharge card

247 Under ECS debit, all the unprocessed debits have to be returned to the sponsor bank within a24
hours, bone business day, c3 working days, dthe specified time frame

248 A terrestrial cable or a microwave station or a satellite, is part of which of the following: adata
transmission device, bdata transmission medium, cdata transmission processor dany of the above

249 Under NEFT, once a request for transfer of funds is received from a customer, the remitter bank
prepares SFMS, which stands for:- astandard financial monitoring system, bstandard financial
messaging system c structured financial messaging system, dstructured financial monitoring system

250 Under NEFT, if a message is not returned un-effected , it is treated to have been completed and
credit afforded to the beneficiary's account by the beneficiary branch:- abefore the next settlement
day, bbefore the next day, cbefore the next business day, dbefore the next banking day

251 Under NEFT, in case of a holiday at the beneficiary branch, the credit will have to be effected on
a (a) value dated basis wherever feasible or (b) latest at the commencement of business on the next
working day (c) next day a a, b or c, ba or b only, c b or c only, da or c only

252 Under NEFT, the funds transfer settlement shall be final and irrevocable, as defined, as soon as
the same is determined in terms of the procedures notified by RBI. au/s 34 of the Banking Regulation
Act, bu/s 32 of the Payment and Settlement Systems Act 2007 u/s 32 of the RBI Act, du/s 23 of the
Payment and Settlement Systems Act 2007
253 What is the time for customer transactions under RTGS for Saturday ( Except 2dn & 4th ) day?
a9 am to 2 pm b8 am to 4 pm, c 9 am to 1.00 pm, d8 am to 4.30 pm

254 Which of following type of risk is not managed by RTGS? aoperational risk, bsettlement risk, c
systemic risk, dnone of the above

255 What type of message flow model has been adopted for implementation in India, by RBI? aI
model b L model, cY model d V model

256 In RTGS, each bank is required to have a single gateway interface calledfor RTGS system.
aParticipant Interface (P1), b Bank Interface (BI), cInstitutional Interface (II), d Participant Gateway
(PG)

257 ,Under RIGS, the message received from participant interface (PI) is passed on toacting as
broker. asettlement authority, b settlement agent, c Inter-bank Funds Transfer Processor (IFTP) d
inter-institutional authority

258 RTGS Business Day hasphases:- a2 phases b 3 phases, c4 phases d 5 phases

259 All normal transactions are accepted and processed under RTGS in which of the following
phases: aRTGS open phase, b IDL Shut phase, c IDL close phase, dRTGS close phase

260 Restrictions on fresh IDL continues and no transaction which debits a member with an
outstanding IDL, is settled under RTGS, in which of the following phases:- aRIGS open phase, b IDL
Shut phaseDL close phase, d RTGS close phase

261 Immediate Payment System (IMPS) scheme is operated by:- anon-bank entities, bNational
Payment Corporation of India, c public sector and private sector banks jointly, dReserve Bank of
India

262 What is the time for banking transactions under RTGS for a normal day? a 9 am to 4 pm, b 8 am
to 5 pm c 8 am to 8 pm, d9 am to 6 pm

263 Immediate Payment System (IMPS) relates to :- afunds transfer through internet, b funds
transfer through white-label ATMs, c funds transfer through RuPay card, dfunds transfer through
mobile phone

264 What is the time for customer transactions under RTGS for a normal day? a 8 am to 4.30 pm b8
am to 5 pm, c9 am to 6 pm, d10 am to 6 pm

265 RBI's VSAT network called Indian Financial Network (INFINET) has been set up at Hyderabad on
recommendations of: aTN Anantharam lyer Committee, b2nd Rangarajan Committee, cSaraf
Committee dShere Committee

266 Which of the following is correct regarding VSAT network of RBI? (a) it involves the use of earth
stations called VSAT (b) VSATs are owned by individual banks (c) VSAT Hub is owned by RBI and
IDRBT aa, b and c, ba and b only, ca and c only, db and c only

267 Which of the following is not correct regarding VSAT? a it has an outdoor unit that provides
interface to the satellite, bit has an indoor unit, that provides interface to user computer system, cit
uses a hybrid system of two different technologies called Star and Mesh, dnone
268 VSAT network cannot be used for which of the following group of activities:- aEFT,
anytime/anywhere banking, bemail, circulars, reporting to RBI, csettlement of securities, settlement
system, dtreasury management products, physical cash delivery

269 While using VSAT network, the banks in India make use of:- aINFINET for free format message, b
BANKNET for free format message, cNICNET for free format message, dINET for free format message

270 In internet, the connection with the service provider is established with the help of ? amonitor,
b VSAT c modem, dany of the above

271 In terms of the NEFT / NECS / ECS Procedural Guidelines member banks need to afford credits to
beneficiary accounts or return transactions (uncredited for whatever reason) to the originating /
sponsor bank within the prescribed timeline. Any delays in doing so attract penal provisions specified
therein. The penal interest rate would be: a RBI LAF reverse repo rate + 2%, b RBI LAF repo rate +
2%, c RBI Bank rate + 2% d BPLR of the concerned bank

272 Internet related resources are organised by which of the following:- aInternet service providers,
bworld wide web, cgopher, dinternet relay

273 SWIFT is owned by which of the following: aUS Federal Bank, bEuropean Central Bank, cBank for
International Settlements, dMember banks

274 Which of the following is not correct regarding SWIFT:- ait is established under Belgian law, bit is
a public limited company, cits HQ is in Brussels, dIts major role is transmission of financial messages

275 Which of the following is not a feature of SWIFT? ait is operational on 24 x 7 basis, bfinancial
messages are transmitted all over the world, call message formats are standardized, dSWIFT does
not assume any financial liability

276 In India, the SWIFT is operating for quite long. Which of the following is correct? Regional
Processor is at Mumbai ball public sector banks are its members, cbanks are connected to regional
processor, dall the above

277 Standard message formats have been developed by SWIFT to handle a no. of business areas.
Which of the following is not one such group of activities:- afinancial institution transfers, customer
transfers, bcollections and cash letters, letter of credit and bank guarantees, ccash management and
securities, dnone of the above

278 SWIFT provides the following type of protection? a protection to network against unauthorised
access bprotection of transmission against loss or mutilation of message, c error in transmission and
loss of privacy, dall the above

279 SWIFT owns responsibility for transmission :- abetween regional processors only, b. between
regional processors and member banks, cbetween member banks only, d all the above

280 The SWIFT security control to prevent automatic changes during transmission is called
aencryption, b checksum, cdecryption, dkey authentication.

281 The SWIFT security control to ensure data confidentiality is called:- aencryption, b checksum c
Decryption, dkey authentication.

282 Which of the following RTGS explanation does match:- a CHIPS England, bCHAPS – US, cCHATS
— Hong Kong, dnone of the above
283 CHIPS, the New York based RTGS stands for:- aClearing House Internal Payment System
bClearing House Inter-bank Payment System, cConfidential House Inter-bank Payment System
dClearing House Inter-bank Payment Settlement

284 FEDWIRE, RTGS is operated underin:- aBank of England, London, bUS Federal Reserve, USA cUS
Govt., USA, dFederal European Zone, Euro Zone

285 Which of the following is a private network operating in US? aFEDWIRE, b CHIPS, c CHATS dBank
Wire

286permits payments to be made at the merchant establishment through electronic funds transfer
(EFT) : apoint of sale, bBank ATM, c FEDWIRE, d BANKWIRE

287 ECS (Credit) payments can be initiated by any institution (called ECS user) :- a which has to make
small payments b which has recover amount of bills repeatedly, c which has to make large size
payments in small numbers d have to make bulk or repetitive payments to a number of
beneficiaries.

288 The validity period of pre-paid payment instrument can be from date of activation/issuance to
the holder : a1 month, b2 months, c3 months, d6 months

289 ECS (credit) user can initiate the transactions after registering themselves with an aIBA approved
bank, b approved clearing house, c RBI approved entity, d any of the above

290 The ECS (Credit) user's bank is called as thebank under the scheme and the ECS beneficiary
account holder is called the account holder. asponsor bank, ultimate, b originating bank, final,
csponsor bank, destination, dany of the above

291 The debit payment system that works on the principle of multiple debits and a single credit: a
debit clearing, belectronic debit clearing, c electronic clearing, delectronic clearing service

292 Which of the following is an advantage under the debit clearing system: acustomer need not
keep track of his bills and make payment on due date bservice provider need not print out the paper
bill and courier them to the customer ccost reduction at the level of banking system as handling of
cheques is avoided dall the above

293 The electronic system through which a company or a mutual fund can make payment of
dividend to a large number of shareholders or unit-holders:- a MICR, b truncation, cdebit clearing
system, dcredit clearing system

294 The maximum value of a pre-paid payment instrument can not exceed as per RBI directions: a
Rs.25000, bRs.100000, cRs.50000, dRs.2 lac

295is a mechanism under which an account holder with a bank can authorise an ECS user to recover
an amount at a prescribed frequency by raising a debit in his account. a NEFT, b RTGS, cECS-Debit d
ECS-Credit

296 Under ECS debit, all the unprocessed debits have to be returned to the sponsor bank within a 24
hours bone business day, c3 working days, dthe specified time frame

297 Which of the following match the description of while-label ATM? a ATM installed by RBI. and
operated by banks bATM jointly owned and operated by different banks, cATM installed by a bank
and operated by other banks d ATM owned and operated by non-bank entities
298 RuPay Card scheme is operated by:- anon-bank entities, bNational Payment Corporation of India
cpublic sector and private sector banks jointly, dReserve Bank of India

299 Unique Transaction Reference (UTR) is a character number :- a 10, b 12, c 15 d 22

300 Which of the following is not matched in the context of UTR number
"XXXXRCYYYYMMDDnnnnnnnn" : a XXXX is first 4 characters of IFSC of receiving participant, bR is
RTGS and C is channel of transaction, cYYYYMMDD is year, month and date of transaction,
dnnnnnnnn is sequence number

301.The physical parts of a computer are known as: a) software, b) hardware, c) shareware, d) fixed-
ware, e) digital-ware

302. Which of the following cannot be treated as part of the computer hardware:- a ) mother board,
b) cards, c) memory, d) ports, e) power supply

303.The software that consists of all the programs, languages and documents supplied by the
manufacturer of the computers is called a) application software, b) system software, c) utility
software, d) a and c e b and c

304. The application software is the software that is: a supplied by the computer manufacture bused
by the computer manufacture, cdeveloped by the user for specific functions, ddeveloped by the
manufacturer for manufacturing purpose, ec and d

305 Which type of the following software is used by a person for preparation of text documents :
adata processor, bword processor, ccomplier, dmultimedia, eb and c

306 What is the no. of batches that take place at NEFT : (a) 12 hourly settlements (8arn to 7 pm) on
normal day (b) 06 hourly settlements (7 am to 1 pm) on Saturday (c) 9 hourly settlements (9am to 5
pm) on normal day (d) 4 hourly settlements (9 am to 12 noon) on Saturday:- a a and d, b. a and b, c b
and c, dnone of these

307 Under RBI NEFT system, what is the maximum limit of individual transaction presently: aRs.2 lac
b Rs.20 lac, cRs.200 lac, dRs.2000 lac, eno ceiling

308 Only those commercial banks which fulfill the eligibility criteria fixed by RBI are allowed to have
access to the National Payment system. This criteria include (a) minimum net worth of Rs.50 cr (b)
CRAR of 9% (c) Net NPA less than 10% (d) net profits in at least one year out of the latest 2 years. a a
to d all, ba, b and c only, c b, c and d only, d a, b and d only

309 Which of the following is correct in the context of a electronic signature? ait is scanned version
of the handwritten signature, bit is replica of the manual signatures c it is a pair of keys attached to a
record with the help of public key cryptography, dany of the above

310 Which of the following Act gives legal recognition to a electronic signature: a) Negotiable
Instruments Act Income Tax Act, c Information Technology Act, dIndian Evidence Act

311 The transaction limit under mobile banking is Rs. Per customer for transactions involving
purchase of goods and services and transfer of funds: a50000 b 25000, c10000 d bank discretion,

312 Which legal provisions accord the same rights and remedies to ,the payee (beneficiary) against
dishonour of electronic funds transfer instructions for insufficiency of funds in the account of the
payer (remitter), as are available to the payee under section 138 of the Negotiable Instruments Act,
1881. aSection 25 of the Payment and Settlement Systems Act, 2007, bSection 16 of Information and
Technology Act 2000, c Section 141 of Negotiable Instruments Act 1881, d Section 27 of Indian
Evidence Act

313 The term VSAT stands for which of the following: variable small apertOre terminal, b) very small
available terminal, c) very small aperture terminal, d) variety of small aperture terminals, e) none of
the above

314. The sub-section (5) of the Section 25 of the Payment and Settlement Systems Act, 2007
provides forof electronic funds transfer instruction, or both for dishonour of such electronic funds
transfer instructions : a) imprisonment of 2 years and fine twice the amount, b) imprisonment of 1
year and fine twice the amount c) imprisonment of 2 years and fine equal to the amount, d)
imprisonment of 1 year and fine equal to the amount.

315.The frauds and other kind of crimes that happen on the internet network are called - a) Internet
frauds, b) internet crimes, c)cyber crimes, d)electronic frauds, e) all the above

316 Which of the following incident cannot be treated as part of the cyber crime activity: a)
deciphering domain name, b) mis-configuring a web site, c)misusing a credit card, d)transmitting
data from one part of the globe to another using the network for drug trafficking

317 A computer program which could infect the other programs or data is called - asystem software,
bapplication software, c cyber crime, dvirus e computer fraud

318 Under NEFT, in order to streamline the system and complete the processing cycle on a near-
real-time basis, the concept of return within of completion of a batch has been introduced wef
1.3.2010. a T+1, blast batch of the same day, c two hours (13-1-2), dfirst batch of the next date

319 Which of the following is part of centralised payment systems of RBI (1) Real Time Gross
Settlement (RTGS) System, (2) National Electronic Fund Transfer (NEFT) system (3) National
Electronic Clearing Service (NECS) (4) MICR a1 to 4 all, b1 to 3 only, c2,3 and 4 only, d1,3 and 4 only

320 The process of transformation of a message into an incomprehensible data through use of
mathematical algorithms is called:- a deciphering, b encryption, c decryption d Coding, e decoding

321The precaution of testing the computer security procedures and identification of lapses before
the banking operation is put to risk is known as:- acomputer configuring, bdeciphering, ccomputer
audit, d computer repair, eall the above

322As per the revised uniform access criteria of RBI for centralised payment systems the
requirement for capital adequacy is as under: aMinimum CRAR of 9% as per the latest audited
balance sheet, bMinimum CRAR of 10% as per the latest audited balance sheet, ccurrent minimum
CRAR of 9% including Tier 1 capital of 7%, dcurrent minimum CRAR of 9% including Tier I capital of
6%

323 As per the revised uniform access criteria of RBI for centralised payment systems the
requirement in respect of net NPA is as under: aNet NPAs below 3% (as per the latest audited
balance sheet), bNet NPAs below 4% (as per the latest audited balance sheet), cNet NPAs below 5%
(as per the latest audited balance sheet), dNet NPAs below 7% (as per the latest audited balance
sheet)

324 The committee that is associated with EFT system of RBI:- aRangarajan Committee, b Saraf
Committee, c Shere Committee, d Narasimham Committee, e Ail the above
325.The first committee (year 1985) that gave its recommendations relating to mechanization of
banking system: a) Rangarajan Committee, b) Saraf Committee, c) Shere Committee, d) Narasimham
Committee, e) All the above

326.The committee that gave its recommendation for drawing a perspective plan of computerization
for the period 1990-94: a) Shere Committee, b) Narasimham Committee, c) Rangarajan Committee,
d) Saraf Committee, e) None

327 The committee that recommended the introduction of electronic clearing services: Rangarajan
Committee, b) Saraf Committee, c) Shere Committee, d)Kapoor Committee, e) None of the above

328 The committee that suggested the cheque truncation system for inter-bank transactions: a)
Rangarajan Committee, b) Shere Committee, c)Vasudevan Committee, d) Saraf Committee e) None
of the above

329 1998 Committee on Technology upgradation in Banking Sector is known as: aNarasimham
Committee, bVasudevan Committee, cShere Committee, dSaraf Committee, e Kapoor Committee

330 The software that is used for a centralized environment in banking operations is called : acentral
branch solutions, bcore banking situations, ccentralized banking solutions, dcentralized business
solutions, e a and c

331 What is the number of digits in a PAN card: a 10 numeric b 10-alphanumeric c 10-alpha d 8-
Alphanumeric e 8- numeric

332 IDRBT stands for which of the following: a Institute for Development and Research in Banking
Technology b Institute for Development and Research in Business Technology c Institution of
Development and Research in Banking Technology d Institute for Development of Rural Banking
Technology

333 The debit payment system that works on the principle of multiple debits and a single credit: a
debit clearing b electronic clearing serive (Debit) c electronic clearing d electronic clearing service e
none of the above

334 Which of the following is not correctly matched: a WAN-Wide Area Network b LAN — Local area
network c MAN-Model Area Network d RAM-Random Access Memory

335 Which of the following determines the speed of the computer system: a physical size of the
computer unit b physical size of the hard disk c capacity of the microprocessor d speed of the
monitor e all the above together

336. The software that consists of all the programs, languages and documents supplied by the
manufacturer of the computers is called: a application software b system software c utility software
d) a and c e) b and c

337. Which type of the following software is used by a person for preparation of text documents a
data processor b word processor c complier d multimedia e) b and c

338. The term VSAT stands for which of the following: a variable small aperture terminal b very small
available terminal c very small aperture terminal d variety of small aperture terminals e none of the
above

339. The frauds and other kind of crimes that happen on the intemet network are called: a Internet
frauds b intemet crimes c cyber crimes d electronic frauds e all the above
340.Which of the following incident cannot be treated as part of the cyber crime activity: a
deciphering domain name b m is-configuring a web site c misusing a credit card d transmitting data
from one part of the globe to another e using the network for drug trafficking

341.The firewall technology is used in connection with: a hardware safety b physical safety from fire
c authorised access d human safety from firee Protection of computer network from intrusion by
hackers

342. Inbuilt storage device in computer is called: a ROM b CPU c Hard Disk d RAM

343. The committee that gave its recommendation for drawing a perspective plan of
computerization for the period 1990-94: a Shere Committee b Narasimham Committee c Rangarajan
Committee d Saraf Committee

344. A settlement system in which the processing and final payment of funds transfer instructions
takes place continuously, is called: a debit clearing system b credit clearing system c national clearing
system d real time gross settlement

345.The electronic system through which a company or a mutual fund can make payment of
dividend to a large number of shareholders or unit-holders: a MICR b truncation c debit clearing
system d credit clearing system

346. The part of the computer that makes use of primary memory: a storage unit b central
processing unit c output devices d computer user e. all the above

347. Which of the following is the biological aspect of a computer: a finger b hand c retina d a to c e
b and c

348. Which of the following is the instrument of payment called Plastic Money : a identity card b
plastic card c debit card d greeting card e banker's cheque

349. Which of the following is the measurement unit for processor speed: a megabytes b megahertz
c mega characters d nano seconds e a and b

350.The centralized processing system in a bank makes use of which of the following: a stand alone
computers b shared net working c computers connected by a communication net workd computers
connected by internet

351. A system in which the collecting bank capture the electronic image of a cheque and sends the
electronic image (instead of the actual cheque) to the paying bank, for collection, is called: a cheque
electronic clearing b electronic cheque c truncation of cheques/instruments d image transfer
network

352. An electronic substitute for a manual signature that serves the similar function as a manual
signature is called: a: encrypted signature b: decrypted signature c: digital signature d: pass word

353. The system in which a user of any utility service like telephone, electricity, gas etc. can make the
payment from his bank account, without a reference to him, by giving the authority, is called : a
MICR b truncation c debit clearing system d credit clearing system

354. Use of computer can be traced through a process which is called a computer audit b audit trail
c monitoring of computer operations d follow-up audit e computer-inspection
355. Which of the following determines the speed of the computer system: a physical size of the
computer unit b physical size of the hard diSk c capacity of the microprocessor d speed of the
monitor e all the above together ANSWER

You might also like