0% found this document useful (0 votes)
101 views5 pages

FINTECH ICAP Sample Paper - Solution

Uploaded by

jamshaidtariq425
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views5 pages

FINTECH ICAP Sample Paper - Solution

Uploaded by

jamshaidtariq425
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

QUESTION 1

You are working as a data scientist in a business consulting firm. Diverse Cars, one of your clients, has provided you
with datasets containing two years' car sales data across Asia, Europe, and the USA. The management of Diverse
Cars wants to analyze these datasets for financial reporting and decision-making purposes.

The datasets provided by Diverse Cars are stored in the CARS.csv and CARSALES.csv files. You use Python to analyze
the data in the Jupyter Notebook.

Required:
In the Jupyter Notebook (CRN.ipynb), write the appropriate Python code for each of the following tasks:
(a) Load the following datasets: (2.5 marks)
(i) CARSALES.csv as csales; and
(ii) CARS.csv as cars

import pandas as pd

# Load datasets

csales = pd.read_csv("CARSALES.csv")

cars = pd.read_csv("CARS.csv")

(b) In csales, change the data type of 'Latest_Launch' from object to 'datetime'. Examine csales to ensure that the
data type has been changed as desired. (04 marks)

# Change data type to datetime

csales["Latest_Launch"] = pd.to_datetime(csales["Latest_Launch"])

# Check data type

print(csales["Latest_Launch"].dtype)

(C) Using the 'Latest_Launch' column, add a column to csales namely 'Year'. (03 marks)

csales['Year'] = csales['Latest_Launch'].dt.year

(d) Add a column namely, 'Revenue' and fill it by taking the product of 'Sales_in_thousands' and
'Price_in_thousands'. (2.5 marks)

csales['Revenue'] = csales['Sales_in_thousands'] * csales['Price_in_thousands']

(e) Use 'Make' and 'Manufacturer' columns of the two datasets cars and csales to create a right join and merge
them. Name the merged data as 'mg_data'. (05 marks)

mg_data = pd.merge(cars, csales, left_on=['Make', 'Manufacturer'], right_on=['Make', 'Manufacturer'], how='right')

(f) Using the mg_data, group the data by origin and calculate the total revenue for each origin. Convert the
calculated total revenue to millions. Store the result in a new DataFrame namely, 'origin_revenue'. Print the
'origin_revenue' to show your result. (04 marks)

origin_revenue = mg_data.groupby('Origin')['Revenue'].sum() / 1000000 # Converting revenue to millions

(g) Create a bar plot showing Revenue by Car Origin. The bar plot should look similar to the following: (04 marks)

# Import matplotlib
import matplotlib.pyplot as plt

# Create bar plot

plt.figure(figsize=(10, 6))

plt.bar(origin_revenue["Origin"], origin_revenue["Revenue"])

plt.xlabel("Car Origin")

plt.ylabel("Revenue (Millions)")

plt.title("Revenue by Car Origin")

plt.xticks(rotation=45)

plt.tight_layout()

plt.show()

Using the information of Diverse Cars scenario, select the most appropriate answer for each of the following
multiple choice question

(h) The number of duplicate values in all columns of csales is: (02 marks)
a) 00
b) 2
c) 05
d) 01

csales_duplicates = csales.duplicated().sum()

(i) The number of null values in the 'Fuel_efficiency' column is: (02 marks)
a) 2
b) 03
c) 04
d) 05

Check the data for csales["Fuel_efficiency"].isnull().sum() to find the answer.

(j) The total number of records in the mg_data is: (02 marks)
a) 66,612
b) 67,196
c) 2,058
d) 2.959

total_records_mg_data = len(mg_data)
QUESTION 2

Read the situation and select the most appropriate answer for each of the given multiple choice questions:

XYZ Limited operates a complex supply chain network involving multiple suppliers, manufacturers, distributors, and
retailers across different regions. The existing supply chain faced issues such as delays, data inconsistencies, and
difficulties in tracking the origin of products Additionally, traditional paper-based processes and centralized
databases led to inefficiencies and a lack of real-time visibility

XYZ Limited aims to enhance the efficiency, transparency, and traceability of its supply chain The primary objectives
are to reduce operational costs, mitigate the risk of counterfeit products, and improve overall collaboration among
stakeholders

XYZ Limited has been advised by its management consultant to use Blockchain technologies as it could significantly
reduce processing time across every stop of This process Each transaction indicating a movement of goods would
be recorded, from raw materials to the finished product Documentation would be created, updated, viewed or
venfied by parties on the blockchain, enabling visibility of the entire supply chain

Answer the following MCQs considering the above passage

1. In the finance aspect of the supply chain, how can blockchain streamline payment processes between
different parties, and what role do smart contracts play in this context?
a. By increasing manual verification
b. Through seamless and automated payment execution
c. By introducing complex financial instruments
d. Smart contracts have no relevance in payment processes

Smart contracts facilitate automated execution of predefined terms of agreements, ensuring that payments are
made automatically upon fulfillment of conditions.

2. In a permissioned blockchain environment, what role do consensus algorithms play, and how do they
contribute to the integrity of the supply chain data?
a. They regulate access permissions to the blockchain
b. They establish trust between participants and prevent double spending
c. They determine the order of transactions and ensure agreement among nodes
d. They encrypt data to secure it against unauthorized access

Consensus algorithms are essential in permissioned blockchains to establish agreement among nodes regarding the
validity and order of transactions, thus maintaining the integrity of supply chain data.

3. For a permissioned blockchain environment which one of the following should be considered?
a. Bitcoin
b. Ethereum
c. RIpple
d. Hyperledger

Hyperledger is a permissioned blockchain platform designed for enterprise use, making it suitable for implementing
supply chain solutions.

4. What benefit does a full audit trail on the blockchain provide in the supply chain?
a. Increased consumer demand
b. Protection against counterfeit goods
c. Inefficient payment processing
d. Lack of visibility

A full audit trail on the blockchain ensures transparency and traceability, helping to prevent the circulation of
counterfeit goods by providing visibility into the entire supply chain process.

5. What role do loT devices play in enhancing the blockchain-based supply chain system?
a. Ensuring data privacy
b. Providing visibility
c. Facilitating smart contract execution
d. Enhancing traceability

IoT devices can capture real-time data on the movement and condition of goods, enhancing traceability within the
supply chain and ensuring that accurate information is recorded on the blockchain.

6. What role do loT devices play in ensuring product quality within the supply chain?
a. Reduces delay in production
b. Automates order placement
c. Facilitates smart contract execution
d. Provides real-time data on the condition of goods

IoT devices can monitor various parameters such as temperature, humidity, and location in real-time, providing
insights into the quality and condition of products throughout the supply chain.

QUESTION 3

Read the situation and select the most appropriate answer for each of the given multiple choice questions:

NexTech Solutions is engaged in a high-stakes project for ZetaCorp, a global fintech leader facing sophisticated
cyber threats Led by experienced Project Manager Ali, the team is tackling advanced threats targeting ZetaCorp's
proprietary algorithms and financial transaction systems. The project involves a comprehensive risk management
strategy, focusing on emerging threats in digital identity theft and advanced persistent threats (APTS)

Ali's team is conducting an array of penetration tests simulating state-sponsored cyber-attacks, aiming to identify
zero-day vulnerabilities and complex exploit chains The discovered vulnerabilities in ZetaCorp's systems are subtle
and deeply embedded, requiring nuanced understanding and innovative countermeasures Recognizing the
potential for catastrophic data breaches, Ali emphasizes the need for an adaptive and layered approach to disaster
recovery and business continuity, capable of responding to multi-vector attacks and ensuring operational resilience
under extreme scenarios

1. In the context of advanced persistent threats (APTS), what is the significance of 'dwell time'?
a. The time taken to completely remove the threat from the system
b. The period during which a threat remains undetected within a network
c. The duration of a standard penetration test
d. The time required for a system reboot after an attack

Ali's approach focuses on ensuring redundancy and resilience in ZetaCorp's defense mechanisms, allowing the
organization to withstand attacks from various angles.

2. Ali's layered approach to disaster recovery (if one layer of defense is compromised, others can still provide
protection) for ZetaCorp primarily addresses what aspect of cybersecurity?
a. Single-point solution for all cyber threats
b. Redundancy and resilience in the face of diverse attack vectors
c. Compliance with basic security standards
d. Focus on external threats only

Ali's approach focuses on ensuring redundancy and resilience in ZetaCorp's defense mechanisms, allowing the
organization to withstand attacks from various angles.

3. Authentication weakness refers to what type of vulnerability?


a. Network vulnerability
b. Process vulnerability
c. Operating system vulnerability
d. Human vulnerability

Authentication weakness typically refers to vulnerabilities associated with the authentication process, such as weak
passwords, phishing attacks, or social engineering exploits, which primarily target human users.

4. In the context of ZetaCorp, a comprehensive risk management strategy should include:


a. Focus solely on high-likelihood risks
b. Consideration of both internal and external threat vectors
c. Ignoring risks deemed 'low impact
d. Concentrating on digital threats only

A comprehensive risk management strategy should address both internal and external threat vectors to effectively
mitigate potential risks and vulnerabilities.
5. The adaptability and comprehensiveness of response plans are challenged by multi-vector attacks due to:
a. The simplicity of these attacks
b. Their predictable nature
c. The need to address simultaneous threats across different domains
d. The focus on only digital assets

Multi-vector attacks involve attackers targeting an organization's systems and networks through various methods
simultaneously, making it challenging to respond comprehensively due to the need to address threats across
different domains concurrently.

6. The concern about dwell time' of APTs is significant because:


a. It indicates the time taken for a full system recovery
b. Longer dwell times generally mean more significant potential damage
c. It is a key performance indicator for cybersecurity teams
d. Short dwell times indicate effective cybersecurity measures

Longer dwell times indicate that threat actors have more time to explore, gather sensitive information, and execute
potentially damaging actions within a network, increasing the potential impact of the attack.

You might also like