FINTECH ICAP Sample Paper - Solution
FINTECH ICAP Sample Paper - Solution
You are working as a data scientist in a business consulting firm. Diverse Cars, one of your clients, has provided you
with datasets containing two years' car sales data across Asia, Europe, and the USA. The management of Diverse
Cars wants to analyze these datasets for financial reporting and decision-making purposes.
The datasets provided by Diverse Cars are stored in the CARS.csv and CARSALES.csv files. You use Python to analyze
the data in the Jupyter Notebook.
Required:
In the Jupyter Notebook (CRN.ipynb), write the appropriate Python code for each of the following tasks:
(a) Load the following datasets: (2.5 marks)
(i) CARSALES.csv as csales; and
(ii) CARS.csv as cars
import pandas as pd
# Load datasets
csales = pd.read_csv("CARSALES.csv")
cars = pd.read_csv("CARS.csv")
(b) In csales, change the data type of 'Latest_Launch' from object to 'datetime'. Examine csales to ensure that the
data type has been changed as desired. (04 marks)
csales["Latest_Launch"] = pd.to_datetime(csales["Latest_Launch"])
print(csales["Latest_Launch"].dtype)
(C) Using the 'Latest_Launch' column, add a column to csales namely 'Year'. (03 marks)
csales['Year'] = csales['Latest_Launch'].dt.year
(d) Add a column namely, 'Revenue' and fill it by taking the product of 'Sales_in_thousands' and
'Price_in_thousands'. (2.5 marks)
(e) Use 'Make' and 'Manufacturer' columns of the two datasets cars and csales to create a right join and merge
them. Name the merged data as 'mg_data'. (05 marks)
(f) Using the mg_data, group the data by origin and calculate the total revenue for each origin. Convert the
calculated total revenue to millions. Store the result in a new DataFrame namely, 'origin_revenue'. Print the
'origin_revenue' to show your result. (04 marks)
(g) Create a bar plot showing Revenue by Car Origin. The bar plot should look similar to the following: (04 marks)
# Import matplotlib
import matplotlib.pyplot as plt
plt.figure(figsize=(10, 6))
plt.bar(origin_revenue["Origin"], origin_revenue["Revenue"])
plt.xlabel("Car Origin")
plt.ylabel("Revenue (Millions)")
plt.xticks(rotation=45)
plt.tight_layout()
plt.show()
Using the information of Diverse Cars scenario, select the most appropriate answer for each of the following
multiple choice question
(h) The number of duplicate values in all columns of csales is: (02 marks)
a) 00
b) 2
c) 05
d) 01
csales_duplicates = csales.duplicated().sum()
(i) The number of null values in the 'Fuel_efficiency' column is: (02 marks)
a) 2
b) 03
c) 04
d) 05
(j) The total number of records in the mg_data is: (02 marks)
a) 66,612
b) 67,196
c) 2,058
d) 2.959
total_records_mg_data = len(mg_data)
QUESTION 2
Read the situation and select the most appropriate answer for each of the given multiple choice questions:
XYZ Limited operates a complex supply chain network involving multiple suppliers, manufacturers, distributors, and
retailers across different regions. The existing supply chain faced issues such as delays, data inconsistencies, and
difficulties in tracking the origin of products Additionally, traditional paper-based processes and centralized
databases led to inefficiencies and a lack of real-time visibility
XYZ Limited aims to enhance the efficiency, transparency, and traceability of its supply chain The primary objectives
are to reduce operational costs, mitigate the risk of counterfeit products, and improve overall collaboration among
stakeholders
XYZ Limited has been advised by its management consultant to use Blockchain technologies as it could significantly
reduce processing time across every stop of This process Each transaction indicating a movement of goods would
be recorded, from raw materials to the finished product Documentation would be created, updated, viewed or
venfied by parties on the blockchain, enabling visibility of the entire supply chain
1. In the finance aspect of the supply chain, how can blockchain streamline payment processes between
different parties, and what role do smart contracts play in this context?
a. By increasing manual verification
b. Through seamless and automated payment execution
c. By introducing complex financial instruments
d. Smart contracts have no relevance in payment processes
Smart contracts facilitate automated execution of predefined terms of agreements, ensuring that payments are
made automatically upon fulfillment of conditions.
2. In a permissioned blockchain environment, what role do consensus algorithms play, and how do they
contribute to the integrity of the supply chain data?
a. They regulate access permissions to the blockchain
b. They establish trust between participants and prevent double spending
c. They determine the order of transactions and ensure agreement among nodes
d. They encrypt data to secure it against unauthorized access
Consensus algorithms are essential in permissioned blockchains to establish agreement among nodes regarding the
validity and order of transactions, thus maintaining the integrity of supply chain data.
3. For a permissioned blockchain environment which one of the following should be considered?
a. Bitcoin
b. Ethereum
c. RIpple
d. Hyperledger
Hyperledger is a permissioned blockchain platform designed for enterprise use, making it suitable for implementing
supply chain solutions.
4. What benefit does a full audit trail on the blockchain provide in the supply chain?
a. Increased consumer demand
b. Protection against counterfeit goods
c. Inefficient payment processing
d. Lack of visibility
A full audit trail on the blockchain ensures transparency and traceability, helping to prevent the circulation of
counterfeit goods by providing visibility into the entire supply chain process.
5. What role do loT devices play in enhancing the blockchain-based supply chain system?
a. Ensuring data privacy
b. Providing visibility
c. Facilitating smart contract execution
d. Enhancing traceability
IoT devices can capture real-time data on the movement and condition of goods, enhancing traceability within the
supply chain and ensuring that accurate information is recorded on the blockchain.
6. What role do loT devices play in ensuring product quality within the supply chain?
a. Reduces delay in production
b. Automates order placement
c. Facilitates smart contract execution
d. Provides real-time data on the condition of goods
IoT devices can monitor various parameters such as temperature, humidity, and location in real-time, providing
insights into the quality and condition of products throughout the supply chain.
QUESTION 3
Read the situation and select the most appropriate answer for each of the given multiple choice questions:
NexTech Solutions is engaged in a high-stakes project for ZetaCorp, a global fintech leader facing sophisticated
cyber threats Led by experienced Project Manager Ali, the team is tackling advanced threats targeting ZetaCorp's
proprietary algorithms and financial transaction systems. The project involves a comprehensive risk management
strategy, focusing on emerging threats in digital identity theft and advanced persistent threats (APTS)
Ali's team is conducting an array of penetration tests simulating state-sponsored cyber-attacks, aiming to identify
zero-day vulnerabilities and complex exploit chains The discovered vulnerabilities in ZetaCorp's systems are subtle
and deeply embedded, requiring nuanced understanding and innovative countermeasures Recognizing the
potential for catastrophic data breaches, Ali emphasizes the need for an adaptive and layered approach to disaster
recovery and business continuity, capable of responding to multi-vector attacks and ensuring operational resilience
under extreme scenarios
1. In the context of advanced persistent threats (APTS), what is the significance of 'dwell time'?
a. The time taken to completely remove the threat from the system
b. The period during which a threat remains undetected within a network
c. The duration of a standard penetration test
d. The time required for a system reboot after an attack
Ali's approach focuses on ensuring redundancy and resilience in ZetaCorp's defense mechanisms, allowing the
organization to withstand attacks from various angles.
2. Ali's layered approach to disaster recovery (if one layer of defense is compromised, others can still provide
protection) for ZetaCorp primarily addresses what aspect of cybersecurity?
a. Single-point solution for all cyber threats
b. Redundancy and resilience in the face of diverse attack vectors
c. Compliance with basic security standards
d. Focus on external threats only
Ali's approach focuses on ensuring redundancy and resilience in ZetaCorp's defense mechanisms, allowing the
organization to withstand attacks from various angles.
Authentication weakness typically refers to vulnerabilities associated with the authentication process, such as weak
passwords, phishing attacks, or social engineering exploits, which primarily target human users.
A comprehensive risk management strategy should address both internal and external threat vectors to effectively
mitigate potential risks and vulnerabilities.
5. The adaptability and comprehensiveness of response plans are challenged by multi-vector attacks due to:
a. The simplicity of these attacks
b. Their predictable nature
c. The need to address simultaneous threats across different domains
d. The focus on only digital assets
Multi-vector attacks involve attackers targeting an organization's systems and networks through various methods
simultaneously, making it challenging to respond comprehensively due to the need to address threats across
different domains concurrently.
Longer dwell times indicate that threat actors have more time to explore, gather sensitive information, and execute
potentially damaging actions within a network, increasing the potential impact of the attack.