Search Header Logo

The Risky Knowledge

Authored by charan patcha

Financial Education

Professional Development

Used 1+ times

The Risky Knowledge
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

According to Framework for Identification and Reporting of Risk Incidents (FIRRI), the occurrence of Risk Incident is due to:

Inadequate/Ineffective monitoring/ Supervision

External factors

Failure or absence of controls

Errors/Mistakes/Oversight 

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In the Framework for Identification and Reporting of Risk Incidents, R-Matrix has been introduced for reporting of which type of Incidents:

Business Disruption Impact for External Stakeholders

Internal Business Disruption with regard to General Maintenance, Facilities, and Information Technology issues

Breach of RTLs

Physical Security Threats

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is not part of the Risk Register:

Control Design Gap

Principal Risk Level-II

Risk Description

Risk Tolerance Limits

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Incident Reporting and formulation and review of Risk Registers is being done through the IRIS Portal which is available on the Ekamev application. What is the full form of the IRIS portal:

Incident Reporting Interactive Software

  Integrated Risk Incident Reporting Software

Integrated Risk Management and Incident Reporting Solution

Integrated Risk Monitoring and Incident Reporting System

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The Information Security (IS) policy of the Bank is applicable to all the employees. In addition, identify from the following to which the IS Policy is applicable-

Vendors / Contractors / Support Staff

Ex-employees

Only (i)

Both (i) and (ii)

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

As per the IS policy of the Bank, can open-source software be used for software projects:

No

Yes, with approval of DIT, CO

Yes, with approval of CISO

Yes, can be used as per the requirement of the BA without any approval

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the two types of outsourcing as defined in the Enterprise-wide Outsourcing Risk Management Policy (EORMP):

IT and Non-IT

Confidential and General

Material and General

Core and Non-Core

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?