The Risky Knowledge

The Risky Knowledge

Professional Development

30 Qs

quiz-placeholder

Similar activities

NISM Chapter 5 10%

NISM Chapter 5 10%

Professional Development

30 Qs

Final ICICI- Quiz

Final ICICI- Quiz

Professional Development

25 Qs

Invoicing and Payment 2024

Invoicing and Payment 2024

Professional Development

25 Qs

Quiz Diklat Pemeriksaan LKPD TA 2023

Quiz Diklat Pemeriksaan LKPD TA 2023

Professional Development

31 Qs

chapter 4 Quiz

chapter 4 Quiz

Professional Development

25 Qs

FAR-Lease

FAR-Lease

Professional Development

30 Qs

Pick n Play

Pick n Play

Professional Development

30 Qs

The Risky Knowledge

The Risky Knowledge

Assessment

Quiz

Financial Education

Professional Development

Hard

Created by

charan patcha

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

According to Framework for Identification and Reporting of Risk Incidents (FIRRI), the occurrence of Risk Incident is due to:

Inadequate/Ineffective monitoring/ Supervision

External factors

Failure or absence of controls

Errors/Mistakes/Oversight 

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In the Framework for Identification and Reporting of Risk Incidents, R-Matrix has been introduced for reporting of which type of Incidents:

Business Disruption Impact for External Stakeholders

Internal Business Disruption with regard to General Maintenance, Facilities, and Information Technology issues

Breach of RTLs

Physical Security Threats

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is not part of the Risk Register:

Control Design Gap

Principal Risk Level-II

Risk Description

Risk Tolerance Limits

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Incident Reporting and formulation and review of Risk Registers is being done through the IRIS Portal which is available on the Ekamev application. What is the full form of the IRIS portal:

Incident Reporting Interactive Software

  Integrated Risk Incident Reporting Software

Integrated Risk Management and Incident Reporting Solution

Integrated Risk Monitoring and Incident Reporting System

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The Information Security (IS) policy of the Bank is applicable to all the employees. In addition, identify from the following to which the IS Policy is applicable-

Vendors / Contractors / Support Staff

Ex-employees

Only (i)

Both (i) and (ii)

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

As per the IS policy of the Bank, can open-source software be used for software projects:

No

Yes, with approval of DIT, CO

Yes, with approval of CISO

Yes, can be used as per the requirement of the BA without any approval

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the two types of outsourcing as defined in the Enterprise-wide Outsourcing Risk Management Policy (EORMP):

IT and Non-IT

Confidential and General

Material and General

Core and Non-Core

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?