
The Risky Knowledge

Quiz
•
Financial Education
•
Professional Development
•
Hard
charan patcha
Used 1+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
According to Framework for Identification and Reporting of Risk Incidents (FIRRI), the occurrence of Risk Incident is due to:
Inadequate/Ineffective monitoring/ Supervision
External factors
Failure or absence of controls
Errors/Mistakes/Oversight
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In the Framework for Identification and Reporting of Risk Incidents, R-Matrix has been introduced for reporting of which type of Incidents:
Business Disruption Impact for External Stakeholders
Internal Business Disruption with regard to General Maintenance, Facilities, and Information Technology issues
Breach of RTLs
Physical Security Threats
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is not part of the Risk Register:
Control Design Gap
Principal Risk Level-II
Risk Description
Risk Tolerance Limits
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Incident Reporting and formulation and review of Risk Registers is being done through the IRIS Portal which is available on the Ekamev application. What is the full form of the IRIS portal:
Incident Reporting Interactive Software
Integrated Risk Incident Reporting Software
Integrated Risk Management and Incident Reporting Solution
Integrated Risk Monitoring and Incident Reporting System
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
The Information Security (IS) policy of the Bank is applicable to all the employees. In addition, identify from the following to which the IS Policy is applicable-
Vendors / Contractors / Support Staff
Ex-employees
Only (i)
Both (i) and (ii)
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
As per the IS policy of the Bank, can open-source software be used for software projects:
No
Yes, with approval of DIT, CO
Yes, with approval of CISO
Yes, can be used as per the requirement of the BA without any approval
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What are the two types of outsourcing as defined in the Enterprise-wide Outsourcing Risk Management Policy (EORMP):
IT and Non-IT
Confidential and General
Material and General
Core and Non-Core
Create a free account and access millions of resources
Similar Resources on Wayground
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Financial Education
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
5 questions
Setting goals for the year

Quiz
•
Professional Development
14 questions
2019 Logos

Quiz
•
Professional Development
6 questions
GUM Chart Scavenger Hunt

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
20 questions
Employability Skills

Quiz
•
Professional Development