
The Risky Knowledge
Authored by charan patcha
Financial Education
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
According to Framework for Identification and Reporting of Risk Incidents (FIRRI), the occurrence of Risk Incident is due to:
Inadequate/Ineffective monitoring/ Supervision
External factors
Failure or absence of controls
Errors/Mistakes/Oversight
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In the Framework for Identification and Reporting of Risk Incidents, R-Matrix has been introduced for reporting of which type of Incidents:
Business Disruption Impact for External Stakeholders
Internal Business Disruption with regard to General Maintenance, Facilities, and Information Technology issues
Breach of RTLs
Physical Security Threats
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is not part of the Risk Register:
Control Design Gap
Principal Risk Level-II
Risk Description
Risk Tolerance Limits
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Incident Reporting and formulation and review of Risk Registers is being done through the IRIS Portal which is available on the Ekamev application. What is the full form of the IRIS portal:
Incident Reporting Interactive Software
Integrated Risk Incident Reporting Software
Integrated Risk Management and Incident Reporting Solution
Integrated Risk Monitoring and Incident Reporting System
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
The Information Security (IS) policy of the Bank is applicable to all the employees. In addition, identify from the following to which the IS Policy is applicable-
Vendors / Contractors / Support Staff
Ex-employees
Only (i)
Both (i) and (ii)
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
As per the IS policy of the Bank, can open-source software be used for software projects:
No
Yes, with approval of DIT, CO
Yes, with approval of CISO
Yes, can be used as per the requirement of the BA without any approval
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What are the two types of outsourcing as defined in the Enterprise-wide Outsourcing Risk Management Policy (EORMP):
IT and Non-IT
Confidential and General
Material and General
Core and Non-Core
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Financial Education
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development