
The Risky Knowledge
Quiz
•
Financial Education
•
Professional Development
•
Hard
charan patcha
Used 1+ times
FREE Resource
Enhance your content in a minute
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
According to Framework for Identification and Reporting of Risk Incidents (FIRRI), the occurrence of Risk Incident is due to:
Inadequate/Ineffective monitoring/ Supervision
External factors
Failure or absence of controls
Errors/Mistakes/Oversight
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In the Framework for Identification and Reporting of Risk Incidents, R-Matrix has been introduced for reporting of which type of Incidents:
Business Disruption Impact for External Stakeholders
Internal Business Disruption with regard to General Maintenance, Facilities, and Information Technology issues
Breach of RTLs
Physical Security Threats
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is not part of the Risk Register:
Control Design Gap
Principal Risk Level-II
Risk Description
Risk Tolerance Limits
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Incident Reporting and formulation and review of Risk Registers is being done through the IRIS Portal which is available on the Ekamev application. What is the full form of the IRIS portal:
Incident Reporting Interactive Software
Integrated Risk Incident Reporting Software
Integrated Risk Management and Incident Reporting Solution
Integrated Risk Monitoring and Incident Reporting System
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
The Information Security (IS) policy of the Bank is applicable to all the employees. In addition, identify from the following to which the IS Policy is applicable-
Vendors / Contractors / Support Staff
Ex-employees
Only (i)
Both (i) and (ii)
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
As per the IS policy of the Bank, can open-source software be used for software projects:
No
Yes, with approval of DIT, CO
Yes, with approval of CISO
Yes, can be used as per the requirement of the BA without any approval
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What are the two types of outsourcing as defined in the Enterprise-wide Outsourcing Risk Management Policy (EORMP):
IT and Non-IT
Confidential and General
Material and General
Core and Non-Core
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
MINERS Core Values Quiz
Quiz
•
8th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
10 questions
How to Email your Teacher
Quiz
•
Professional Development
15 questions
Order of Operations
Quiz
•
5th Grade
Discover more resources for Financial Education
10 questions
How to Email your Teacher
Quiz
•
Professional Development
21 questions
October 25
Quiz
•
Professional Development
10 questions
October Monthly Quiz
Quiz
•
Professional Development
20 questions
There is There are
Quiz
•
Professional Development
5 questions
SSUSH13
Interactive video
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
