Code of Ethics (L0893) : Sunil
Code of Ethics (L0893) : Sunil
Sunil SKA
3
C) Values
D) Procedures
To achieve Sustainability and contribute to communities around, we should: D
A) Be sensitive to social & environmental risks.
B) Ignore social conscience.
C) Conserve natural resources.
D) Both a & c
We should treat our _________ customers fairly regardless of caste, creed, race, religion, disability or gender. C
A) High Net Worth
B) Top 100
C) All
D) Selected
Which of the following statement/s is/are true in respect of ?Bank?s Non-Retaliation Commitment? C
A) Bank strictly prohibits any form of retaliation or intimidation against anyone reporting legitimate concerns.
B) Anyone involved in victimising a person reporting legitimate concerns will be subjected to strict disciplinary
action.
C) Both a & b
D) None of the above
We should be pro-active about minimizing carbon footprint through: D
A) Waste minimisation
B) Pollution prevention
C) Adopting clean technology
D) All of the above
One of the attributes of the ?Sustainability? is A
A) Optimal use of recourses in hand.
B) Non-usage of resources available.
C) Ignorance about resources available.
D) Non-availability of resources
To contribute to the Communities around, we should: D
A) Be sensitive to social & environmental risks
B) Conserve natural resources
C) Connect with communities around - Give back
D) All of the above.
Which of the following statement/s is/are correct in relation to achieve ?Sustainability?. D
A) Commit ourselves to produce positive and lasting impacts in our communities.
B) Continuously engage with the communities around to promote ecological, social and economic
improvements.
C) Embrace opportunities to develop eco-friendly products, services and processes for a sustainable corporate
management.
D) All of the above.
Being a Responsible Corporate Citizen, we should: D
A) Support and encourage people, businesses and institutions to continually reduce environment impact of
their activities for the wellbeing of the society at large.
B) Support and enable people to overcome poverty and shape their own futures by developing sustainable
livelihoods.
C) Provide services beyond banking and contribute to the community development activities in line with Bank’s
norms.
D) All of the above
We should not _______ anything of value for ourselves or for any other individual in return for any business, A
serviceor disclosure of confidential information, except as may specifically be permitted by the applicable
policies.
A) Solicit
B) Refuse
Sunil SKA
4
C) Ignore
D) None of the above
Third parties, dealing with the Bank are also expected to understand that the Code forms part of their B
agreement with the Bank and that a _______ may result in the termination of contract, disqualification from
applying for future contracts or any other suitable action as applicable.
A) Compliance
B) Breach
C) Complaint
D) None of the above
Which of the following statements is/are true in respect of handling conflict of interests: D
A) We should be proactive in identifying and managing conflicts of interest between the Bank and its
stakeholders
B) We should give more importance to our personal interest
C) We should always report a conduct that can be detrimental to the interests of Bank or its stakeholders
D) Both a & c
We should endeavour to channelize the ________ of economic growth to the needy and the marginalised B
through our differentiated banking products & services.
A) Losses
B) Benefits
C) None of the above
D) Both a & b
We should carry out the prescribed _________ for scrutinizing the profiles of potential or current customers or C
counter parties while conducting business.
A) Verification
B) Enquiry
C) Due Diligence
D) None of the above
We should __________ confidential information relating to our customers and third parties as we are responsible B
for keeping it safe and secure.
A) Disclose
B) Protect
C) Partially disclose
D) Share if requested
While processing the transaction of another employee, we shall exercise___________ due diligence as we would A
for any other customer.
A) Same
B) More
C) Less
D) No
We should _________ engage in any political activity or distribute political literature during work hours or from C
the work place or use Banks resources for the same (including Banks email address), unless authorised.
A) Always
B) Actively
C) Not
D) Sometimes
If our conduct does not meet the standards set out in the Code or is illegal, dishonest or unethical, it would A
constitute a breach of the Code and we may be subject to corrective or disciplinary action in terms of the
applicable service rules or contract terms.
A) TRUE
B) FALSE
C) Depends on the type of behaviour
D) Depends on the loss to the Bank
All employees are required to report any violation of the Code of Ethics to: C
Sunil SKA
5
A) Superior/Controller
B) Chief Ethics Officer
C) Either of a or b
D) No reporting of violation required
To serve our customers better we should learn continuously, build skills, share knowledge with each other and B
create a learning experience together. This statement demonstrates which value of STEPS?
A) Transparency
B) Service
C) Sustainability
D) Politeness
As a responsible Banker, we should strive to make banking accessible to ____________ to build a better India. D
A) Business class
B) Upper class
C) Middle class
D) Every Indian
Our work time is also a Banks resource. We should avoid personal activities during work time as these might A
affect our or our colleagues? productivity.
A) TRUE
B) FALSE
C) Depends on how burdened we are with office work
D) Depends on the quality of the work being done.
The Code sets forth minimum standards of __________ the Bank expects all staff members to follow A
A) Behaviour
B) Education
C) Talent
D) Knowledge
The Banks credibility depends on the __________of its books, records & accounting. B
A) Design
B) Integrity
C) Paper quality
D) All of the above
While servicing our customers, "Providing Ease of Convenience" includes: C
A) We should keep our processes simple and prompt.
B) We should address and resolve our customers grievances quickly.
C) Both a & b
D) None of the above
Which of the following statement is incorrect in respect of using technology prudently: D
A) Exercising extreme caution in opening email attachments from unknown or suspicious senders.
B) Accessing only that information / data which is needed to do the job.
C) Making sure that use of Bank s intranet & internet complies with the guidelines.
D) Provide access to office computers to our family members is acceptable
We should have the highest regard for the dignity of ____________ colleagues and ensure with passion that all are C
treated fairly and with respect.
A) Senior
B) Junior
C) All
D) None of the above
Your official email id is Banks asset. A
A) TRUE
B) FALSE
C) Depends on Your Designation D) Depends on the ID
As a Supervisor or Manager, you are vested with added responsibilities by our Code. A
A) TRUE
Sunil SKA
6
B) FALSE
C) Applies to officials working as Branch Heads
D) Applies only to officials working in LHO's/ Corporate Centre
We should offer a polite, courteous and empathetic experience to ____________ customers in their interactions B
with us
A) Selected
B) All
C) New
D) Old
Bank expects its suppliers and other third-party partners including their employees to use ________ processes B
andfollow applicable laws while fulfilling its contractual obligations
A) Economical
B) Environmental friendly
C) Profitable
D) None of the above
We should demonstrate politeness and propriety while interacting with our women colleagues. A
A) TRUE
B) FALSE
C) Depends on local customs and traditions.
D) Depends on the skill of the staff concerned
Conflict of Interest arises when? A
A) Our personal interest interferes with our professional duties.
B) Keep politics out of role & responsibilities.
C) Treat suppliers & vendors fairly.
D) All of the above
In a particular situation, Conflict of Interest may exist D
A) Potentially
B) Actually
C) Perceivably
D) Any of the above
Bank expects your _______________________ to portray good impression. Being well dressed, in a sense, is a mark of C
politeness to our stakeholders.
A) Appearance
B) Behaviour
C) Both a & b
D) None of the above
Bank is committed to providing _______ growth opportunities to all its employees without any discrimination C
based on caste, creed, gender, race or religion.
A) Discriminated
B) Favoured
C) Equal
D) Distinguished
The Bank __________ its intermediaries, suppliers and third-party service providers to comply with the same B
standards of sustainable and responsible business practices as it does.
A) Expects
B) Compels
C) Forces
D) None of the above
Which principles of "STEPS" is about ?Being Responsible with External Stakeholders? and it also covers ?Anti- C
Bribery and Anti-Corruption
A) Service
B) Ethics
C) Transparency
Sunil SKA
7
D) Sustainability
What action should employees take if they come across any evidence of corruption or bribery? A
A) Report it using the whistleblower mechanism
B) Ignore it and carry on with their work
C) Inform their colleagues privately
D) Offer a gift to the involved party to stop such activities
Gifts will not be accepted from a person having official dealings with the Bank. However, .................................. shall D
not be deemed as a gift.
A) Free Transport
B) Free Boarding
C) Free Lodging
D) Casual Meal
All of us should acknowledge the worth of ________ colleagues and appreciate that there are no un important A
colleagues or unimportant roles and everyone has a valuable contribution to make.
A) All
B) Our department's
C) Male
D) Female
We should provide our customers with the best-in-class products, services & solutions to __________. B
A) To increase our market share
B) To suit their needs
C) To derive profit
D) None of the above
What should employees avoid while dealing with customers? C
A) Providing a small gift on special occasions
B) Offering hospitality during business meetings
C) Giving or promising any payment, gift, or gratification
D) Sponsoring charitable events
What will happen if an employee fails to comply with the Anti-Bribery & Anti-Corruption policy? C
A) The Bank will reward them for their honesty.
B) They will receive protection under the whistleblower mechanism.
C) They may face disciplinary action.
D) They will be promoted to a higher position
Cash officer having a tendency of taking out some cash from his hand balance to meet his daily cash A
requirements, and replenish it in the evening. Which value of conduct is hampered here.
A) Ethics
B) Sustainability
C) Service
D) Politeness
Why should employees not fear retaliation when refusing to indulge in acts of corruption? B
A) The Bank supports political contributions.
B) They have the whistleblower mechanism for protection
C) The Bank encourages unethical practices.
D) Refusing to pay for corruption is allowed
Which of the following statement is/are true in respect of ?Accepting& Offering Gifts or Entertainment?? C
A) Ensure that family members do not accept any gift or entertainment on your behalf.
B) Be aware that gift or entertainment too often might suggest the appearance of something improper, even
when there is none.
C) Both 1 & 2
D) None of the above
Gift may be accepted by award staff from friends not having official dealings with the bank on occasions such as A
weddings, anniversaries, funerals or religious functions .Which statement is correct?
A) Value of any single gift received on one such occasion if exceeds Rs 500/- to be reported to competent
Sunil SKA
8
authority
B) Value of any single gift received on one such occasion if exceeds Rs1000/- to be reported to competent
authority
C) Value of any single gift received on one such occasion if exceeds Rs1500/- to be reported to competent
authority
D) Value of any single gift received on one such occasion if exceeds Rs 2500/- to be reported to competent
authority
We should believe in developing a culture which provides a respectful & dignified work environment, is free of A
harassment & discrimination and does not tolerate any kind of misbehaviour.
A) TRUE
B) FALSE
C) Depends on the geographical location of our office.
D) Depends on the local laws and customs
As per the Anti Bribery &Anti Corruption Policy Gift means? B
A) Anything of value (e.g. money, services or other benefits) given in return of a service rendered or product
delivered.
B) Anything of value (e.g. money, services or other benefits) given willingly to somebody without any
consideration for it
C) Unfair preferential treatment to a person or group of persons or organisation(s)
D) A payment to secure or expedite routine actions
An existing supplier has offered a 5 Star holiday package to Manali for awarding a contract to the Regional C
Manager. What should he do?
A) Accept it as business consideration
B) Accept the offer and then make payment
C) Refuse the offer
D) Refer to the controller
A customer has complained that the Bank has recovered charges for issuing statement of account without him B
asking for it. Which value of conduct is breached here.
A) Sustainability
B) Service
C) Politeness
D) Ethics
What is the purpose of the whistleblower mechanism? C
A) To report charitable contributions
B) To report political contributions
C) To report concerns regarding bribery or corruption
D) To provide rewards to whistleblowers
An employee working in a rural branch.is commuting through crowded public transport system to reach the D
branch every day. Is it OK if he wears jeans and t-shirt for work.?
A) Yes; It is allowed
B) Yes; It is allowed on weekends
C) Allowed occasionally as a special case
D) Not allowed
The Terms "S" in STEPS denotes which of these fundamentals? C
A) Service, Suitability
B) Service, Superiority
C) Service, Sustainability
D) Service, Survival
Sunil SKA
9
Sunil SKA
10
A) 1990
B) 1995
C) 1999
D) 2014
COP (Conference of parties) was formed in which year B
A) 1989
B) 1995
C) 1998
D) 1999
COP (Conference of the Parties) is the decision-making body of which organization A
A) UNFCCC
B) UNSC
C) UNESCO
D) UNHRC
COP 26 was held in year 2021 at which place for an agreement between all Paris signatories to set out their C
NDCsto reduce emissions
A) Dubai
B) Paris
C) Glasgow
D) London
Countries need to submit their _______ emission reduction targets, known as Nationally Determined A
Contributions(NDCs), and regularly report on their progress.
A) Voluntary
B) Mandatory
C) Compulsory
D) Self
Discussion Paper (DP) on climate risk and sustainable finance was placed on RBI website on July 27 in which C
year
A) 2020
B) 2021
C) 2022
D) 2023
From FY 2023 - 2024, the top ____ listed entities (by market capitalization) have to make disclosures as per the C
updated BRSR format, as part of their Annual Reports
A) 100
B) 500
C) 1000
D) 2000
Filing of BRSR is mandatory for the top 1000 listed companies (by market capitalization) from which Financial B
year
A) 2021-22
B) 2022-23
C) 2024-25
D) 2027-28
GCF (Green Climate Fund ) is estrablished under framework of which organization D
A) RBI
B) SEBI
C) Indian Govt
D) UNFCCC
Germany has mandated the closure of Coal Fired Power Plants by 2038 is an example of D
A) Physical Risk
B) Environmental Risk
C) Climate Risk
Sunil SKA
11
D) Transition Risk
Global Biofuel Alliance has been launched on the sidelines of the _________ to expedite the global uptake of B
biofuels.
A) COP
B) G-20 Summits
C) G-7
D) BRICS
Green Deposit may be cumulatrive or non cumulitive and denominated in which currency B
A) USD
B) INR
C) Euro
D) All of these
Green Budget will be a part of CDS/KRA since which FY B
A) 2026
B) 2025
C) 2027
D) 2028
How many nations have signed up framework convention of COP 28 C
A) 200
B) 250
C) 197
D) 191
How many activities Code have been developed in CBS and LLMS for Green Activites apart from 9RE C
activitycodes already exits
A) 30
B) 20
C) 38
D) 35
In which year SBI plans to be Net zero in Scope 1 & 2 & 3 A
A) 2055
B) 2030
C) 2047
D) 2043
In which year National Green Hydrogen Mission was approved ? A
A) 2022
B) 2020
C) 2018
D) 2023
In which Financial Year the SBI has published its 1st sustainability report under disclosure practices based on D
BRSR Code and reasonable assurances.
A) 2020-21
B) 2021-22
C) 2022-23
D) 2023-24
India's climate Goal of achieving the Energy independence by which year C
A) 2027
B) 2035
C) 2047
D) 2050
India has set a target of reducing CO2 emission by how many Billion Tonnes by 2030 A
A) 1
B) 2
C) 3
Sunil SKA
12
D) 4
Joe Biden has decided in January 2021 to cancel the Keystone XL pipeline project from Canada to US due to B
reason of
A) Expiry of Agreement between two Nations
B) emmission intensive oil transportation
C) Political reason
D) High Transportation Cost
Key agreements were reached during COP21 in 2015 at ___ A
A) Paris
B) Greece
C) Japan
D) USA
Mission of SBI to facilitate at least 7.5% to 10% of Domestic Gross Advances to be Green Advances by which A
year
A) 2030
B) 2040
C) 2035
D) 2055
NCAP stands for C
A) National committee on Air Pollution
B) National Conference on Air Pollution
C) National Clean Air Programme
D) National committee for Air Projects
NAPCC was launched in the year 2008 to outline a comprehensive strategy to address ________________________ B
A) Global warming
B) Climate Change
C) Flood
D) Draught
National Action Plan on Climate Change (NAPCC) was launched in the year ___, as a comprehensive strategy to C
address climate change.
A) 2014
B) 2019
C) 2008
D) 2012
National Clean Air Program was launched in the year A
A) 2019
B) 2020
C) 2010
D) 2015
National solar mission of India was launched in the year A
A) 2010
B) 2012
C) 2019
D) 2020
National Green Hydrogen Mission is approved on 04th January 2022 by which Nation C
A) United States
B) Russia
C) India
D) France
NCAP stands for C
A) National committee on Air Pollution
B) National Conference on Air Pollution
C) National Clean Air Programme
Sunil SKA
13
Sunil SKA
14
Sunil SKA
15
C) Leadership
D) Clearances
Under Accronym ESG S stands for B
A) Society
B) Social
C) Sovereign
D) standard
Under Panchamrit Goals what is the target for Non Fossil Fuel energy Capacity addition in GW by 2030? B
A) 200
B) 500
C) 700
D) 300
What is the target set for 2030 from Renewable Energy in % of total power capacity ? C
A) 30 percent
B) 40 percent
C) 50 percent
D) 60 percent
Which Banks have till now declared its vision of Carbon neutrality A
A) SBI,HDFC,Indusind Bank
B) UBI PNB SBI
C) SBI HDFC PNB
D) HDFC SBI ICICI
What is the full form of UNFCC ? A
A) United Nations Framework Convention on Climate Change
B) Union Nations Framework Convention on Climate Change
C) United Nations Frame Convention on Climate Change
D) United Kingdom Nations Framework Convention on Climate Change
Which of the following is not the tenure of SBI Green Deposits D
A) 111
B) 1177
C) 222
D) All of these
Sunil SKA
16
Sunil SKA
17
What is Spyware? D
A) Spyware is a type of malware installed on computers that collects information about users without their
knowledge
B) The presence of spyware is typically hidden from the user and can be difficult to detect
C) Spyware programs lurk on your computer to steal important information, like your passwords and loginsand
other personal identification information and then send it off to someone else
D) All options are correct
As per Bank's Cyber Crisis Management Plan what is the definition of cyber space C
A) The interaction of people, software and services on the Bank’s Intranet by means of technology devices and
networks connected to it
B) The interaction of people, software and services on the Internet by means of technology devices andnetworks
connected to it
C) The interaction of people, software and services on the Intranet and Internet by means of technologydevices
and networks connected to it
D) Cyber space not defined by Bank's Cyber Crisis Management Plan
An effective data protection strategy can helps in preventing D
A) data loss
B) data errors
C) data corruption
D) both 1&3
As per Limitation on Personal Data Collection and Use which of the following statement is NOT correct B
A) The consent of the individuals needs to be obtained before collection and storing of data related to them
B) Organisation need to provide monetary compensation to the individuals whose personal data has been
captured
C) The information gathered should be on need-based
D) The data collected should be used for the legitimate purpose for which it was agreed upon
Which of the following is an addition in CIA security triad? B
A) Non-Repetition
B) Non-Repudiation
C) Repudiation
D) Replication
Which standard of BIS dealt with Data Privacy Principles A
A) IS 17428
B) IS 14728
C) BIS not dealt with Data Privacy Principles
D) IS 41728
Which of the following is not an example of social engineering? C
A) Dumpster diving
B) Shoulder surfing
C) Carding
D) Spear phishing
IT Act of India applicable to A
A) whole of India (including the State of Jammu & Kashmir)
B) whole of India (excluding the State of Jammu & Kashmir)
C) It is exclusive for BFSI sector
D) None of the above
As a safety precaution, all mails and files received from external sources should be opened and read. A
A) No, mails from only known and trusted sources should be selected.
B) Yes, if you have the time
C) Yes, it is mandatory
D) No, all mails should be downloaded before reading
Which is a special form of attack using which hackers' exploit human psychology? C
A) Cross Site Scripting
Sunil SKA
18
B) Insecure network
C) Social Engineering
D) Reverse Engineering
While leaving for the day the users should D
A) Save the ongoing work in their desktop
B) Close all the applications in the desktop
C) Shut down the desktop
D) Save the ongoing work, Close all the applications and Shut down the desktop
As per Bank's Information classification policy Manuals, SOP documents should be categorised as D
A) Public
B) Secret
C) Confidential
D) Internal
Which of the following is NOT correct, if you have to share your mobile handset or send it for maintenance D
A) Clear the browsing history
B) Do not allow others to access your mobile phones before logging out from sites
C) Remove the temporary files and the cache file from your handset
D) Do not share your mobile handset at any cost
Loss of portable device should be reported immediately to ______ C
A) The Local Police.
B) To the Appropriate Authority.
C) To Both local police and to the appropriate authority.
D) No need to report to anyone.
What is APT? C
A) Advanced personal Threat
B) Advanced personal Test
C) Advanced Persistent Threat
D) Alive personal Threat
Which of the following is not a common source of precursor or indicator? D
A) Alerts: from intrusion detection and prevention system, SIEM, anti-virus etc.
B) Publicly available information: information on new vulnerabilities and exploits
C) People: internal (e.g. users, system administrators, network administrators, security staff and external
users)
D) Authorized access on server
Which form of social engineering targets specific organization or group? C
A) Vishing
B) Phishing
C) Spear Phishing
D) Pharming
Ensuring the accessibility of the data required to perform business even when this data is lost or damaged, is B
known as
A) Data Availability
B) Data Archival
C) Data leak prevention
D) None of the above
Which section of IT Act covers Identity Theft? B
A) Section 65A
B) Section 66C
C) Section 62
D) Section 70
Which of the following policy tells that "Users should archive important emails for record purposes in their B
device or other media"
A) Microsoft email policy
Sunil SKA
19
Sunil SKA
20
A) Data Protection
B) Data Privacy
C) Data authentication
D) DLP
Which of the following is not the objective of DLP system C
A) Personal Information Protection
B) Data Visibility
C) Storing of sensitive data in encrypted format
D) Intellectual Property Protection
Key Influencer(s) for Information Security D
A) Increase in financial data losses including card data
B) Unauthorized access to bank’s network and systems
C) Loss of personally identifiable information etc.
D) All the above
Personal data must be accurate and kept up to date. It’s important that old data must be securely disposed of A
immediately - Which GDPR principle will suggest this?
A) Accuracy
B) Data minimisation
C) Accountability
D) Storage limitation
Bureau of India Standards (BIS) introduced data privacy assurance standard in the year C
A) 2020
B) 2019
C) 2021
D) There is no such standard
"Organisations must have a specific and legitimate reason for collecting and processing personal information"- C
Which GDPR principle suggests this?
A) Accuracy
B) Data minimisation
C) Purpose limitation
D) Accountability
Section 66B of the IT Act relates to A
A) Stolen device
B) Data theft
C) Intellectual property theft
D) there is no such section in IT Act
Whether Branches/offices of the Bank can connect directly to internet by connecting modem to the systems B
connected to intranet?
A) Yes
B) No
C) Yes, but only on 2 days in a week.
D) Yes, but only on Sundays
Data protection strategy of an organisation will ensure D
A) data collection
B) data storing
C) data handling
D) All the above
Whether users can share the folders in their desktop with other users in the Bank's network C
A) Yes
B) No
C) Yes, if specifically, authorized
D) There is no specific instruction from the Bank
Which of the following is an example of a 'phishing' attack? D
Sunil SKA
21
A) Sending someone an email that contains a malicious link that is disguised to look like an email from
someone the person knows
B) Creating a fake website that looks nearly identical to a real website in order to trick users into entering their
login information
C) Sending someone a text message that contains a malicious link that is disguised to look like a notification
that the person has won a contest
D) All of these are phishing attacks
Which of the following is related to password cracking D
A) APT
B) MITM
C) DOS
D) Brute Force
General Data Protection Regulation law was passed in the year C
A) 2008
B) 2019
C) 2018
D) 1998
IT Act was enacted to provide legal recognition for B
A) Physical bank transactions
B) e-commerce transactions
C) Stock market operations only
D) Financial transactions only
To whom user should report the virus detected and not cleaned by antivirus? C
A) Colleague
B) Keep with yourself
C) Authorized contact persons
D) Vendor
Which section of IT Act provides Indian CERT-In to serve as a national agency for performing functions for A
cybersecurity incidents?
A) Section 70B
B) Section 67
C) Section 65
D) Section 72
Integrity aims B
A) to ensure the protection of the secrecy of data, objects, or resources
B) to protect the reliability, uniformity and correctness of information
C) authorized subjects are granted uninterrupted access to objects
D) assurance to the recipient that the creator or sender cannot deny the validity of ownership of the
communication
What is the penalty for breach of Confidentiality and Privacy as per the Indian IT act? C
A) Imprisonment for a term which may extend to 2 years.
B) Fine which may extend to 1 lakh rupees
C) Fine which may extend to 1 lakh rupees and Imprisonment for a term which may extend to 2 years.
D) None
Choose odd one, if we speak about losses due to cyber attacks C
A) Reputational Loss
B) Financial Loss
C) loss of human intelligence
D) Loss of critical data
Which of the following is not a major challenge faced by banks to strengthen cyber security posture? D
A) Strict Compliance Regulations
B) Third Party Risk
C) Evolving Cyber Threat Landscape
Sunil SKA
22
Sunil SKA
23
Sunil SKA
24
B) SPDI
C) PUBLIC
D) None
This type of attack introduces false or malicious data into cache memory and then enables the attacker to use C
exploit tactics.
A) Cache poisoning
B) Logic bomb
C) DDOS
D) DOS
Redirection to a fraudulent websites without your consent or knowledge is called B
A) Phishing
B) Pharming
C) DDOS
D) Anti virus
All documents containing confidential or secret information should be marked as B
A) Public
B) confidential or "secret"
C) Private
D) None
Confidential or secret information should be ?.......... when transmitted over email C
A) decrypted
B) Hashed
C) encrypted or password protected
D) None
The amendments to the Act came into effect from A
A) October 27, 2009
B) October 27, 2008
C) October 27, 2007
D) None
Some of the key provisions introduced by the IT Amendment Act 2008 include: D
A) Definition of "communication devices
B) Provision for blocking websites
C) Increase in punishment for cybercrime
D) All the above
Amendment of the IT Act on 2008 included terms such as , , D
A) cyber space
B) cyber security
C) cyber security event and cyber security incident
D) All the above
Use of a secure Hashing algorithm for the information ensures B
A) Confidentiality
B) Integrity
C) Availability
D) None
As per Bank's acceptable usage policy which of the following software is not allowed to use C
A) freeware
B) shareware
C) ?both the software
D) any one above software is permitted
employee performance evaluations, CTC details, internal audit reports, etc., treated as C
A) Internal data
B) Sensitive
C) Confidential
Sunil SKA
25
D) Public
Sunil SKA
26
A) Four
B) Three
C) Two
D) None of the above
It is true that P-Gold leads are classified into Hot, Warm and Cold leads based on AI/ML based machined A
learning models?
A) TRUE
B) FALSE
KYC Update, Mobile Update, Cheque Book Request, A/c transfer request, etc. are examples of financial B
transactions.
A) TRUE
B) FALSE
Which of the following statement is not correct for PABL? D
A) Eligible customers are identified after analysing their last 12 months of the customer transaction and
behaviour dat
B) BRE stands for Business Rule Engine.
C) PABL loan repayment tenure is 48 months.
D) Customer needs to visit branch for availing loan
Which type of customers are excluded in the process of SHG/JLG model building? D
A) Bad IRAC and Written-off
B) Non-KYC Compliant customers
C) Customer with Low MAB
D) All of the above
Maximum and minimum amount of loan which can be offered in PABL? C
A) 20,000 & 10 Lakh
B) 50,000 & 10 Lakh
C) 50,000 & 20 Lakh
D) 10,000 & 10 Lakh
What is the full form of NAV? C
A) Net Assessment Value
B) National Asset Value
C) Net Asset Value
D) National Asset Variation
Demat Leads comes under which department? B
A) ABU
B) CVE
C) SMEBU
D) SBI Cap Securities
What is the full form of PABL? D
A) Pre-approved Basic Loan
B) Pre-approved Budget Loan
C) Pre-approved Budgetary Loan
D) Pre-approved Business Loan
What are the three categories in which leads have been categorised in Home Top up loan? C
A) High, Medium, Low
B) Green, Amber, Yellow
C) Hot, Warm, Cold
D) All of the above
How many types of Financial Txns have been used in Footfall Model? C
A) 14
B) 10
C) 18
D) 17
Sunil SKA
28
How many types of Non Financial Txns have been used in Footfall Model? A
A) 15
B) 13
C) 20
D) 10
Who can download P-seg Gold Loan leads? A
A) DGM and above
B) Clerical staff
C) None
D) AGM
SIP stands for A
A) Systematic Investment Plan
B) Simple Investment Plan
C) Simplified Investment Programme
D) Single Investment Plan
Who can access the Leads on the PAPL Dashboard? D
A) Branch Managers
B) Regional Manager
C) DGM and above
D) All of the above
A Branch is categorized as efficient if ____________. C
A) Only Income parameters are efficient.?
B) Only Expense parameters are efficient.?
C) Both Income and Expense parameters are efficient.?
D) Either a or b?
What is the maximum limit of Insta Home Top up loan? B
A) 5 Lakhs
B) 8 Lakhs
C) 10 Lakhs
D) 12 Lakhs
To illustrate the reason behind alert generation in EWS-SME, how many months transactional data behavior B
shown on dashboard?
A) 6 months
B) 12 months
C) Not provided
D) None of the above
Txn per day per staff for branch A is higher than the threshold for its cluster. Branch A is a High Footfall Branch. A
A) TRUE
B) FALSE
Which of the following categories of txns have been used in Footfall Model? D
A) Financial txns only
B) Non-financial txns only
C) Other financial txns only
D) All of the above
Risk Category for branches in Fraud prone dashboard is available for C
A) ORM
B) CRM
C) Both ORM & CRM
D) None
Risk models in Fraud prone branches are available for below BUs: D
A) ABU
B) SMEBU
C) PBBU
Sunil SKA
29
Sunil SKA
30
B) 600
C) 650
D) 700
How often are PAPL leads updated on the Analytics Dashboard? C
A) Daily
B) Weekly
C) Monthly
D) Quarterly
Time series-based library Prophet is being used in SOB model. Which company developed this library? C
A) Google
B) Microsoft
C) Meta (Facebook)
D) Adobe
Where can BM find the list of customers eligible for ATM/ INB in Footfall Dashboard? D
A) Branch Profile
B) Impact Analysis
C) Distribution of accounts
D) Enablers
Which of the txns can be migrated to a Customer Service point? D
A) Cash Deposit
B) Cash Withdrawal
C) Passbook Printing
D) All of the above
Which type of P-seg Gold Loan leads are more likely to avail P-gold loans? C
A) Warm
B) Cold
C) Hot
D) None
Which type of customers are excluded from P-seg Gold Loan leads? B
A) SB account customers
B) Existing P-Gold customers
C) CA customers
D) CSP customers
Which kind of alerts are not being analyzed by SOB model? A
A) OTMS
B) BGL
C) Transactional
D) Non-Transactional
Which methodology is used by the Analytics Department for categorizing the leads in PAPL? C
A) Business Rules
B) Statistical Algorithms
C) Advanced Machine Learning
D) None of the above
Liquid funds are the funds that invest in securities with a maturity period of up to ___________________ days. D
A) 364 days
B) 90 days
C) 120 days
D) 91 days
Which transactional data points is considered in EWS-SME for alert generation? D
A) Limit Utilization
B) Total no. of days delay in servicing the interest
C) Inward and outward cheque returns
D) All of the above
Sunil SKA
31
As per the criteria of lead generation for SBI General Health Insurance, age of customers should be C
A) 30 years and above
B) 55 years and below
C) Age between 30 and 55 years
D) None of the above
New Shikhar model is ensemble of _ different models? C
A) 3
B) 2
C) 5
D) 7
Which among the following are the types of mutual funds? D
A) Equity funds
B) Debt funds
C) Hybrid funds
D) All the above
Which type of data is considered by the Analytics Department for categorizing leads in Sankarma? D
A) Only deposit data
B) Customers current liabilities
C) Vintage of the customer
D) Complete 360-degree view of the customer
Based on the likelihood of availing Home Top up loan, the leads have been categorised in to how many A
categories?
A) 3
B) 2
C) 1
D) None of these
SBI General falls under which BU? B
A) ABU
B) CVEBU
C) REHBU
D) None of the above
Which one of the following is not the characteristic of mutual fund? C
A) Consistent Investment process
B) Strong fund management
C) Diversity in interest rates
D) Differences from the benchmark
What does the Shikhar model deal with? D
A) Spend
B) Activation
C) Spend and Activation
D) Spend, Activation and Risk
How can a request be raised for technical issues in Insta Home Top up loan? D
A) Send an e-mail to RM
B) Send an e-mail to YONO
C) Contact Analytics department officials
D) Raise a ticket on S-core
Who are the certified persons to sell SBI General Insurance? A
A) a. SP
B) b. CIF
C) Both a & b
D) None of the above
Is external data (viz. Credit Bureau) used by Analytics Department for generating the leads? A
A) True
Sunil SKA
32
B) False
What is meant by Footfall at a branch? D
A) No. of Cash Deposits
B) No. of Cash Withdrawals
C) No. of Vouchers
D) No. of customers visiting branch for any service or transaction
Less Engaged customers means: A
A) Customers not engaged in any of the quarter
B) Customers engaged in at least one quarter
C) Customers engaged in one quarter
D) Customers engaged in three quarters
Most Engaged customers are customers who are engaged in ________ quarters. D
A) Customers not engaged in any of the quarter
B) Customers engaged in at least one quarter
C) Customers engaged in one quarter
D) Customers engaged in all four quarters
Mutual Funds are regulated in the country by C
A) IRDA
B) Association of Mutual Funds of India (AMFI)
C) Securities and Exchange Board of India
D) Reserve Bank of India
What is the ideal order for targeting PAPL leads? A
A) Hot -> Warm -> Cold
B) Cold->Warm->Hot
C) Warm->Hot->Cold
D) Warm->Cold ->Hot
Next Best Product leads are available for customers. C
A) Non-salary package
B) Pensioners
C) Salary Package
D) Financial Inclusion
Sunil SKA
33
Generative AI (L0942)
What are the two components of a GAN? A
A) Generator and Discriminator
B) Encoder and Decoder
C) Input and Output
D) Trainer and Tester
What is one of the primary functions of Generative AI in banking according to this eLesson? C
A) Decreasing transaction volume
B) Increasing manual workload
C) Automating SOP creation
D) Reducing the need for AI
Giving an LLM a task with one instruction is called D
A) Zero Shot Prompting
B) Few Shot Example Prompting
C) Chain of Thought Prompting
D) One Shot Prompting
What is the goal of predictive analytics in banking with Generative AI? B
A) To predict hardware failures
B) To offer personalized financial products
C) To increase transaction fees
D) To automate loan disbursement
Which tool is used in SBI's RAG applications for Generative AI? C
A) LLaMA
B) BERT
C) Langchain
D) ChatGPT
What is the main focus of SBI's Generative AI initiative? B
A) Enhancing branch security
B) Improving customer service efficiency
C) Automating HR processes
D) Reducing operational costs
Which feature allows Generative AI to enhance customer experience in banking? D
A) Manual data processing
B) Automated hardware upgrades
C) Increased transaction fees
D) Customizable banking interfaces
Which AI technology is essential for chatbots to understand user inputs? D
A) Robotics
B) Image Processing
C) Data Mining
D) Natural Language Processing (NLP)
In which area has HDFC Bank utilized Generative AI according to the document? B
A) Fraud detection
B) Personalized marketing
C) Loan disbursement
D) Physical branch management
How does Generative AI enhance fraud detection in banking? B
A) By manually reviewing all transactions
B) By analyzing transactional data for anomalies
C) By increasing transaction fees
D) By reducing the number of transactions
What is the significance of 'embedding models' in LLMs? D
A) They optimize hardware performance
Sunil SKA
34
Sunil SKA
35
Sunil SKA
36
Sunil SKA
37
A) Generative AI
B) Discriminative AI
C) Prescriptive AI
D) Descriptive AI
What is a key characteristic of deep learning? C
A) Uses a single layer for data processing
B) Requires manual feature extraction
C) Uses multiple layers of neural networks
D) Operates only on structured data
Which platform is known for providing tools for building generative AI models? A
A) Hugging Face
B) LinkedIn
C) Twitter
D) Facebook
Which AI concept is vital for tasks like sentiment analysis and text summarization? A
A) Embedding Models
B) Convolutional Neural Networks
C) Decision Trees
D) K-Nearest Neighbors
What is 'model quantization' used for in AI? A
A) Reducing the computational cost of models
B) Increasing the accuracy of models
C) Expanding the data storage capacity
D) Enhancing model interpretability
Which ISO standard is dealing with AI System Life Cycle? D
A) ISO 9001:2015
B) ISO 26000:2020
C) ISO 22301:2019
D) ISO 5338:2023
What does GPT stand for in the context of AI? B
A) General Pre-trained Transformer
B) Generative Pre-trained Transformer
C) Graphical Pre-training Technique
D) Generative Predictive Tool
Which of the following is a subset of AI? A
A) Machine Learning
B) Cybersecurity
C) Data Mining
D) Robotics
What is one of the significant impacts of Generative AI on banking operations? B
A) Reduced need for physical branches
B) Enhanced cybersecurity measures
C) Decreased number of transactions
D) Increased manual workload
Which of the following describes a generative model? B
A) It predicts the class of data based on features
B) It generates new data that resembles existing data
C) It classifies data into predefined categories
D) It compresses large datasets for storage
What is the primary role of Generative AI in loan underwriting? B
A) To manually review loan applications
B) To automate the generation of sections of credit memos
C) To approve loans without human intervention
Sunil SKA
38
Sunil SKA
39
Sunil SKA