0% found this document useful (0 votes)
553 views39 pages

Code of Ethics (L0893) : Sunil

Ethics for all

Uploaded by

Aravind Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
553 views39 pages

Code of Ethics (L0893) : Sunil

Ethics for all

Uploaded by

Aravind Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

1

Code of Ethics (L0893)


To stop Money Laundering, we should not: D
A) Assist, directly or indirectly, to launder money
B) Tip off a person who is subject of a suspicious transaction
C) Destroy records that are potentially relevant
D) All of the above
We should keep the values of STEPS in mind and treat _____________ with respect to protect our reputation. C
A) Colleagues
B) Customers
C) All Colleagues & Customers
D) Senior Colleagues only
We should hold on to the Bank’s ethical standards even when off-duty as we know that our off-duty conduct is A
seen in association with the Bank and impacts its reputation.
A) TRUE
B) FALSE
C) Differ from person to person
D) Depends on the particular situation.
The expression ?gift? shall include free transport, boarding, lodging or other service or any other pecuniary A
advantage when provided by any person who have official dealings with the Bank.
A) TRUE
B) FALSE
C) True except for free transport
D) True except for boarding /lodging
Which of the following statement/s is/are correct in respect of ?Safeguarding SBI Assets & Resources?: C
A) We must protect the Bank?s assets & resources, tangible as well as intangible from theft, waste, misuse ,loss
and damage.
B) We must use the Bank?s assets & resources prudently, both physical and intellectual, for approved purposes
only.
C) Both a & b
D) None of the above
To promote an inclusive & empowering culture, we should not: C
A) Indulge in abuse of human rights in any form- obvious or subtle.
B) Avoid reporting a hazardous condition in work place.
C) Both a & b
D) None of the above
In situations when we are uncertain on how to proceed, we can refer to: D
A) Ethical Decision-Making Guide
B) Seniors
C) Chief Ethics officer
D) All of the above
While attending to our customers, we should not: D
A) Hide any fact about Banks products or services.
B) Compromise with quality of service in any situation.
C) Ever delay in redressing the customer grievances.
D) All of the above
What is 'GARIMA' ? A
A) Bank's Policy on Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal)
B) Bank's Policy on Work Life Balance
C) Bank's Promotion Policy for Women Employees
D) None of the above
While serving our customers, we should: D
A) Listen with empathy
B) Focus on customers needs
Sunil SKA
2

C) Keep ourselves updated to respond to customers queries


D) All of the above
The Code applies to ______________ in the Bank regardless of their location or classification as regular, contractual B
or part-time.
A) Award Staff
B) All Staff Members
C) Supervisory Staff
D) Subordinate Staff
We should build and maintain positive and co-operative relationships with colleagues and connect with them B
with empathy like an __________.
A) External Customer
B) Internal Customer
C) Customer
D) All of the above
For growing together to deliver better, we should not: D
A) Ignore any feedback from Seniors, Juniors or Colleagues
B) Shirk collaboration
C) Stop being curious
D) All of the above
By pursuing digital excellence and telling customers about benefits of online channels, we can make D
banking_________
A) Simpler
B) Time saving
C) Reliable
D) All of the above
Not tolerating any kind of harassment, discrimination or intimidating behaviour at workplace falls under which C
principle of 'Politeness'
A) Being polite with peers & colleagues- senior or junior
B) Acting with empathy & passion
C) Promoting an inclusive & empowering culture
D) Being polite in treating customers
____________ with the Code of Ethics is a key requirement for the Bank staff along with adherence to other D
applicable laws, regulations, policies and processes.
A) Non-compliance
B) Defiance
C) Dis-agreement
D) Compliance
While using Banks assets & resources, we should not: D
A) Use Banks resources that would lead to violation of any applicable rule, policy, guidelines or law.
B) Use name or logo of the Bank for any personal communication.
C) Install or download unauthorized software, freeware applications, hardware or storage devices on Banks
computer, laptops or similar electronic devices.
D) All of the above.
When we talk about the principle -Handling Conflicts of Interest- Actual, Potential or Perceived, what is that we D
should not do ?
A) Using position to derive personal benefits
B) Viewing customer information for non- business reasons.
C) Engaging in insider trading or letting family members do so.
D) All of the above
Our __________ establish a set of ethical principles that are instrumental in founding and nurturing a common C
organizational culture.
A) Vision
B) Mission

Sunil SKA
3

C) Values
D) Procedures
To achieve Sustainability and contribute to communities around, we should: D
A) Be sensitive to social & environmental risks.
B) Ignore social conscience.
C) Conserve natural resources.
D) Both a & c
We should treat our _________ customers fairly regardless of caste, creed, race, religion, disability or gender. C
A) High Net Worth
B) Top 100
C) All
D) Selected
Which of the following statement/s is/are true in respect of ?Bank?s Non-Retaliation Commitment? C
A) Bank strictly prohibits any form of retaliation or intimidation against anyone reporting legitimate concerns.
B) Anyone involved in victimising a person reporting legitimate concerns will be subjected to strict disciplinary
action.
C) Both a & b
D) None of the above
We should be pro-active about minimizing carbon footprint through: D
A) Waste minimisation
B) Pollution prevention
C) Adopting clean technology
D) All of the above
One of the attributes of the ?Sustainability? is A
A) Optimal use of recourses in hand.
B) Non-usage of resources available.
C) Ignorance about resources available.
D) Non-availability of resources
To contribute to the Communities around, we should: D
A) Be sensitive to social & environmental risks
B) Conserve natural resources
C) Connect with communities around - Give back
D) All of the above.
Which of the following statement/s is/are correct in relation to achieve ?Sustainability?. D
A) Commit ourselves to produce positive and lasting impacts in our communities.
B) Continuously engage with the communities around to promote ecological, social and economic
improvements.
C) Embrace opportunities to develop eco-friendly products, services and processes for a sustainable corporate
management.
D) All of the above.
Being a Responsible Corporate Citizen, we should: D
A) Support and encourage people, businesses and institutions to continually reduce environment impact of
their activities for the wellbeing of the society at large.
B) Support and enable people to overcome poverty and shape their own futures by developing sustainable
livelihoods.
C) Provide services beyond banking and contribute to the community development activities in line with Bank’s
norms.
D) All of the above
We should not _______ anything of value for ourselves or for any other individual in return for any business, A
serviceor disclosure of confidential information, except as may specifically be permitted by the applicable
policies.
A) Solicit
B) Refuse

Sunil SKA
4

C) Ignore
D) None of the above
Third parties, dealing with the Bank are also expected to understand that the Code forms part of their B
agreement with the Bank and that a _______ may result in the termination of contract, disqualification from
applying for future contracts or any other suitable action as applicable.
A) Compliance
B) Breach
C) Complaint
D) None of the above
Which of the following statements is/are true in respect of handling conflict of interests: D
A) We should be proactive in identifying and managing conflicts of interest between the Bank and its
stakeholders
B) We should give more importance to our personal interest
C) We should always report a conduct that can be detrimental to the interests of Bank or its stakeholders
D) Both a & c
We should endeavour to channelize the ________ of economic growth to the needy and the marginalised B
through our differentiated banking products & services.
A) Losses
B) Benefits
C) None of the above
D) Both a & b
We should carry out the prescribed _________ for scrutinizing the profiles of potential or current customers or C
counter parties while conducting business.
A) Verification
B) Enquiry
C) Due Diligence
D) None of the above
We should __________ confidential information relating to our customers and third parties as we are responsible B
for keeping it safe and secure.
A) Disclose
B) Protect
C) Partially disclose
D) Share if requested
While processing the transaction of another employee, we shall exercise___________ due diligence as we would A
for any other customer.
A) Same
B) More
C) Less
D) No
We should _________ engage in any political activity or distribute political literature during work hours or from C
the work place or use Banks resources for the same (including Banks email address), unless authorised.
A) Always
B) Actively
C) Not
D) Sometimes
If our conduct does not meet the standards set out in the Code or is illegal, dishonest or unethical, it would A
constitute a breach of the Code and we may be subject to corrective or disciplinary action in terms of the
applicable service rules or contract terms.
A) TRUE
B) FALSE
C) Depends on the type of behaviour
D) Depends on the loss to the Bank
All employees are required to report any violation of the Code of Ethics to: C

Sunil SKA
5

A) Superior/Controller
B) Chief Ethics Officer
C) Either of a or b
D) No reporting of violation required
To serve our customers better we should learn continuously, build skills, share knowledge with each other and B
create a learning experience together. This statement demonstrates which value of STEPS?
A) Transparency
B) Service
C) Sustainability
D) Politeness
As a responsible Banker, we should strive to make banking accessible to ____________ to build a better India. D
A) Business class
B) Upper class
C) Middle class
D) Every Indian
Our work time is also a Banks resource. We should avoid personal activities during work time as these might A
affect our or our colleagues? productivity.
A) TRUE
B) FALSE
C) Depends on how burdened we are with office work
D) Depends on the quality of the work being done.
The Code sets forth minimum standards of __________ the Bank expects all staff members to follow A
A) Behaviour
B) Education
C) Talent
D) Knowledge
The Banks credibility depends on the __________of its books, records & accounting. B
A) Design
B) Integrity
C) Paper quality
D) All of the above
While servicing our customers, "Providing Ease of Convenience" includes: C
A) We should keep our processes simple and prompt.
B) We should address and resolve our customers grievances quickly.
C) Both a & b
D) None of the above
Which of the following statement is incorrect in respect of using technology prudently: D
A) Exercising extreme caution in opening email attachments from unknown or suspicious senders.
B) Accessing only that information / data which is needed to do the job.
C) Making sure that use of Bank s intranet & internet complies with the guidelines.
D) Provide access to office computers to our family members is acceptable
We should have the highest regard for the dignity of ____________ colleagues and ensure with passion that all are C
treated fairly and with respect.
A) Senior
B) Junior
C) All
D) None of the above
Your official email id is Banks asset. A
A) TRUE
B) FALSE
C) Depends on Your Designation D) Depends on the ID
As a Supervisor or Manager, you are vested with added responsibilities by our Code. A
A) TRUE

Sunil SKA
6

B) FALSE
C) Applies to officials working as Branch Heads
D) Applies only to officials working in LHO's/ Corporate Centre
We should offer a polite, courteous and empathetic experience to ____________ customers in their interactions B
with us
A) Selected
B) All
C) New
D) Old
Bank expects its suppliers and other third-party partners including their employees to use ________ processes B
andfollow applicable laws while fulfilling its contractual obligations
A) Economical
B) Environmental friendly
C) Profitable
D) None of the above
We should demonstrate politeness and propriety while interacting with our women colleagues. A
A) TRUE
B) FALSE
C) Depends on local customs and traditions.
D) Depends on the skill of the staff concerned
Conflict of Interest arises when? A
A) Our personal interest interferes with our professional duties.
B) Keep politics out of role & responsibilities.
C) Treat suppliers & vendors fairly.
D) All of the above
In a particular situation, Conflict of Interest may exist D
A) Potentially
B) Actually
C) Perceivably
D) Any of the above
Bank expects your _______________________ to portray good impression. Being well dressed, in a sense, is a mark of C
politeness to our stakeholders.
A) Appearance
B) Behaviour
C) Both a & b
D) None of the above
Bank is committed to providing _______ growth opportunities to all its employees without any discrimination C
based on caste, creed, gender, race or religion.
A) Discriminated
B) Favoured
C) Equal
D) Distinguished
The Bank __________ its intermediaries, suppliers and third-party service providers to comply with the same B
standards of sustainable and responsible business practices as it does.
A) Expects
B) Compels
C) Forces
D) None of the above
Which principles of "STEPS" is about ?Being Responsible with External Stakeholders? and it also covers ?Anti- C
Bribery and Anti-Corruption
A) Service
B) Ethics
C) Transparency

Sunil SKA
7

D) Sustainability
What action should employees take if they come across any evidence of corruption or bribery? A
A) Report it using the whistleblower mechanism
B) Ignore it and carry on with their work
C) Inform their colleagues privately
D) Offer a gift to the involved party to stop such activities
Gifts will not be accepted from a person having official dealings with the Bank. However, .................................. shall D
not be deemed as a gift.
A) Free Transport
B) Free Boarding
C) Free Lodging
D) Casual Meal
All of us should acknowledge the worth of ________ colleagues and appreciate that there are no un important A
colleagues or unimportant roles and everyone has a valuable contribution to make.
A) All
B) Our department's
C) Male
D) Female
We should provide our customers with the best-in-class products, services & solutions to __________. B
A) To increase our market share
B) To suit their needs
C) To derive profit
D) None of the above
What should employees avoid while dealing with customers? C
A) Providing a small gift on special occasions
B) Offering hospitality during business meetings
C) Giving or promising any payment, gift, or gratification
D) Sponsoring charitable events
What will happen if an employee fails to comply with the Anti-Bribery & Anti-Corruption policy? C
A) The Bank will reward them for their honesty.
B) They will receive protection under the whistleblower mechanism.
C) They may face disciplinary action.
D) They will be promoted to a higher position
Cash officer having a tendency of taking out some cash from his hand balance to meet his daily cash A
requirements, and replenish it in the evening. Which value of conduct is hampered here.
A) Ethics
B) Sustainability
C) Service
D) Politeness
Why should employees not fear retaliation when refusing to indulge in acts of corruption? B
A) The Bank supports political contributions.
B) They have the whistleblower mechanism for protection
C) The Bank encourages unethical practices.
D) Refusing to pay for corruption is allowed
Which of the following statement is/are true in respect of ?Accepting& Offering Gifts or Entertainment?? C
A) Ensure that family members do not accept any gift or entertainment on your behalf.
B) Be aware that gift or entertainment too often might suggest the appearance of something improper, even
when there is none.
C) Both 1 & 2
D) None of the above
Gift may be accepted by award staff from friends not having official dealings with the bank on occasions such as A
weddings, anniversaries, funerals or religious functions .Which statement is correct?
A) Value of any single gift received on one such occasion if exceeds Rs 500/- to be reported to competent

Sunil SKA
8

authority
B) Value of any single gift received on one such occasion if exceeds Rs1000/- to be reported to competent
authority
C) Value of any single gift received on one such occasion if exceeds Rs1500/- to be reported to competent
authority
D) Value of any single gift received on one such occasion if exceeds Rs 2500/- to be reported to competent
authority
We should believe in developing a culture which provides a respectful & dignified work environment, is free of A
harassment & discrimination and does not tolerate any kind of misbehaviour.
A) TRUE
B) FALSE
C) Depends on the geographical location of our office.
D) Depends on the local laws and customs
As per the Anti Bribery &Anti Corruption Policy Gift means? B
A) Anything of value (e.g. money, services or other benefits) given in return of a service rendered or product
delivered.
B) Anything of value (e.g. money, services or other benefits) given willingly to somebody without any
consideration for it
C) Unfair preferential treatment to a person or group of persons or organisation(s)
D) A payment to secure or expedite routine actions
An existing supplier has offered a 5 Star holiday package to Manali for awarding a contract to the Regional C
Manager. What should he do?
A) Accept it as business consideration
B) Accept the offer and then make payment
C) Refuse the offer
D) Refer to the controller
A customer has complained that the Bank has recovered charges for issuing statement of account without him B
asking for it. Which value of conduct is breached here.
A) Sustainability
B) Service
C) Politeness
D) Ethics
What is the purpose of the whistleblower mechanism? C
A) To report charitable contributions
B) To report political contributions
C) To report concerns regarding bribery or corruption
D) To provide rewards to whistleblowers
An employee working in a rural branch.is commuting through crowded public transport system to reach the D
branch every day. Is it OK if he wears jeans and t-shirt for work.?
A) Yes; It is allowed
B) Yes; It is allowed on weekends
C) Allowed occasionally as a special case
D) Not allowed
The Terms "S" in STEPS denotes which of these fundamentals? C
A) Service, Suitability
B) Service, Superiority
C) Service, Sustainability
D) Service, Survival

Sunil SKA
9

ESG & Climate Finance (L0941)


_____________seeks disclosures from listed entities on their performance against the nine principles of the B
National Guidelines on Responsible Business Conduct? (NGBRCs).
A) Indian Government
B) BRSR
C) RBI
D) SEBI
_________ agreement established a common reporting platform to track progress and assess effectiveness of B
climate actions.
A) Dubai
B) Paris
C) Greece
D) Delhi
____ is the first Public Sector Bank to publish its Sustainability Report in the year 2016 C
A) PNB
B) Bank of Baroda
C) SBI
D) Union Bank of India
A unique department within the Bank, drawing expertise as well as possible representation from various B
departments
A) Surya Ghar
B) ESG & CFU
C) SMEBU
D) GBU
Affordable Home Loan is mapped to which sustainability Goal B
A) SDG 9
B) SDG 11
C) SDG 13
D) SDG 16
As such, amount mobilised under Green Deposit can be used to finance eligible ------------ activities/projects B
only.
A) Infrastructure
B) Green
C) Thermal
D) Nuclear
Bank is voluntarily submitting response on two key ESG rating agencies namely C
A) Moodys
B) EY
C) DJSI and CDP.
D) CARE
Carbon Offsets is to be initiated by Bank since which year as per ESG commitment and to increase gradually C
tillnet zero
A) 2024
B) 2025
C) 2026
D) 2023
CDP ( Formerly Carbon Disclosure Project) assesses responding companies and provides scores across four A
consecutive levels and it s provide rating for leadership, Management ,Awareness and Disclosure in form of
A) ABCD
B) AAA-
C) AAA
D) BBB
COP was formed in which year ? B

Sunil SKA
10

A) 1990
B) 1995
C) 1999
D) 2014
COP (Conference of parties) was formed in which year B
A) 1989
B) 1995
C) 1998
D) 1999
COP (Conference of the Parties) is the decision-making body of which organization A
A) UNFCCC
B) UNSC
C) UNESCO
D) UNHRC
COP 26 was held in year 2021 at which place for an agreement between all Paris signatories to set out their C
NDCsto reduce emissions
A) Dubai
B) Paris
C) Glasgow
D) London
Countries need to submit their _______ emission reduction targets, known as Nationally Determined A
Contributions(NDCs), and regularly report on their progress.
A) Voluntary
B) Mandatory
C) Compulsory
D) Self
Discussion Paper (DP) on climate risk and sustainable finance was placed on RBI website on July 27 in which C
year
A) 2020
B) 2021
C) 2022
D) 2023
From FY 2023 - 2024, the top ____ listed entities (by market capitalization) have to make disclosures as per the C
updated BRSR format, as part of their Annual Reports
A) 100
B) 500
C) 1000
D) 2000
Filing of BRSR is mandatory for the top 1000 listed companies (by market capitalization) from which Financial B
year
A) 2021-22
B) 2022-23
C) 2024-25
D) 2027-28
GCF (Green Climate Fund ) is estrablished under framework of which organization D
A) RBI
B) SEBI
C) Indian Govt
D) UNFCCC
Germany has mandated the closure of Coal Fired Power Plants by 2038 is an example of D
A) Physical Risk
B) Environmental Risk
C) Climate Risk

Sunil SKA
11

D) Transition Risk
Global Biofuel Alliance has been launched on the sidelines of the _________ to expedite the global uptake of B
biofuels.
A) COP
B) G-20 Summits
C) G-7
D) BRICS
Green Deposit may be cumulatrive or non cumulitive and denominated in which currency B
A) USD
B) INR
C) Euro
D) All of these
Green Budget will be a part of CDS/KRA since which FY B
A) 2026
B) 2025
C) 2027
D) 2028
How many nations have signed up framework convention of COP 28 C
A) 200
B) 250
C) 197
D) 191
How many activities Code have been developed in CBS and LLMS for Green Activites apart from 9RE C
activitycodes already exits
A) 30
B) 20
C) 38
D) 35
In which year SBI plans to be Net zero in Scope 1 & 2 & 3 A
A) 2055
B) 2030
C) 2047
D) 2043
In which year National Green Hydrogen Mission was approved ? A
A) 2022
B) 2020
C) 2018
D) 2023
In which Financial Year the SBI has published its 1st sustainability report under disclosure practices based on D
BRSR Code and reasonable assurances.
A) 2020-21
B) 2021-22
C) 2022-23
D) 2023-24
India's climate Goal of achieving the Energy independence by which year C
A) 2027
B) 2035
C) 2047
D) 2050
India has set a target of reducing CO2 emission by how many Billion Tonnes by 2030 A
A) 1
B) 2
C) 3

Sunil SKA
12

D) 4
Joe Biden has decided in January 2021 to cancel the Keystone XL pipeline project from Canada to US due to B
reason of
A) Expiry of Agreement between two Nations
B) emmission intensive oil transportation
C) Political reason
D) High Transportation Cost
Key agreements were reached during COP21 in 2015 at ___ A
A) Paris
B) Greece
C) Japan
D) USA
Mission of SBI to facilitate at least 7.5% to 10% of Domestic Gross Advances to be Green Advances by which A
year
A) 2030
B) 2040
C) 2035
D) 2055
NCAP stands for C
A) National committee on Air Pollution
B) National Conference on Air Pollution
C) National Clean Air Programme
D) National committee for Air Projects
NAPCC was launched in the year 2008 to outline a comprehensive strategy to address ________________________ B
A) Global warming
B) Climate Change
C) Flood
D) Draught
National Action Plan on Climate Change (NAPCC) was launched in the year ___, as a comprehensive strategy to C
address climate change.
A) 2014
B) 2019
C) 2008
D) 2012
National Clean Air Program was launched in the year A
A) 2019
B) 2020
C) 2010
D) 2015
National solar mission of India was launched in the year A
A) 2010
B) 2012
C) 2019
D) 2020
National Green Hydrogen Mission is approved on 04th January 2022 by which Nation C
A) United States
B) Russia
C) India
D) France
NCAP stands for C
A) National committee on Air Pollution
B) National Conference on Air Pollution
C) National Clean Air Programme

Sunil SKA
13

D) National committee for Air Projects


One of the Highlights of Paris agreement was to commit to limiting global warming to ____ degrees Celsius B
A) 2.5
B) 2
C) 1.5
D) 1
Pradhan Mantri Kisan Samman Nidhi (PM-KISAN) was Launched in the year _____, to provide income support to C
farmers, which can indirectly help in adopting climate-resilient agricultural practices
A) 2014
B) 2016
C) 2019
D) 2021
RBI issued a Broad framework for acceptance of Green Deposits in which year B
A) 2021
B) 2023
C) 2020
D) 2022
Reputational Risk stems from associations with __________emmissions Industries A
A) High
B) Very High
C) Low
D) Very Low
SBI e-Mudra is mapped to which sustainability Goal A
A) SDG 9
B) SDG 11
C) SDG 13
D) SDG 15
SDG-8 is mapped to which products of our Bank under Sustainable Development Goal C
A) Affordable Housing
B) SBI E-Mudra
C) PM Vishwakarma Scheme
D) Yono Krishi
SDG -11 is mapped to which products under sustianable Development Goal C
A) Yono Krishi
B) SHG Financing
C) Affordable Housing
D) Green Car Loan
SEBI vide circular SEBI/LAD-NRO/GN/2021/22 dated May 05, 2021 has introduced new reporting requirements A
on ESG parameters which is called
A) BRSR
B) GRI
C) TCFD
D) UNSDGs
Some investors who are actively embracing sustainability investment are known as C
A) Safe Investment
B) High return Investment
C) Green Investment
D) Long term investment
Some investors are actively embracing sustainability investments, known as __ B
A) Green Deposits
B) Green investments
C) Green bonds
D) Green equity

Sunil SKA
14

Sustainability is often broken into three core concepts named as A


A) Economic, environmental, and social.
B) Economic, environmental, and globalization
C) Equality, environmental, and social.
D) Economic, Social justics and social.
Sustainability report also incorporates mandatory regulatory disclosures as per ____ guidelines on Business A
Responsibility and Sustainability Reporting ( BRSR).
A) SEBI
B) NSE
C) BSE
D) RBI
Sustainability Development Goals (SDG?s) were appointed in which year B
A) 2014
B) 2015
C) 2020
D) 2021
The Fund mobiled under SBI Green Deposit will be deployed by Bank for which Projects B
A) Any
B) Green
C) Brown
D) None
The Partcipating Countries in COP 21 has decided to limit the global warming below ------degree celcius above D
pre industry level to limit it to 1.50 degree celcius
A) 3
B) 4
C) 1.75
D) 2
There are two sub types of climatic risks namely B
A) Environmental risk & Pollution Risk
B) Physical Risk & Transition Risks
C) Transaction Risk & Statutory Risk
D) Legal Risk & Fraud Risk
Top ___________ listed entities shall mandatorily undertake reasonable assurance of the BRSR Core w.e.f FY 2023- C
24.
A) 200
B) 250
C) 150
D) 350
Transition risks results from economic transforamtion to __________________transformation D
A) Non economic
B) Geographical
C) Zero
D) Net Zero
The BRSR seeks disclosures from listed entities on their performance against the ____ principles of the National A
Guidelines on Responsible Business Conduct? (NGBRCs)
A) Nine
B) Seven
C) Five
D) Three
The scores earned by the Company under ESG rating represent the steps a company moves through as it B
progresses towards environmental __________
A) Awareness
B) Stewardship

Sunil SKA
15

C) Leadership
D) Clearances
Under Accronym ESG S stands for B
A) Society
B) Social
C) Sovereign
D) standard
Under Panchamrit Goals what is the target for Non Fossil Fuel energy Capacity addition in GW by 2030? B
A) 200
B) 500
C) 700
D) 300
What is the target set for 2030 from Renewable Energy in % of total power capacity ? C
A) 30 percent
B) 40 percent
C) 50 percent
D) 60 percent
Which Banks have till now declared its vision of Carbon neutrality A
A) SBI,HDFC,Indusind Bank
B) UBI PNB SBI
C) SBI HDFC PNB
D) HDFC SBI ICICI
What is the full form of UNFCC ? A
A) United Nations Framework Convention on Climate Change
B) Union Nations Framework Convention on Climate Change
C) United Nations Frame Convention on Climate Change
D) United Kingdom Nations Framework Convention on Climate Change
Which of the following is not the tenure of SBI Green Deposits D
A) 111
B) 1177
C) 222
D) All of these

Sunil SKA
16

IS & Cyber Security (L0922)


What is anti-malware? C
A) A bigger and more dangerous virus
B) Software used to duplicate viruses
C) Computer software used to prevent, detect and remove malicious software
D) A biological agent that reproduces itself inside the cells of living things
Social Engineering is B
A) Hacking the system by exploiting technical vulnerabilities of the network
B) Attacking or penetrating a system by employing confidence tricks on users, rather than by means of a
technical attack.
C) Attack on the Social Networking sites
D) None of these
Which kind of malware restricts users from accessing their system or certain critical files, until a demanded B
sumis paid?
A) Trojan Horse
B) Ransomware
C) Worm
D) Adware
Which of the following is not recommended as per Bank`s password security policy? B
A) Password should be changed at least once in 90 days.
B) Password should be kept in written copy to remember.
C) Users should ensure that nobody is watching when they are entering password into the system.
D) Strong password should be used with combination of special characters, numbers and alphabets.
As per Bank's Cyber Crisis Management Plan what is the definition of cyber space C
A) The interaction of people, software and services on the Bank’s Intranet by means of technology devices and
networks connected to it
B) The interaction of people, software and services on the Internet by means of technology devices and
networks connected to it
C) The interaction of people, software and services on the Intranet and Internet by means of technology devices
and networks connected to it
D) Cyber space not defined by Bank's Cyber Crisis Management Plan
Which of the following is not best practice when we speak about endpoint security C
A) Desktop should be in Active Directory
B) Desktop should have NAC implemented
C) Desktop may have unapproved software running (in contingencies)
D) Desktop must have updated Anti-virus software
Emails that are -------- should be used for critical transactions requiring legal authentication of sender. A
A) Digitally signed
B) Encrypted
C) Hashed
D) None of these are true.
What type of social engineering is this? You receive an E-mail from some unknown person claiming to be C
representative of your bank and asking for your account number and password so that they can fix your
account.
A) Shoulder Surfing
B) Mountaineering
C) Phishing
D) Trekking
Clear desk and clear screen policy reduce the risks of D
A) unauthorized access, loss of and damage to information during and outside normal working hours
B) unauthorized access, loss of and damage to information during working hours only
C) ensure protection of unauthorized access to sensitive data.
D) both 1 & 3

Sunil SKA
17

What is Spyware? D
A) Spyware is a type of malware installed on computers that collects information about users without their
knowledge
B) The presence of spyware is typically hidden from the user and can be difficult to detect
C) Spyware programs lurk on your computer to steal important information, like your passwords and loginsand
other personal identification information and then send it off to someone else
D) All options are correct
As per Bank's Cyber Crisis Management Plan what is the definition of cyber space C
A) The interaction of people, software and services on the Bank’s Intranet by means of technology devices and
networks connected to it
B) The interaction of people, software and services on the Internet by means of technology devices andnetworks
connected to it
C) The interaction of people, software and services on the Intranet and Internet by means of technologydevices
and networks connected to it
D) Cyber space not defined by Bank's Cyber Crisis Management Plan
An effective data protection strategy can helps in preventing D
A) data loss
B) data errors
C) data corruption
D) both 1&3
As per Limitation on Personal Data Collection and Use which of the following statement is NOT correct B
A) The consent of the individuals needs to be obtained before collection and storing of data related to them
B) Organisation need to provide monetary compensation to the individuals whose personal data has been
captured
C) The information gathered should be on need-based
D) The data collected should be used for the legitimate purpose for which it was agreed upon
Which of the following is an addition in CIA security triad? B
A) Non-Repetition
B) Non-Repudiation
C) Repudiation
D) Replication
Which standard of BIS dealt with Data Privacy Principles A
A) IS 17428
B) IS 14728
C) BIS not dealt with Data Privacy Principles
D) IS 41728
Which of the following is not an example of social engineering? C
A) Dumpster diving
B) Shoulder surfing
C) Carding
D) Spear phishing
IT Act of India applicable to A
A) whole of India (including the State of Jammu & Kashmir)
B) whole of India (excluding the State of Jammu & Kashmir)
C) It is exclusive for BFSI sector
D) None of the above
As a safety precaution, all mails and files received from external sources should be opened and read. A
A) No, mails from only known and trusted sources should be selected.
B) Yes, if you have the time
C) Yes, it is mandatory
D) No, all mails should be downloaded before reading
Which is a special form of attack using which hackers' exploit human psychology? C
A) Cross Site Scripting

Sunil SKA
18

B) Insecure network
C) Social Engineering
D) Reverse Engineering
While leaving for the day the users should D
A) Save the ongoing work in their desktop
B) Close all the applications in the desktop
C) Shut down the desktop
D) Save the ongoing work, Close all the applications and Shut down the desktop
As per Bank's Information classification policy Manuals, SOP documents should be categorised as D
A) Public
B) Secret
C) Confidential
D) Internal
Which of the following is NOT correct, if you have to share your mobile handset or send it for maintenance D
A) Clear the browsing history
B) Do not allow others to access your mobile phones before logging out from sites
C) Remove the temporary files and the cache file from your handset
D) Do not share your mobile handset at any cost
Loss of portable device should be reported immediately to ______ C
A) The Local Police.
B) To the Appropriate Authority.
C) To Both local police and to the appropriate authority.
D) No need to report to anyone.
What is APT? C
A) Advanced personal Threat
B) Advanced personal Test
C) Advanced Persistent Threat
D) Alive personal Threat
Which of the following is not a common source of precursor or indicator? D
A) Alerts: from intrusion detection and prevention system, SIEM, anti-virus etc.
B) Publicly available information: information on new vulnerabilities and exploits
C) People: internal (e.g. users, system administrators, network administrators, security staff and external
users)
D) Authorized access on server
Which form of social engineering targets specific organization or group? C
A) Vishing
B) Phishing
C) Spear Phishing
D) Pharming
Ensuring the accessibility of the data required to perform business even when this data is lost or damaged, is B
known as
A) Data Availability
B) Data Archival
C) Data leak prevention
D) None of the above
Which section of IT Act covers Identity Theft? B
A) Section 65A
B) Section 66C
C) Section 62
D) Section 70
Which of the following policy tells that "Users should archive important emails for record purposes in their B
device or other media"
A) Microsoft email policy

Sunil SKA
19

B) Policy Regarding Usage of Communication Media


C) Cyber policy
D) No policy speaks about email related aspects
As per Bank's Information classification policy Customer Information will be classified as D
A) Internal
B) Public
C) Secret
D) Confidential
The organisation must take into consideration of various factors while developing the privacy policy of the C
organisation regarding the data collected or processed. Which one of the following need not be considered?
A) Jurisdiction
B) Statutory obligations,
C) GDPR
D) Business requirements
Whether Branches/offices of the bank are allowed to connect their intranet systems directly to the internet B
through a modem or through wi-fi?
A) Yes
B) No
C) Yes, but only on 2 days in a week.
D) Yes, but only on Sundays
"Data must be adequate, relevant and limited to what is necessary in relation to the purposes for which they are B
processed.” - Which GDPR principle will suggest this?
A) Storage limitation
B) Data minimisation
C) Purpose limitation
D) Accuracy
Which section of IT act provides Indian CERT ? In to serve as national agency for performing functions for cyber A
security incidents?
A) Section 70B
B) Section 67
C) Section 65
D) Section 72
In which year Indian Data Protection law enacted C
A) 2021
B) 2019
C) Not yet enacted
D) 2008
Whether a user should disrupt the auto virus scan on their desktop? B
A) Yes
B) No
C) Yes, if it slows down system performance and inform System Official
D) Yes, on vendors recommendation
In the event of a stolen or lost official laptop/device, the concerned staff should C
A) File a complaint with the police
B) Notify his /her manager immediately.
C) Both 1 &2
D) No immediate action required
As per Indian IT act punishment for dishonestly receives or retains any stolen device shall be A
A) Maximum three years imprisonment or maximum fine of rupees one lakh or with both.
B) Maximum two years imprisonment or maximum fine of rupees one lakh or with both.
C) Either two years imprisonment or maximum fine of rupees one lakh
D) It is not an offence as per said IT Act
which of the following defines "who has access to data" B

Sunil SKA
20

A) Data Protection
B) Data Privacy
C) Data authentication
D) DLP
Which of the following is not the objective of DLP system C
A) Personal Information Protection
B) Data Visibility
C) Storing of sensitive data in encrypted format
D) Intellectual Property Protection
Key Influencer(s) for Information Security D
A) Increase in financial data losses including card data
B) Unauthorized access to bank’s network and systems
C) Loss of personally identifiable information etc.
D) All the above
Personal data must be accurate and kept up to date. It’s important that old data must be securely disposed of A
immediately - Which GDPR principle will suggest this?
A) Accuracy
B) Data minimisation
C) Accountability
D) Storage limitation
Bureau of India Standards (BIS) introduced data privacy assurance standard in the year C
A) 2020
B) 2019
C) 2021
D) There is no such standard
"Organisations must have a specific and legitimate reason for collecting and processing personal information"- C
Which GDPR principle suggests this?
A) Accuracy
B) Data minimisation
C) Purpose limitation
D) Accountability
Section 66B of the IT Act relates to A
A) Stolen device
B) Data theft
C) Intellectual property theft
D) there is no such section in IT Act
Whether Branches/offices of the Bank can connect directly to internet by connecting modem to the systems B
connected to intranet?
A) Yes
B) No
C) Yes, but only on 2 days in a week.
D) Yes, but only on Sundays
Data protection strategy of an organisation will ensure D
A) data collection
B) data storing
C) data handling
D) All the above
Whether users can share the folders in their desktop with other users in the Bank's network C
A) Yes
B) No
C) Yes, if specifically, authorized
D) There is no specific instruction from the Bank
Which of the following is an example of a 'phishing' attack? D

Sunil SKA
21

A) Sending someone an email that contains a malicious link that is disguised to look like an email from
someone the person knows
B) Creating a fake website that looks nearly identical to a real website in order to trick users into entering their
login information
C) Sending someone a text message that contains a malicious link that is disguised to look like a notification
that the person has won a contest
D) All of these are phishing attacks
Which of the following is related to password cracking D
A) APT
B) MITM
C) DOS
D) Brute Force
General Data Protection Regulation law was passed in the year C
A) 2008
B) 2019
C) 2018
D) 1998
IT Act was enacted to provide legal recognition for B
A) Physical bank transactions
B) e-commerce transactions
C) Stock market operations only
D) Financial transactions only
To whom user should report the virus detected and not cleaned by antivirus? C
A) Colleague
B) Keep with yourself
C) Authorized contact persons
D) Vendor
Which section of IT Act provides Indian CERT-In to serve as a national agency for performing functions for A
cybersecurity incidents?
A) Section 70B
B) Section 67
C) Section 65
D) Section 72
Integrity aims B
A) to ensure the protection of the secrecy of data, objects, or resources
B) to protect the reliability, uniformity and correctness of information
C) authorized subjects are granted uninterrupted access to objects
D) assurance to the recipient that the creator or sender cannot deny the validity of ownership of the
communication
What is the penalty for breach of Confidentiality and Privacy as per the Indian IT act? C
A) Imprisonment for a term which may extend to 2 years.
B) Fine which may extend to 1 lakh rupees
C) Fine which may extend to 1 lakh rupees and Imprisonment for a term which may extend to 2 years.
D) None
Choose odd one, if we speak about losses due to cyber attacks C
A) Reputational Loss
B) Financial Loss
C) loss of human intelligence
D) Loss of critical data
Which of the following is not a major challenge faced by banks to strengthen cyber security posture? D
A) Strict Compliance Regulations
B) Third Party Risk
C) Evolving Cyber Threat Landscape

Sunil SKA
22

D) More resources are required


User should mark the email as ------------ in the subject line of the email containing secret or confidential B
information.
A) Secret
B) Confidential
C) Secret and Confidential.
D) Private and Confidential.
As per Bank's Information classification policy employee contact details should be categorised as B
A) Public
B) Internal
C) Confidential
D) Secret
A prominent data protection and privacy law of European Union is B
A) General Data Protection Rules
B) General Data Protection Regulation
C) General Data Privacy Regulation
D) None of the above
When a cyber incident is not considered Cyber Crisis for organization? D
A) The IT resource is threatened or attacked or compromised.
B) The IT resource is accessed/monitored/modified without authorisation.
C) The IT resource is used in a manner inconsistent with the established organization/regulatory policy
resulting in a real or possible loss of confidentiality, integrity or availability of the IT resource or information
D) Employee personal mail account is hacked
What is penalty for breach of Confidentiality and Privacy as per IT act? C
A) Imprisonment for a term which may extend to 2 years.
B) Fine which may extend to 1 lakh rupees
C) Fine which may extend to 1 lakh rupees and Imprisonment for a term which may extend to 2 years.
D) None
Which kind of malware is a software that restricts users from accessing their system or certain files until B
aransom is paid?
A) Trojan Horse
B) Ransomware
C) Worm
D) Adware
What does the "https://" at the beginning of a URL denote, as opposed to "http://" (without the 's')? B
A) That the site has special high definition
B) That information entered into the site is encrypted
C) That the site is the newest version available
D) That the site is not accessible to certain computers
Which of the following statements is True? D
A) Users may enter the password into the system while other staff members watching .
B) Users may ask others (including customers and colleagues) for their passwords for ease of operation.
C) User may keep a written copy (in paper or electronic form) of password in easily locatable places for easy
remembering.
D) Users should not share their passwords with anyone including colleagues and IT staff.
Goal of Integrity is: B
A) to ensure the protection of the secrecy of data, objects, or resources
B) to protect the reliability, uniformity and correctness of information
C) authorized subjects are granted uninterrupted access to objects
D) assurance to the recipient that the creator or sender cannot deny the validity of ownership of the
communication
Which of the following is a proper use of email? A
A) Never email personal information

Sunil SKA
23

B) Send out pricelists for your home-based business products


C) Forward inspirational and humorous emails to your co-workers to brighten their day
D) Send an email to all your friends and co-workers to advertise a job opening in your area
Which section in IT Act deals with obscenity as offence in electronic form? D
A) Section 62
B) Section 65
C) Section 72
D) Section 67
Which of the below is an addition in CIA security triad? B
A) Non-Repetition
B) Non-Repudiation
C) Repudiation
D) Replication
Which is the most appropriate method to prevent unauthorized access to your desktop if you are leaving your A
work station for a short duration?
A) Lock the desktop using Windows key + L
B) Cover the workstation with some object
C) Lock the system with iron chain and lock
D) Shut down the desktop
What is an antivirus? C
A) A bigger and more dangerous virus
B) Software used to duplicate viruses
C) Computer software used to prevent, detect and remove malicious software
D) A biological agent that reproduces itself inside the cells of living things
Which of the below is not best practice for desktops? C
A) Desktop should be in Active Directory
B) Desktop should have NAC implemented
C) Desktop may have unapproved software running
D) Desktop must have updated Anti-virus software
Which of the following attacks is conducted by targeting user`s password? D
A) APT
B) MITM
C) DOS
D) Brute Force
Which of the following is NOT correct about PIN D
A) Avoid choosing PIN that are obvious, that is birthdays , telephone numbers, part of account numbers etc
B) Always choose unique PIN numbers and destroy the PIN mailer after memorizing or changing the PIN after
first usage
C) Do not disclose your ATM PIN to anybody, not even to a Bank employee.
D) Your PIN should be 6-digit number
If the personal data is no longer needed for which it was attained, it should be deleted or destroyed unless D
there isa reason for retaining it. Which GDPR principle will suggest this?
A) Data minimisation
B) Purpose limitation
C) Accountability
D) Storage limitation
CERT-In A
A) Computer emergency Response Team – India
B) Computer emergency Required Team – India
C) Computer engineering Response Team – India
D) None
Financial information, Health information, Biometric data, Genetic data falls under A
A) PII

Sunil SKA
24

B) SPDI
C) PUBLIC
D) None
This type of attack introduces false or malicious data into cache memory and then enables the attacker to use C
exploit tactics.
A) Cache poisoning
B) Logic bomb
C) DDOS
D) DOS
Redirection to a fraudulent websites without your consent or knowledge is called B
A) Phishing
B) Pharming
C) DDOS
D) Anti virus
All documents containing confidential or secret information should be marked as B
A) Public
B) confidential or "secret"
C) Private
D) None
Confidential or secret information should be ?.......... when transmitted over email C
A) decrypted
B) Hashed
C) encrypted or password protected
D) None
The amendments to the Act came into effect from A
A) October 27, 2009
B) October 27, 2008
C) October 27, 2007
D) None
Some of the key provisions introduced by the IT Amendment Act 2008 include: D
A) Definition of "communication devices
B) Provision for blocking websites
C) Increase in punishment for cybercrime
D) All the above
Amendment of the IT Act on 2008 included terms such as , , D
A) cyber space
B) cyber security
C) cyber security event and cyber security incident
D) All the above
Use of a secure Hashing algorithm for the information ensures B
A) Confidentiality
B) Integrity
C) Availability
D) None
As per Bank's acceptable usage policy which of the following software is not allowed to use C
A) freeware
B) shareware
C) ?both the software
D) any one above software is permitted
employee performance evaluations, CTC details, internal audit reports, etc., treated as C
A) Internal data
B) Sensitive
C) Confidential

Sunil SKA
25

D) Public

Sunil SKA
26

Data Analytics (L0938)


Demat Dashboard is based on A
A) SB Accounts
B) CA Accounts
C) Customer Numbers
D) All of the above
SOB analyses how many months of Data? D
A) 3 months
B) 12 months
C) 8 months
D) 6 months
The risk categories of branches available at fraud prone branches are based on C
A) Intuition based
B) RADAR model
C) Machine learning model
D) None
EWS-SME dashboard is developed for customers with total exposure of B
A) Rs. 1 Cr and above
B) Rs. 25 lacs and above
C) Rs. 25 lacs and below
D) Rs. 10 Cr and above
EWS-SME dashboard is beneficial and facilitates working of D
A) Supervising staff
B) Branch staff
C) Relationship Managers
D) All of the above
From where can customers avail PAPL loan? D
A) YONO
B) INB/YONO Lite
C) YONO and SBI Quick
D) YONO and INB
How can branches utilize Current account churn alerts dashboard published on Analytics website? C
A) Branches can close likely to churn current accounts.
B) Branches can know non-performing current accounts.
C) Branches can reach out to the leads and understand the reasons for decline in business, use the information
to improve services, pitch new products for improving engagement and overall business.
D) None of the above
How many categories of branches are there in Footfall Reduction Model? A
A) 2
B) 4
C) 3
D) None of the above
How many risk categories branches are divided into in Fraud prone model? B
A) 5
B) 4
C) 9
D) 3
How often are the PABL leads updated on the Analytics Dashboard? C
A) Daily
B) Weekly
C) Monthly
D) Quarterly
In how many categories, degree of Risk is categorized in SB Churn Model? B
Sunil SKA
27

A) Four
B) Three
C) Two
D) None of the above
It is true that P-Gold leads are classified into Hot, Warm and Cold leads based on AI/ML based machined A
learning models?
A) TRUE
B) FALSE
KYC Update, Mobile Update, Cheque Book Request, A/c transfer request, etc. are examples of financial B
transactions.
A) TRUE
B) FALSE
Which of the following statement is not correct for PABL? D
A) Eligible customers are identified after analysing their last 12 months of the customer transaction and
behaviour dat
B) BRE stands for Business Rule Engine.
C) PABL loan repayment tenure is 48 months.
D) Customer needs to visit branch for availing loan
Which type of customers are excluded in the process of SHG/JLG model building? D
A) Bad IRAC and Written-off
B) Non-KYC Compliant customers
C) Customer with Low MAB
D) All of the above
Maximum and minimum amount of loan which can be offered in PABL? C
A) 20,000 & 10 Lakh
B) 50,000 & 10 Lakh
C) 50,000 & 20 Lakh
D) 10,000 & 10 Lakh
What is the full form of NAV? C
A) Net Assessment Value
B) National Asset Value
C) Net Asset Value
D) National Asset Variation
Demat Leads comes under which department? B
A) ABU
B) CVE
C) SMEBU
D) SBI Cap Securities
What is the full form of PABL? D
A) Pre-approved Basic Loan
B) Pre-approved Budget Loan
C) Pre-approved Budgetary Loan
D) Pre-approved Business Loan
What are the three categories in which leads have been categorised in Home Top up loan? C
A) High, Medium, Low
B) Green, Amber, Yellow
C) Hot, Warm, Cold
D) All of the above
How many types of Financial Txns have been used in Footfall Model? C
A) 14
B) 10
C) 18
D) 17

Sunil SKA
28

How many types of Non Financial Txns have been used in Footfall Model? A
A) 15
B) 13
C) 20
D) 10
Who can download P-seg Gold Loan leads? A
A) DGM and above
B) Clerical staff
C) None
D) AGM
SIP stands for A
A) Systematic Investment Plan
B) Simple Investment Plan
C) Simplified Investment Programme
D) Single Investment Plan
Who can access the Leads on the PAPL Dashboard? D
A) Branch Managers
B) Regional Manager
C) DGM and above
D) All of the above
A Branch is categorized as efficient if ____________. C
A) Only Income parameters are efficient.?
B) Only Expense parameters are efficient.?
C) Both Income and Expense parameters are efficient.?
D) Either a or b?
What is the maximum limit of Insta Home Top up loan? B
A) 5 Lakhs
B) 8 Lakhs
C) 10 Lakhs
D) 12 Lakhs
To illustrate the reason behind alert generation in EWS-SME, how many months transactional data behavior B
shown on dashboard?
A) 6 months
B) 12 months
C) Not provided
D) None of the above
Txn per day per staff for branch A is higher than the threshold for its cluster. Branch A is a High Footfall Branch. A
A) TRUE
B) FALSE
Which of the following categories of txns have been used in Footfall Model? D
A) Financial txns only
B) Non-financial txns only
C) Other financial txns only
D) All of the above
Risk Category for branches in Fraud prone dashboard is available for C
A) ORM
B) CRM
C) Both ORM & CRM
D) None
Risk models in Fraud prone branches are available for below BUs: D
A) ABU
B) SMEBU
C) PBBU

Sunil SKA
29

D) All of the above


Which customers are excluded from YONO activation model? A
A) Customers who are inactive across all banking channels for 3 months
B) Customers who are inactive across all banking channels for 1 months
C) Customers who are inactive across all banking channels for 6 months
D) Customers who are inactive across all banking channels for 2 months
In SB Churn model, for which of the below features month on month trend is observed? A
A) Monthly average balance
B) Monthly debit amount
C) End of day balance
D) All the above
Which among the following is an End-to-End digital loan disbursed through YONO? B
A) Home Top up Loan
B) Insta Home Top up Loan
C) None of these
D) Both a & b
What is the frequency of SHG/JLG dashboard refresh? B
A) Monthly
B) Quarterly
C) Half Yearly
D) Yearly
What are the models built by Analytics department for SBI General Insurance? C
A) Health Insurance
B) Motor Insurance
C) Both a & b
D) None of the above
SHG/JLG?s Dashboard is placed under which Tab of Analytics Portal? C
A) PBBU
B) CVE
C) ABU
D) SMEBU
Which type of customers are not part of complex lead generation process in P-Gold loan leads? C
A) Age>=18 and <=68
B) IRAC status <=3
C) Existing P-Gold customers
D) Average Quarterly Balance is greater than 0 and less than 1,50,000
On which parameter, branches have been categorised into High / Low Footfall? D
A) No. of Cash Deposits
B) No. of staff
C) No. of working days
D) Avg. txn per day per staff
Overheads come under__________. B
A) Income Parameter?
B) Expense Parameter?
C) Other Parameter?
D) None of the above?
Which type of accounts are excluded in the building of SB churn model? D
A) Staff accounts
B) Pension accounts
C) Salary package accounts
D) All of the above
What is the minimum credit bureau score of a lead on the Insta Home Top up Dashboard? C
A) 550

Sunil SKA
30

B) 600
C) 650
D) 700
How often are PAPL leads updated on the Analytics Dashboard? C
A) Daily
B) Weekly
C) Monthly
D) Quarterly
Time series-based library Prophet is being used in SOB model. Which company developed this library? C
A) Google
B) Microsoft
C) Meta (Facebook)
D) Adobe
Where can BM find the list of customers eligible for ATM/ INB in Footfall Dashboard? D
A) Branch Profile
B) Impact Analysis
C) Distribution of accounts
D) Enablers
Which of the txns can be migrated to a Customer Service point? D
A) Cash Deposit
B) Cash Withdrawal
C) Passbook Printing
D) All of the above
Which type of P-seg Gold Loan leads are more likely to avail P-gold loans? C
A) Warm
B) Cold
C) Hot
D) None
Which type of customers are excluded from P-seg Gold Loan leads? B
A) SB account customers
B) Existing P-Gold customers
C) CA customers
D) CSP customers
Which kind of alerts are not being analyzed by SOB model? A
A) OTMS
B) BGL
C) Transactional
D) Non-Transactional
Which methodology is used by the Analytics Department for categorizing the leads in PAPL? C
A) Business Rules
B) Statistical Algorithms
C) Advanced Machine Learning
D) None of the above
Liquid funds are the funds that invest in securities with a maturity period of up to ___________________ days. D
A) 364 days
B) 90 days
C) 120 days
D) 91 days
Which transactional data points is considered in EWS-SME for alert generation? D
A) Limit Utilization
B) Total no. of days delay in servicing the interest
C) Inward and outward cheque returns
D) All of the above

Sunil SKA
31

As per the criteria of lead generation for SBI General Health Insurance, age of customers should be C
A) 30 years and above
B) 55 years and below
C) Age between 30 and 55 years
D) None of the above
New Shikhar model is ensemble of _ different models? C
A) 3
B) 2
C) 5
D) 7
Which among the following are the types of mutual funds? D
A) Equity funds
B) Debt funds
C) Hybrid funds
D) All the above
Which type of data is considered by the Analytics Department for categorizing leads in Sankarma? D
A) Only deposit data
B) Customers current liabilities
C) Vintage of the customer
D) Complete 360-degree view of the customer
Based on the likelihood of availing Home Top up loan, the leads have been categorised in to how many A
categories?
A) 3
B) 2
C) 1
D) None of these
SBI General falls under which BU? B
A) ABU
B) CVEBU
C) REHBU
D) None of the above
Which one of the following is not the characteristic of mutual fund? C
A) Consistent Investment process
B) Strong fund management
C) Diversity in interest rates
D) Differences from the benchmark
What does the Shikhar model deal with? D
A) Spend
B) Activation
C) Spend and Activation
D) Spend, Activation and Risk
How can a request be raised for technical issues in Insta Home Top up loan? D
A) Send an e-mail to RM
B) Send an e-mail to YONO
C) Contact Analytics department officials
D) Raise a ticket on S-core
Who are the certified persons to sell SBI General Insurance? A
A) a. SP
B) b. CIF
C) Both a & b
D) None of the above
Is external data (viz. Credit Bureau) used by Analytics Department for generating the leads? A
A) True

Sunil SKA
32

B) False
What is meant by Footfall at a branch? D
A) No. of Cash Deposits
B) No. of Cash Withdrawals
C) No. of Vouchers
D) No. of customers visiting branch for any service or transaction
Less Engaged customers means: A
A) Customers not engaged in any of the quarter
B) Customers engaged in at least one quarter
C) Customers engaged in one quarter
D) Customers engaged in three quarters
Most Engaged customers are customers who are engaged in ________ quarters. D
A) Customers not engaged in any of the quarter
B) Customers engaged in at least one quarter
C) Customers engaged in one quarter
D) Customers engaged in all four quarters
Mutual Funds are regulated in the country by C
A) IRDA
B) Association of Mutual Funds of India (AMFI)
C) Securities and Exchange Board of India
D) Reserve Bank of India
What is the ideal order for targeting PAPL leads? A
A) Hot -> Warm -> Cold
B) Cold->Warm->Hot
C) Warm->Hot->Cold
D) Warm->Cold ->Hot
Next Best Product leads are available for customers. C
A) Non-salary package
B) Pensioners
C) Salary Package
D) Financial Inclusion

Sunil SKA
33

Generative AI (L0942)
What are the two components of a GAN? A
A) Generator and Discriminator
B) Encoder and Decoder
C) Input and Output
D) Trainer and Tester
What is one of the primary functions of Generative AI in banking according to this eLesson? C
A) Decreasing transaction volume
B) Increasing manual workload
C) Automating SOP creation
D) Reducing the need for AI
Giving an LLM a task with one instruction is called D
A) Zero Shot Prompting
B) Few Shot Example Prompting
C) Chain of Thought Prompting
D) One Shot Prompting
What is the goal of predictive analytics in banking with Generative AI? B
A) To predict hardware failures
B) To offer personalized financial products
C) To increase transaction fees
D) To automate loan disbursement
Which tool is used in SBI's RAG applications for Generative AI? C
A) LLaMA
B) BERT
C) Langchain
D) ChatGPT
What is the main focus of SBI's Generative AI initiative? B
A) Enhancing branch security
B) Improving customer service efficiency
C) Automating HR processes
D) Reducing operational costs
Which feature allows Generative AI to enhance customer experience in banking? D
A) Manual data processing
B) Automated hardware upgrades
C) Increased transaction fees
D) Customizable banking interfaces
Which AI technology is essential for chatbots to understand user inputs? D
A) Robotics
B) Image Processing
C) Data Mining
D) Natural Language Processing (NLP)
In which area has HDFC Bank utilized Generative AI according to the document? B
A) Fraud detection
B) Personalized marketing
C) Loan disbursement
D) Physical branch management
How does Generative AI enhance fraud detection in banking? B
A) By manually reviewing all transactions
B) By analyzing transactional data for anomalies
C) By increasing transaction fees
D) By reducing the number of transactions
What is the significance of 'embedding models' in LLMs? D
A) They optimize hardware performance
Sunil SKA
34

B) They compress data for storage


C) They enhance image quality
D) They represent the meaning and context of text
What is the purpose of fine-tuning a pre-trained language model? A
A) To improve its performance on specific tasks
B) To increase its training speed
C) To reduce its memory footprint
D) To enhance its ability to generate music
Which model is most suitable for generating text based on user prompts? A
A) GPT
B) GAN
C) VAE
D) CNN
Which mathematical concept is considered an early implementation of Generative AI? A
A) Markov Chain
B) Laplace Transforms
C) Turing Machines
D) GARCH Models
What is a key feature of Wells Fargo's virtual assistant, Fargo? B
A) Manages customer investments
B) Provides insights into spending
C) Conducts loan underwriting
D) Approves new account openings
Which of the following is a key learning from HDFC Bank's use of Generative AI? D
A) Increased reliance on traditional methods
B) Increased manual intervention is necessary
C) Reduced need for personalized marketing
D) Continuous improvement is essential for relevance
What does GAN stand for? A
A) Generative Adversarial Network
B) Generalized Artificial Network
C) Graphical Artificial Neural network
D) Global Adaptive Network
Which of the following is NOT a generative AI model? C
A) GAN
B) GPT
C) CNN
D) VAE
Which AI model is effective in reducing the problem of 'hallucination'? A
A) RAG (Retrieval Augmented Generation)
B) SVM
C) Decision Trees
D) Logistic Regression
Which one of the following is not a LLM fine tuning method? D
A) PEFT
B) LORA
C) QLORA
D) RNN
Which method is used by Generative AI to improve customer service in banking? B
A) Manual data entry
B) Personalized recommendations based on financial history
C) Physical customer interactions
D) Increasing transaction fees

Sunil SKA
35

Which of the following models was introduced by OpenAI in 2018? A


A) GPT-1
B) GPT-2
C) GPT-3
D) GPT-4
Which version of GPT was a quantum leap in content generation capabilities? D
A) GPT-4
B) GPT-1
C) GPT-2
D) GPT-3
When was OpenAI introduced its first version, GPT1? D
A) 2022
B) 2024
C) 2020
D) 2018
Which company has launched the Gemini LLM? C
A) Apple
B) Microsoft
C) Google
D) Amazon
Who coined the term 'Artificial Intelligence'? B
A) Alan Turing
B) John McCarthy
C) Marvin Minsky
D) Elon Musk
Which one of initiatives of our Strategic Training Unit is being enhanced using Generative AI? D
A) Certification Programmes
B) Gyansetu
C) Gyanodaya
D) askSBI
Which platform provides a framework for building production-ready LLM applications? D
A) Facebook
B) LinkedIn
C) Twitter
D) Haystack
What is the main function of the 'generator' in a GAN? D
A) To encrypt data
B) To classify data
C) To store data
D) To create new data
Which model architecture uses 'attention' mechanisms? A
A) Transformer
B) RNN
C) CNN
D) SVM
Which AI technology helps in creating SOPs at large scale in banking? B
A) Machine Learning
B) Generative AI
C) Data Mining
D) Blockchain
Which aspect of customer service is enhanced by Generative AI chatbots? B
A) Physical customer interactions
B) Speed and personalization of responses

Sunil SKA
36

C) Manual data entry processes


D) Reducing the number of customer service representatives
Which of the following tasks can be automated by Generative AI in customer service? B
A) Conducting physical audits
B) Handling payment reminders and billing inquiries
C) Performing manual data entry
D) Designing physical branches
Which of the following is an application of generative AI? D
A) Image compression
B) Data encryption
C) Signal processing
D) Text generation
Which of the following is a disadvantage of generative AI? D
A) Simplified data analysis
B) High data processing speed
C) Enhanced accuracy in predictions
D) Potential to generate unrealistic content
What is one of the benefits of using Generative AI in SOP generation for banks? C
A) Reduced need for data analysis
B) Increased manual workload
C) Streamlined SOP creation
D) Decreased operational efficiency
Which feature of Generative AI helps in generating SOPs automatically? D
A) Automated hardware maintenance
B) Manual review of documents
C) Increased staffing
D) Data pattern analysis
What is the outcome of using Generative AI for marketing in HDFC Bank? C
A) Decreased customer engagement
B) Increased operational costs
C) Delivered personalized content
D) Increased employee workload
What does the Generative AI chatbot at Wells Fargo help customers with? B
A) Physical banking transactions
B) Everyday banking tasks like bill payments
C) Stock market investments
D) Property management
What is a 'token' in the context of LLMs? A
A) Basic unit of data processing
B) Encryption key
C) Storage identifier
D) Random number generator
What does Commonwealth Bank of Australia aim to improve with the use of Generative AI? B
A) Physical infrastructure
B) Customer experiences and cybersecurity
C) Automated billing processes
D) Financial reporting accuracy
Python is a A
A) Programming Language
B) Operating System
C) Big Data Framework
D) Vector database
Which type of AI is responsible for content creation like text, images, and videos? A

Sunil SKA
37

A) Generative AI
B) Discriminative AI
C) Prescriptive AI
D) Descriptive AI
What is a key characteristic of deep learning? C
A) Uses a single layer for data processing
B) Requires manual feature extraction
C) Uses multiple layers of neural networks
D) Operates only on structured data
Which platform is known for providing tools for building generative AI models? A
A) Hugging Face
B) LinkedIn
C) Twitter
D) Facebook
Which AI concept is vital for tasks like sentiment analysis and text summarization? A
A) Embedding Models
B) Convolutional Neural Networks
C) Decision Trees
D) K-Nearest Neighbors
What is 'model quantization' used for in AI? A
A) Reducing the computational cost of models
B) Increasing the accuracy of models
C) Expanding the data storage capacity
D) Enhancing model interpretability
Which ISO standard is dealing with AI System Life Cycle? D
A) ISO 9001:2015
B) ISO 26000:2020
C) ISO 22301:2019
D) ISO 5338:2023
What does GPT stand for in the context of AI? B
A) General Pre-trained Transformer
B) Generative Pre-trained Transformer
C) Graphical Pre-training Technique
D) Generative Predictive Tool
Which of the following is a subset of AI? A
A) Machine Learning
B) Cybersecurity
C) Data Mining
D) Robotics
What is one of the significant impacts of Generative AI on banking operations? B
A) Reduced need for physical branches
B) Enhanced cybersecurity measures
C) Decreased number of transactions
D) Increased manual workload
Which of the following describes a generative model? B
A) It predicts the class of data based on features
B) It generates new data that resembles existing data
C) It classifies data into predefined categories
D) It compresses large datasets for storage
What is the primary role of Generative AI in loan underwriting? B
A) To manually review loan applications
B) To automate the generation of sections of credit memos
C) To approve loans without human intervention

Sunil SKA
38

D) To manage customer accounts


Which of the following is a key application of Generative AI in marketing? C
A) Automated approval of transactions
B) Physical customer interactions
C) Personalized product recommendations
D) Increased transaction fees
Which type of analytics deal with the question What might happen in the future? C
A) Prescriptive
B) Descriptive
C) Predictive
D) Diagnostic
What is the key advantage of using generative AI? A
A) It generates human-like content
B) It simplifies arithmetic calculations
C) It enhances data storage capacity
D) It improves internet speed
What is the role of predictive analytics in banking with Generative AI? D
A) To conduct hardware maintenance
B) To manually review transactions
C) To increase interest rates
D) To create personalized product recommendations
Which AI technology is used to create virtual financial advisors? C
A) Natural Language Processing (NLP)
B) Neural Networks
C) Generative AI
D) Machine Learning
How does Generative AI contribute to loan underwriting? B
A) By manually assessing customer applications
B) By auto-generating sections of credit memos
C) By rejecting high-risk applicants
D) By reducing the need for credit checks
What is a key benefit of using transformers in AI models? A
A) Ability to handle sequential data
B) Enhanced image recognition
C) Improved hardware performance
D) Simplified data storage
What is the primary challenge addressed by retrieval-augmented generation (RAG)? A
A) Reducing hallucinations in AI outputs
B) Enhancing data storage
C) Simplifying model training
D) Automating content generation
Which AI model has feedback connections making it distinct from typical feed-forward networks? D
A) Random Forest
B) Convolutional Neural Network (CNN)
C) Decision Tree
D) Long Short Term Memory (LSTM)
Which aspect of banking is improved by using Generative AI chatbots? C
A) Physical branch management
B) Manual data entry
C) Speed and accuracy of customer service
D) Physical security measures
Which model is most effective in understanding sequential data? A
A) Transformer

Sunil SKA
39

B) Convolutional Neural Network


C) Decision Tree
D) Support Vector Machine
What is the impact of Generative AI on resources and efficiency in banking? B
A) Increases man-hours for SOP creation
B) Automates SOP generation, freeing up valuable resources
C) Requires more staff for manual operations
D) Reduces the accuracy of financial predictions
What is the function of the 'output' in a generative AI model? D
A) It encrypts the model's results
B) It stores the model's parameters
C) It processes input data
D) It is the generated content from the model
What was one of the outcomes of HDFC Bank's personalized marketing strategy using Generative AI? C
A) Decreased customer engagement
B) Increased marketing costs
C) Improved marketing efficiency
D) Reduced employee productivity
What is the primary focus of SBI's Generative AI initiative for customer service? D
A) Reducing the number of employees
B) Increasing transaction fees
C) Expanding physical branch operations
D) Enhancing query handling efficiency
What is the name of popular open-source library for NLP? C
A) Python
B) GitHub
C) HuggingFace
D) Meta

Sunil SKA

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy