Contents PAGE
Chapter-wise Marks Distribution Chart
I-5
Previous Exams Trend Analysis
I-7
Chapter-wise Comparison with Study Material
I-13
SECTION A ENTERPRISE INFORMATION SYSTEMS Chapter 1 Automated Business Process
1.3
Chapter 2 Financial & Accounting System
2.1
Chapter 3 Information System & its Components
3.1
Chapter 4 E-Commerce, M-Commerce & Emerging Technologies
4.1
Chapter 5 Core Banking Systems
5.1
Topic-wise New Important Questions
I-15
Q.1
3 4 . % 4 . / #
I-16
PAGE
SECTION B STRATEGIC MANAGEMENT Chapter 6 Introduction to Strategic Management
6.3
Chapter 7 Dynamics of Competitive Strategy
7.1
Chapter 8 Strategic Management Process
8.1
Chapter 9 Corporate Level Strategies
9.1
Chapter 10 Business Level Strategies
10.1
Chapter 11 Functional Level Strategies
11.1
Chapter 12 Organisation and Strategic Leadership
12.1
Chapter 13 Strategy Implementation and Control
13.1
Application Based MCQs & Integrated Case Studies
Solved Paper - CA Intermediate Nov. 2020
P.1
Solved Paper - CA Intermediate Jan. 2021
P.24
Solved Paper - CA Intermediate July 2021
P.43
Solved Paper - CA Intermediate Dec. 2021
P.65
Solved Paper - CA Intermediate May 2022
P.84
M.1
E EH R 4 E HN WO I NT OA I C T I L U P L O P SA 4G )N NK I ON MA MB OR E CI T AN OE T E SH R T E F S E T R R O P P U S E S A E BR AA T 3 A D" D# F EO R A S HC ST I LI S A R R T E T N C EA CR AA H NC I
S U C S T I O T S E C I V R E S G N I D I V O R P S L E N N A H C Y R E V I L E D S A N O I T C N U F S E HS CR NE AM R O "T
X SE NL OP I T M A O CC I L P D PN AA YE T L R P A M PI DS RT E I H A T T I L L L I A C FA O F NO OT I E T A R R A G W ET T F N O I S SG E L N B I AK NN EA OBS SEE L S A S S EUE O R C H A O W N R TI P F G O S N S SI E 3D N UI "L S #C U NB !I
E V I T A R T S U L L I Y L N O E R A E S E H 4 W O L E B N E V I G E R A E R A W T F O S 3 " #E FI V O T SS E U L A P H MX AE XT EO EN MD ON 3A
S OK RN PA TB A R HO T F SS Y E S L OU F D N O ) YM BL L DA EG PN OR I L E E VV EO DC EY T T I I L U SA N EO R I T A S C WN E C TU I F FV O R SGE GNS I NK G I NI N K NAK ABN BLA A B ES R RL L OE VA #I G N N UI R SE E V DO I V C
-
Finacle:
N I D E T N E M E L P M I G N I E B F O E L B A PK AN CA SB I E DH NT AF EO R S UN T T C E UM RE T S R I NU I Q RE A R L U R DE OP S MA SS I E 3G A "T #S
R E M O T S U C A S A H CH UC SN A SR T I B F E E NH ET BF TO N Y AL CN I FO I T N O GN I S D SN G NA I R K BN NA OB I E T H U T L O F 3O GR NE I M K O NT AS "U EC R A OS #I
H G I H S A H D N A E R U T C U R T S A R F N I Y G O L O NY HI T CL EA T N DO I ET CC NN AU VF DS AS YE N BI DS EU T B R OF PO PS UD R SA SD I 3N A "T #S
LE A H R T E VF EO S S D SN A HA M TE A HD T E ET H R A T WE TE F M O SO NT OD I E T N A G CI I L S P E PD !N E GE NB I K E NV AA "H DH CY EI Z R HT I L WS A R U T SD T N N ENI CEG N SO N I I PK 3MN "OA #C B
-
Ans. Core Banking Solution (CBS)
5.1
TAXMANN®
A T A $S N AO I TT A A R DE EP T O A C S OK L N RA E VB R E E H S T LF A O R T W N E EI CV AD E NT I A D EI S L A O BS AN T O A C DA NS OE V MI MG H OC CI AH SW I R ET E R E N HE 4#
CORE BANKING SYSTEMS
5
CHAPTER
Q1. A bank PQR has many branches all over India. However, the competent authority intends to bring all the branches together under one umbrella and make it centralized. For that, identify most prominently available Core Banking Software in the market.
-
FinnOne:
Flexcube:
BaNCS:
Q2. List the key Technology Components of CBS.
T N E M N O R I V N % N O I T A C I L P P !
T N E M N O R I V N % B E 7
N O I T U L O S Y T I R U C E 3
E R U T C E T I H C R A Y T I R U C E 3 E S I R P R E T N %
T E N R E T N ) E H T D N A K R O W T E . E T A R O P R O # E H T O T Y T I V I T C E N N O #
Y T I V I T C E N N O C L A T O T E D I V O R P O T E R U T C E T I H C R A N O I T U L O 3 K R O W T E .
T N E M N O R I V N E L E N N A H C Y R E V I L E $ D N A H C N A R "
T N E M E G A N A M K S I R D U A R F R O F G N I R O T I N O M N O I T C A S N A R 4 E N I L N /
DM NR AO F XT EA L L P P MY R OO CT A SL I U SG KE NR AD BE FT O A D EP S A U CY L NR I A EL CU NG AE R I L DE P C MNN OAA I #NL I P T L M I U O BC SE A R HU 3S "N #E L L E I VW I S NH EC PI XH EW
O DST NY AS N O KST I Y NO A AL M BP ER ED O HT F T N )I E NG I T H N A T I I K R WA OE R PU WMRT OC O N L FOCU I E R S NI T T I S OC N A I E T R DUF A N MFDI RONL OYAA F CNI C N AO T I R IY SUT L E CAA T CRN G A A A T E I T L E IDN V C N I I AAE S & N NE DIH E L EM E PA R SE P ER TM HS T O STC A E VHA E OTT R A PSE M MER C )T
Regulatory compliance
Information flow
(MTP) S W O L L O F S A E R A 3 " # F O S T N E N O P M O C Y G O L O N H C E T Y E K E H 4 E R T N E # Y R E V O C E 2 R E T S A S I $ D N A E R T N E # A T A $
TAXMANN®
L DA EI T I F G I I L D P MT IN S E SM R E E F G F A O HN A CM I H S WHT TN L LA E E DEN OWO P M SM T SI O S S E OC NP E I C EN S UDA B I L SP CN I R AM T OO N ELC CGD N RS N I E A I MR K P OM S I T R S UOD CCN SA !N S OE L I T N A N R E A PH OC
EYY T R I L C DI A B NA R AS U C NUC OEA I R T D T A E E MS S A RSE OAR F DC N EN I VI FO O RD NPN OMA I IG T HI N A ZGS I US L I E TOC R U H O ST R E S P Z T I R S E MOT ICS T SA P R F /E S WE OM L DI NT AD SN KU NO R AA BN FR O U ST E R CE R T US OA SF
-
Resource optimization
RS A N L O U I DT A OT MC E P DX NE AR E EM L B O AS T R E U PC OG RN E I T V N L I O V DE EE T G A A R N G EA T M N I O T ES VK I N S NA EB S HE EL R B PA MN E OT #A H T N O I T U L O S T N E M N O R I V N % E S A B A T A $
Ans.
SE KR NO AC BS TE R I OT I L PI PB UA SI L OS T T DE ES NS GA I H ST E DI TWE C G C UNI I DL V R OA E RES PD R GNE NI I SM K E O NI T ANS BAU LPC A BMD O OC N L A G DNG EOI N I T S T U A N BLU O BSO L EA C C 7I C A NL A AI NC I F N DA N NI AF
L DA EN T O A I R T G I ED T A N R I T N EI L S B T AN L A E CM S E AI R SU I Q HE CR I T H N WE S MT NY N OO E I T LM P U L EN O O SDR EV I GH NT N I E S K T NE G AE N I "MK N ETA L A A B H CT L S A S LM N L U O I FET T I S !Y D A SR GT NN I O K NN AD BN EA Ans.
3 % 4 3 9 3 . / ) 4 ! 2 / & . ) % 3 ) 2 0 2 % 4 . % ! # % 3
5.2
BankMate:
Q3. Explain various Key Aspects in built into Architecture of CBS. (Nov. 2018; 4 Marks)
-
3 % 4 3 9 3 ' . ) + . ! " % 2 / # ( #
SH E T L I B AW NE EM I ET R T UH T G C I ER T I E H H CT R T A A GS NR I E K F NF AO Y BTT EH I L R I GB OI CRA T CEI I HF T T O S I R L HP O T HIE S AWA HSE GRR UEC OMN ROI HTO S T 4U C L E TN E N GA R H A C T T OH T G SI KR NE AH BT Customer centric
EK CR I O V W R E T E S N KR RE OH WT TO E O NT RS E N T O U I T PC ME ON CN O AC SK R R E O F F W O T TE A N HT T C RE E R T I U D PI N ME OK CA AM SO I T S T N E I L C S WE C OI L L V A R E OS !T N O I T C E N N O C A S T S R E E UV QR EE R S T NN EE HR T E DF F NI AD RA E N VO R E E S L B YA XL OI RA PV EA HE T C R OU T O SS T C E ER NR NE OH CT TO N R EO I L E C L I !F
D E I F I C E P S E H T O T G N I T C E N N O C Y B R E HE T H I E C EA CC R UA OM SO E R R F ET HI T G SN E I DV I R V OE RS PY YB XR OO RR PE V ER HE 4S
S R E V R E S E H T R O T S E U Q E R S T N E I L C E H T R E T L A S YS E AO MP YR XU OP RS PU O EI HR T A SV E R S O A F CE ES N MO OP SS E NR ) Q5. Determine different stages at which the deployment and implementation of Core Banking Systems should be controlled to ensure that banks automation objectives are achieved. (MTP; 6 Marks) OR
Agro development bank is a corporative bank with two branches in Jaipur city. The bank has decided to implement Core Banking Systems (CBS) in both branches for better inter-connectivity between its branches and also to facilitate management of deposit, loan and credit processing. Explain the various stages involved in deployment and implementation of CBS. (RTP Nov. 2020)
S U O I R A V T A D DE EV L L E O I RH T C N OA CE ER BA S DE L U V I OT HC E SJ 3B "O #N FO O I T NA OM I T O A T T U N EA MS K EN L P A MB IT DA NH AT TR E N EU S MN YE OO L P T ES DE G EA HT 4S
3 " # E H T G N I T N E M E L P M I R O F G N I N N A L 0
should be done as per
TD N E ED I MV TO S R E VP E NR I A HS GE I C H I V SR E E R I S U QG N EI R K N 3A "B #W TO N H ET MC EA L P P MM II L L I OW T E NDH ONT I AE S I SC C T ES N DOE EC( HG N K 4I RN R A UB CE EH R DT NY AB
Planning: strategic and business objectives of bank.
Approval:
decision must be approved by the board of
TAXMANN®
E ADR T E A A G DA S T DNN EAE NMM NEE AR L L P AE E SS ET HN E T EH HM4 T I E L WE SF E O R US GD lN LI E K A L U UO D T W C O A4 M E S G E HI DN T GNT I GE NTAN A I U Z R O YT C S L A C NS ! AS E L N A NI I I S C N SU PB A L N E G I HNG& I EN E NH L I N L U LT DAO L N RI OP T MNN D I OE SD R #O I H NNT 4AI S
directors.
Revenue Elements
Cost Elements
(Nov. 2018; 2 Marks) Q4. Explain in brief Proxy Server.
5.3
Ans.
Proxy Server
Ans.
R N I O E I H T T U L T O E S E H M C O A T E K 3 N " A B # F E O H T S S R YE O B V D I DT N C E E E NJ V I B F E E L O P D I S T S S L E A U N M I E S EC U R N B A E D E( N R A E S HR S T T O N T HA E GI M UT ON E R HE R I T E U L F ! Q F I E D R Y C I E F I K C S E A P H S
T EN DE RM E Y I L O R L A P EE ED B3 O" T # K DE N EH A S UT B F E SO H NT T OS I R O O T U M F L O Y SL T 3N "E R #R U # K N A B E H T Y B E S U OD HE R NU I C DO ER PP OE L E R VA -
ETYS S L HE T N C 4T A ER T OR T RF EOO GCS A E S T I S P AT Y TT N EAS U MDO S GI EN RT R L I A UT U VS CS E OI RXFR PEOC T G LN TA L E A I R S R SES O E R E S UCC A E HSOH PNRT P E TOMS N E ETI RC R N FU E OND F I F OO T I CR A D R OP TG T S A I E GL EMN U NAI TD OT S O DA E EDTM BODL L N A OTA T F Y D O SI T I LES T GI N NBAO R A I I T T G T I S I C U E SMA T
M I L U F S S E C C U S E R U S N E O T DS EE T N N EO T MS E EL L I P MM T IC EE BO J TR S UP C MF I I 3C E "P #S H T I WN O I T A T N E M E L P as per pre-defined and -
C T DE ED NE I A T T N N E I A M ML E EP BM TI S S UE MG N 3A "H #C N O I S R E V
Implementation: agreed plan
D E T R O P P U S E B T S U M 3 " #
S T N E M E R I U Q E R Y R O T A L U G E R D DN EA T A D P U E B T S U M S E L U D O M 3 " # based on requirements of
D E R I U Q E R S A
D E G A S I V N E S A G N I K R O W E R A S L O R T 3N "O #C FT O A TH I T D E UR !U S N E O T
Updation: business processes, technology updates
must be done internally and externally
Audit:
to ensure that it is working effectively. Support:
as required. E.g. program bugs Maintenance: fixed,
TAXMANN®
3 % 4 3 9 3 . / ) 4 ! 2 / & . ) % 3 ) 2 0 2 % 4 . % ! # % 3
5.4
Selection:
bank should select the right solution
considering various parameters
Design and develop or procured:
There should be appropriate controls covering the design or development or procurement of CBS Testing: Extensive testing must be done before the CBS is live
-
O T E G A M A D R O F N O I T A S N E P M O C D N A Y T L A N EC 0T RE OM F E ST E S DY I S V R OE RT PU P M NO OC I R T C E T EU 3P M O C Q6. Explain the Section 43 of IT Act, 2000 related to penalty and compensation for damage to computer and computer system. (RTP Nov. 2020)
Ans.
.
R O M E T S Y S R E T U P M O C R E T U P M O C H C U S
If any person without permission of the owner or any other person who is in-charge of a computer, computer system or computer network, or computer resource: [C/CS/CN]
K R O W T E N R E T U P M O C
KE RG OA R WO TT E S NE L RB E T A U V PO MM OE CR RY ON A MN EI T D S E Y R S O RT E S T R U O PD ML OE CH A RT E A T D U R PO MN OO CT I HA CM UR SO F N I G NM I U D I UD L E C NM I
Accesses or secures access to
Downloads, copies or extracts any data, computer database or information from
3 % 4 3 9 3 ' . ) + . ! " % 2 / # ( #
R E T U P M O C R O M E T S Y S R E T U P M O C R E T U P M O C Y N A O T N I
K R O W T E N
RS OMK R AO MR EG W T OT S RE Y S PN RRR E E E T T H U U T PO P MYM ONO CA C RRR E O O T E U M S PA E MB T S OAY CTS A YD R NR E T AE U TP U PM MO OC CR E AT T U A P DM KO RC OH WC TU E NS N RI E G T U N I PD MS I OE CR
R O M E T S Y S R E T U P M O C R E T U P M O C Y N A F O
K R O W T E N R E T U P M O C
YON NTI O R ST AS E N YE D BCEN V U KCA E RAR R OET E WTNH A O T TI CT E L E I NC ND I RF AK A E T R M OO U S PTWN N TO MO I OSET CRNA L RERU P E OY T G U E MNP R EAMR T O S O O T Y ECS S E CRL RN OU E A T R M T U S T E I PS C T S MS ! OAYS S CYR I H NE RA T TF E SUO T E P U D S PI M N MV OO I OOCS CR I P R V E Y O T N U R A P SPE NMH AOT EC F MAO
RY E B T U S E PG MA OM CA RD E T Y U A PP MO OT C E YLD B E NA T AI C L E GEF NB F I A T LO A L L A U HS PS N I O N E S AHR E MKP RRE OOH WT HT T O IE WNT N RO GE NT I T I UA R E PS PMN E MOP AC M T YRO BO# MF EO Y T S A Y W S
TAXMANN®
RYNR E O BOF T S U YR D L PS EE PS MU OYU OI CR N E UAD AJ OE SC NE NI G I S EA T IUC M AR SC T UA C OD ERS O F E F RS SE A R U RETA U T OL PC YA O T RMT I O L O I N C T SY O U I Y T ONN RR AE OT T ESRN UEEI T D L L A N A VL SR A OH SA T EYI T I C OW SN E R T E HOS C SCE I R SDU N L I A O LS ME A IT E ER D 3 C RSNR O E OT N CU EA CE LP R A UMT EM OYS O SN C E OA AT R
O T E T A I R P O R P P A S A S L O R T N O C L A N R E T N I G N I T N E M E L P MT IN YE BM N DO EI R T A V GN I E T I S MS E EN R I S A SU KB SE I H 2T
D E T N E M E L P M I N O I T U L O S 4 ) E H T N I D E T A R G E T N I E B T S U M SS L E O H RC T N N OA CR FB O S SK E N PA YB T EE S H E T HT 4A
R HE T K O C NE AH Y# B DR EE KK CA EH CK R DO EW S I F V O R E E PR U UT SA YN L B E AH I T R A F VO NE I V SI I T RC E E BP S ME ER MR I FR F E A T B S EM NE OM FFS O S FE KAC RTO OSR RP 7E
-
1.
(RTP Nov. 2018)
Explain Internal Controls in Banks.
5.5
Introduces or causes to be introduced any computer contaminant or computer virus
Damages or causes to be damaged
Disrupts or causes disruption
Denies or causes the denial of access to any person authorized to access g
Charges the services availed of by a person to the account of another person
Destroys, deletes or alters any information residing
Q7. Automation of business processes has introduced new types of risks in banking service. You being the Branch Manager of a CBS branch, list out some of the internal controls you think to be implemented in your branch. (May 2018; 6 Marks)
Internal controls must be integrated in the IT solution implemented at the bank’s branches to mitigate risks. State few examples indicating the internal controls in banks. (RTP May 2020)
Ans.
Some examples of internal controls in bank branch are given here:
D E X I F S I N O I T I S O P L A I C I F F O D HE CN AR EE FC O N SO R C E S WN OO PS R EE VP I T L A L A R T S O I T N D I E MT DA AI C DN NU A LM A M I C O NC AD NN I & A 4.
G NS I L E L R O RU T D N E OC CO RR I P E HD T N OA T NS OM I E TT A S MY RS I N F N OW CO CD I D D I A OL I R E E H PT DF NO EE S C TN S UI A L MP SM R E GO AC NN AO Y MT HI R CO NH AT R U "A 5.
D E M R I F N O C E B O T S I G N I C N A L A " Y L L A C I D O I R E P D E C N AL L A A I BC EI F BF OO T D EE R Z I A R SO KH OT OU BA LY L ! B 6.
G N I L L O R T N O C O T D E S I V D A Y L E T A I D E M M I EN R O A I T SU MA RC OE F S I YC T R I E R UX CE EN S A TC S OY L E FH O T T SA L I H A T T E O $S 7.
TE I H S OT PN EI DE R MA RS E M T R SO MF RY OI T F TR U F C A E R H DSC N SHA C E L UR B B ASE URH E L HT A T VO F O YDS CN L NA A I ES C R I EF R UUF CQO EEO H KC W I T L SSS T R ME A LL EL E T ET I EVA NAF ORO RTY S PT D DP O I UE T S AC R U EC &R G VN ET I L A DR NG AE T EN PI YY T TB H E GN I R O ED HS T I GI S NH I T 4 N E T MN EE L M P N MO IR I YV BN DE ED T E A T GA I T I M MO T EU BA OE T H DT EN EI 4 ) NS O SL T KON SRI T I N R S L 4OO )CR FN T O O LC E Being an IT consultant, suggest various steps of IT related control to a branch manager of a bank.
-
Ans.
TAXMANN®
S T S I X E F F A T S G N O M A N O I T A T O R B O J F O M E T S Y S ! 3.
2.
3 % 4 3 9 3 . / ) 4 ! 2 / & . ) % 3 ) 2 0 2 % 4 . % ! # % 3
5.6
Q8. Information Technology (IT) risks can be reduced by implementing the right type and level of control in automated environment that is done by integrated controls into information technology. (May 19)
S T U O G O L D N A S N I G O L L L A F O D R O C E R A S N I A T N I A M M E T S Y S E H 4
E H T N I H T I W S I N W A R D H T I W E B O T T N U O M A E H T R E H T E H W S K C ER HE CW O MP EG T S N Y I S W EA HR 4D
Sample list of IT related controls are:
D L U ON O WI T TC N A US ON CA CR AT E NH ET I L F AO NG I N I ES CS NE AC L O A R BP EE HH T T FR I E ET GF AA S T S N E U MO AM SA E N HE SL I A L E F H MT EW T O S L Y E S B EL L HA 4F
D N A S R U O H D E T A L U P I T S N E E W T E B Y L N O E L B A L I A V A S I M Y EL T S N Y O S S EY HA T D OD T E SF I S I E C CE CP !S
SI RD R EN E HA S 5TK NN O S A E L DB I F EE H DST A NB F A O S SI S E SR I A R E OBS T U C WL EOA R NN I D KR E DOT ET N I I F DR I EO C EEF PNE S@L YAB L A NC N I OOL YP SL S P NA E COS CSI AE S S I NC H AC 4 CA SNK R EN E V A S UIB S LGER E A HE UBT M D D N I L O I V U T I ES O D L U HO NS RC )
Y DL NA L AC I NT I A SM G OO L T RU E A S S UI R AE RS E U T F E A H TT A E HM T I ST ND AE EN MI M SR I H E T 4E D D EE BR M I PE R C AT S S RY E OS R F PY E SI TH I VT TI U TF OCO EAT MOU INO T SD RI E EE S R G UE G HO !T L
S T N U OD CR CO AW TS S N A AP ML RE O V DE GL NY I R T O A S VI I V T R C AE EP R U SS S D E I CL XA EV TA I MH II T L S W A HY CL UN SO SD NE L OD I T N A A UH T I S E NB ON I T A P C E CC XT %E
3 % 4 3 9 3 ' . ) + . ! " % 2 / # ( #
H ET VI I W T A Y R L E N PO OH NT I I RW OD TE N D AE E MC RO OR DP AE OB T N DA EC T D S ON PA ED E BT L OA T TH H S GID UGR ONO I SS SW SE I S S NCA O OR P I T P Y C ER AH O S S NTI ATV R NR T E UP EO HC U T CS F! A ) D E N E P O E B T O N N A C S R E G D E L E H T R E D VR OO SW I S SS S E A CP OL RE PV E YL AY DR O ES HI T V R FE O P DU NS EA ET HU T O EH CT NI /W
S E N l E D ! , 0 T C ! G N I R E D N U A , Y E N O F O N OS I T A N E V E R 0 F O N O I T C E 3 R O E G L U D N I O T S T P M E T T A
R O S T S I S S A Y L G N I W O N K
R O Y T R A P A S I Y L G N I W O N K
D E V L O V N I Y L L A U T C A S I
GG NN I I TR C E ED J O N R U P A DL NY AE EN MO IM R C F FO O E SC DN EE EF CF OO R E P H ET HF T O HY T I T L WI DU EG T E C B EL NL NA OH CS YT Y T I R V E I T P C O AR RP O D SE S T E N CI OA R T P N YU NS AA NI T I
EE U MQ IA R C P EO HE T D FA O E MC S R DRU EOO E S D CE E OL T RA PEA CM EN I HO T I T CG HEL E CR I AA H WSM D O ER YE BC F E SO S RM E CPO OEC RSO POT HR ET A HF T E OP SPP I IA H SS R D E E NE WC O OR EP U E RH T T ET HA T H DT NO A S
L A E GT EA L L M I I T EI CG E NL ER T S A I E X P EP EA HT T I LE A EK CA N OM CT O OE T SM I O GC NN I I R F E DO NN UO I AT L A YC EI L NP OP MA L NA I G EL E VI L I T R C EO J B E C OR EU HO 4S
O Y T T R E I D D @ A EM KE AR MA S OE T I T I SV L I A T NC I A ML IA R N C I M YI BR C DF EO S UT S I YF L O N R OP ME H MT OR CO SN I GA E E NC L T I @ R A E RM DA I NEI T UPG P AA E L L R YYA EEE NNP OOP -MA
G N I R E Y A , T N E M E C A L 0 Y L E M A N S E G A T S E E R H T S E V L O V N I G N I R E D N UN O AI ,T A YR EG NE OT N -)
E R A G N I R E D N U A L Y E N O M F O S E G A T 3
M O R F D E V I R E D S D E E C O R P F O
1. Placement
E H T S E V L O V N I S E EI GI T AV T I S T C TA S R L I F A G EE HL L 4I
Placement
TAXMANN®
Y L T C E R I D N I R O Y L T C E R I D R E V E O S O H W @
(RTP May 2018) Define Money Laundering.
5.7
Q9. Banks face the challenge of addressing the threat of money laundering on multiple fronts as banks can be used as primary means for transfer of money across geographies. In light of the above statement, discuss the Money Laundering process and its different stages. (Nov. 2019; 6 Marks) Money laundering is used by anti-social elements to make ‘dirty’ money appear ‘clean’ that affects the economy of any country. Discuss the various stages involved in the process of Money Laundering. (RTP May 2020) Ans.
‘Money Laundering’
Money Laundering
L EI CA R R UT OI T SD LU A GA EE L L H I T ME OR RU F C SS DB E EO CO OT RD PE FN O G I NS OE I D T A S R N A PO I EC T S S AD ES HN E T E SAC R E O VTR X L P O E E VL H NPT I M E OD CI GH ND I N S UA Layering
T N E I N E V N O C E R O M D N A S U O I C I P S U S S S E L M R O F A O T L N A I N RI OM I ER CC AE L P H T AR O OF T
RE OS SO KP NR AU BP S I EH R T OR HO SF F F S O W A SL NY OC I T E A R R C OE PS RD ON CA LN L E O HT I SA L EU S G UE YR L E T S N O EO UL QH EI T R F W SS L E A I NT R I N MU IO R #C
L A I W C NO AL L O NF I F O ST UT OU L I R C A I F VF I HD GT UI OE RK HA T YM E ND ON MA M ER HO T F GS T NI I D E NG EN S A SH E C VO L T O VS NN I O I GT NC I A R S E N YA AR ,T
E R I W R O S R E F S N A R T K N A B O T S K N A B L A R E V E S F O T S I S N O C Y A M S GR NE I F R S E N YA AR ,T S T N U O C C A T N E R E F F I D N E E W T E B
S E M A N T N E R E F F I D N I
S E I R T N U O C T N E R E F F I D N I
TAXMANN®
E N E C S E H T M O R F Y C N E R R U C Y L T N E U Q E R F S D E E C O R P F O T N EE MM I ER VC OE MH T EF HO T
FGM O N R TIO S N F A UH E OC H R MU T AP E G E N HYA C T NH YE C R RO A R VUT YCS L SD L A N UYO NEM N I OA T N I OMD CE S HR OT T A E SGCC L N S A I A E G WN R S T AA UO R DHOT HCHD T R S S I A T T WN A H DUOI T NOBG C AC SN TA I MK I S EA OET PHI M ETE Y NU DI LE GY A N NE VO I N M K H AOI GF MMH O
G %
D E T R O P X E S D O O G R O F S E C I O V N I E S L A F
T I S O P E D N G I E R O F A T S N I A G A N A O L C I T S E M O D
D N A Y T R E P O R P F O G N I S A H C R U P
S T N U O C C A K N A B N I Y E N O M F O G N I L G N I M M O C
(May 2018; 2 Marks)
Q10. What is Cyber Crime?
-
Integration
D MN IA R C S U RO OR F EE CM R UU ON SSS EAE T S S A E S E MUN Q II T I I S N G U H EC B L E AET T FSA O E M VI NL T OO I I G VE S NL UI L L Y DB I END HAE T SS SDU E N T E US A EFO R DH C E T VS NI OR A I EE T DV A R I Y T G L A EA L E T R N NC ) I
R RO A L PA PI AC N OA T N N I I F SL DA E EM CR OO RN PH LG A U GO ER L L H I T FS O G N NI ON I R S R A E E VS NS OE S CN N II O SS E T U A VB L R O E VEP T NA O I L MA I I TC I G R EE L M YM L T N O EC
S E V L O V N I T A H T E M I R C A S I E M I R C R E T U K PR MO OW CT E SN A NA WD ON NA KR E OT SU L P A EM MO IC R A C F R O E BE YS #U
Ans.
3 % 4 3 9 3 . / ) 4 ! 2 / & . ) % 3 ) 2 0 2 % 4 . % ! # % 3
5.8
2. Layering:
3. Integration
3 % 4 3 9 3 ' . ) + . ! " % 2 / # ( #
Y A M T I R O E M I R C A G N I T T I M M O C N I D E S U N E E B E V A H Y A M R E T T E U G PR A MT OE CH ET HE 4B S A D E N I F E D S I S E M I R C R E B Y # S E C N E F F /
S L A U D I V I D N I F O S P U O R G R O S L A U D I V I D N I T S N I A G A D E T T I M M O C E R A T A H T O T E V I T O M L A N I M I R C A H T I W
R O M I T C I V E H T F O N O I T A T U P E R E H T M R A H Y L L A N O I T N E T N I Y L T C E R I D N I R O Y L T C E R I D
T A HS #E N T O E NH RP E E T L N I ) B SO A HM C UD SN SA KS RP OU WO TR E NG ND ON I A T A S CD I R N A UO MB ME C OT I CO EN L E T S NI L RA E DM OE MS GM NO I S O UR Q11. Describe any three key functions of RBI.
TAXMANN®
S W O L L O F S A E R A S S E C O R P D R A # T I D E R # E H T N I D E V L O V N I E R A T A H T S K S I R S U O I R A 6
Y C I L O P S K N A B E H T H T I W E N I L N I T O N D N A D E Z I R O H T U A N U S I P U T E S E N I , T I D E R #
E H T H T I W E C N A D R O C C A N I T O N E R A R E M O T E S T UA CC I F EI HR T T E R# OT F N DE EM NE I F S E R DU B SS R I E $ T S E A R -0
D E H C A E R B E B N A C P U T E S E N I , T I D E R #
M E T S Y S D R A # T I D E R # E H T N I D E T A L U C L A C G N I E B E G R A H C T S E R E T N I E T A R U C C A N )
D E M R O F R E P S N O I T A I L I C N O C E R E T A R U C C A N )
ST EY NA T I I L O UA CQ U DE NDQ AAD YCO O CI G NL B EU N R I R PD U CEN H A ST Y S EN OV RI I T O S GC E DOD RTN OEA SVS I E T E GC T NEO AJN HBY COC XEN EH E DTR NHR AT U SIC W E F U O N SO S S I ) E T I A L L P U P CU R S I C F RO OY F T I TT I N F A TU O NQ
E DG D ANBI OIUV RKPO BNGR A NP SB I E N D S B I N I Y A R A R T C T N T S N I S E UAE R R 0OME C T F EO N I HE T S V HI R CT O C I T C E H I I S J L WB OB PU NOE I EDP H H T E T I TH C WHE T T SI T O NW O T R OSP S I E T N C A OMI R I V E T EE R PCT ONS S GUYG S NFE N I M I K K EHN T NT AS NA BY I B FSEE L O CV A NT SC I I R EC E NDE T I A E F F F N MNO I E F AD T CS R NI A CO PAL C
G EN NR I OU MS N EE HD T SN R A OY T T I I N L I OB MT A DS NE C AI S R SP R T O N T GC EN E MIS N EA I E L P V TI MNT IIC SAU M E D T FO A O R L P E U VO MI T T RC T OE I D &J E BR O EC HO F T HW T I O WL F YE CT I L A O U PQ YE R D A A T
Ans.
Issuer of currency
(Nov. 2019; 3 Marks) E R E H N E V I G E R A ) " 2 F O S N O I T C N U F Y E K E H 4
Ans.
M I T C I V E H T O T S S O L R O M R A H L A T N E M R O L A C I S Y H P E S U A C
Monetary Authority
Regulator and supervisor of the Financial System:
-
5.9
-
Q12. Now-a-days, Credit Cards are extensively being used for payment purpose. As a consultant to credit card section of a bank, advise the risks involved in the credit card process. (May 2018; 4 Marks)
T D IME D E Z ET I R S R C Y O H EST HPU T UA T EE Z SO I R TT ON HUD T E OT U CC AC I R OAT T FS SOE R T E H S EE L GA I CBN R SNDN S I L O E U S IO CT R CMH E ISP !L S OK HN T A U AB NE H UT SH I T 3I "W #E NN I I L PN UI T E T S O EN ND I N , TAY I D C D I EL EZ R O IP #R D ME T OC T I S R US T CE ER HE T EBL Z DE I L N R U N OO O HH T S SR U A3E O"P T D S#E T NZ H I I GR R I EO R H ST ST S A U E CMA CRO !E T SS I I 3$ "E #R N0 I E DH ET NH lTE T EIA DWC El RC E I T NR T S AE A D -R# O T CN RC E E MAM NE OI T S S R TU UO #NB Key Controls S. Risk No.
R DO NN I A AF MRN O3 OI ET T" BA C I A# T OI SN T N N I AN SIR E O E T I I TH T U TEC $ A HS N T FEFN O A E R WOT NT RG OE E I N T BZ I A IS R G S EDOE E R HC NT G O I EA UR 3T AP G N I V O R3 P P" A# N LI E NN NO OI T SC R A E S PN A DR ET Z 3 I R ! O3 H! T U # AE NH 5T
N E ' S E I R T N % G N I T N U O C C3 !" E# T A N I R UD CE CT A AR NE )
YY 3 BBN" DDO# # ET ED T N S A I ES E R NE E Ul I N Q T E I EE L DI GR C SA SS EE I R F I A A T E I BS SL I E O DH C I N R A T T F AR N O EERF E H GT M S N S N O I I T O S T I N S A T UBUA O #R C3EU C"H G !#T l E3 R " A S# E E I H T I T L I N C I AD F S DEE T EA L S LU U A R CD BL E DAN NCl UYE L FL D A NC E OI T H TA T S ME R E R OP E T T U S N AA ) G N I E B E G R A H C T S E R3 E" T N# I N EI T D A E RT A UL CU CC AL NA )C
-
TAXMANN®
EEGESTE I A HT N HI NI N HI T C T D , T T , A DT HNTE T HR I TND OI T N AE PD SOS EUYR K E R OI C# CWR # L M ETR E HEOEAOH C.CH T T0N K I E T E S D S EH E T I E I T V 2 S T T R I I R DO TG #I MSN E T D O E AC I MT HEB N OASATRA C2RFD#C O H TLT N G I T T A N A I C D N I I AT EC DWI E A R E L E# NFG C R N A K I E EN I T SI E L F HI I F H NT 2MO 4& I DY EC Z I L I R O OP HS T K U AN NA UB E H ST I H PT UI T W E S E N EL I NN I I , T O TN I D ED R N #A -
-
ERH SEY TEI T HTA R V T R E FET/W S W) P E G O OL T N RN R O ARANL P E O OO RA ERF BL E T H ET EH GPN HT R UU NA T NROLEO OOEESM F A K G A H DLR AC N EAA R R A HMRO E U UT COP L CA T T L E EL S SEH S R E O H T S SClS T I Y E F E HSH A NOP CAT I I Y E E SS H T UR A UL R WE S H BA NPR VR D E AOEN WG E R D OP AR N OI L N I S R T D DEEL R N L A ET HE N O EB R A HU U T E D S ET CNTV I HH EONI T U S N E GTO D EHN AI NSO T R I I SL I A GYYAN NBAEI S GI P Y NY DT YE I E A U R K RPSONE A H SUHAT M E PR T MO I L FI T YTAWON BSSS D E R U E OT YE G S I T A W A R S R !E G HER E OT CPE PR ORRRET ROOUH N PB-PT I
Mortgage loan
Ans.
3 % 4 3 9 3 . / ) 4 ! 2 / & . ) % 3 ) 2 0 2 % 4 . % ! # % 3
5.10
Q13. In Core Banking Systems, Discuss the possible risks and their Controls around the CASA (Current and Saving Account) process. (RTP May 2018) Ans.
-
-
Q14. Explain the term “Mortgage Plan”. Also, briefly discuss its different types. (MTP)
3 % 4 3 9 3 ' . ) + . ! " % 2 / # ( #
N A O , E G A G T R O F O S E P Y 4
ND AE D SI A V HO R RP E S MI OD T N S UA CT S EE R R E E HT N WI EF GO AE GT T A R R OE ML B LA A I NR A OV I Y T I T RR D AOE R P DO T ER AXP I SF F I G O SN I E IS H T 4CA E H L C E R S U FP O E NH OT I T R P O OF
SN I O I DT NA AV O NN AE OR L R GO NT I N T S E I X M EH S NI AB R SU A F HE R YR DO AF ER R E L A H T RE I E T MN OU T O S UM CA EA L HN T O EI R T I E D HD AE RS OU F GO NH I E Y H L P T PF AO
NN OI O I T T C C UU RT R T S S NN OO CC RR E E DP NS UA FT S O R EA S P A CS NE ) H C N A R T N I D E S R U B S I D S I N A O L E H T S E I T R E PN OA RL PP
EO VT L T O N VE NL I S I SR E E I T K I L INS C A E AB F P EY TH T I T D G FN EO R I C YW O DEL N L EO O S F A BMF EO DHY NTL L UYA R &BE EN R E E HG T GE NB I N N A AC EY ME SH D4 N UR FE FM O O T WS U OC L F T E U H OT S T F A R D R E V / S T I D E R # H S A #
S N A O L M R E 4 S N A O L D N A M E $
G N I T N U O C S I $ L L I "
ER HA T U Y' T I K L I N C A A" F TE I D D U EL R C C N FI O Y EE PH YT T D SN I A H R T E NM ) O T S U C E H T T I OD T E TR N E# L F TO O R NE ET T R E A S, DD NN UA FE KE NT AN BA
N E T T I R W E B O T S K S I 2 W O L E B Y L N /
R R H O OMT I T T E A A T W R RS T T Y S S E S I I L N N B I I N A M MOI L D D A A D AE V R O RGA D RE ONE E T AR S C SH AY UE S T L RO ECDN E C CENO PR ARAR UP A S Y O F L T R NA E O ESO T R SDI DA T R T UO S U A I RQ O L N R L W E I EWA S D S M T PS S A S D A UA N S ! 0I 3 P I S R S E OYN I CD EO H R T I D T UYN A OL ! Z SE I T R E A R N O I H R O T I NP DU T OOA E! I RZ DT T PR I A EU PO EO MA HNH RNT OI T UNI F NDAEW E I H T l D W U TD I E N O T E AOT HL EL C E lMIBD W A I L E N E I DA GBE B I VY Y 3 S AA AO NM MC LU
Key IT Controls
Risks
-
e.g.
TAXMANN®
Y L D A O R B Y A M E S E H 4
R E D N U S A D E l I S S A L C E B
Ans. CLASSIFICATION OF CREDIT FACILITIES:
5.11
Home Loan
Top Up Loan
Loans for Under Construction Property
Q15. Explain in brief the Classification of Credit Facilities.
(i) Fund Based Credit Facilities:
(ii) Non-Fund Based Credit Facilities:
-
Q16. In line with the suggestions of RBI, M/s. ABC Bank is planning to obtain ISO 27001: 2013 certification for its Information Security Management System. As an IS Auditor, you are required to PREPARE A SAMPLE LIST OF RISKS W.R.T. INFORMATION SECURITY for the Bank. (Nov. 2018; 6 Marks)
Ans.
DT H NI AW E DC EN HA SI I L L P B AM T O S C E S R EO R T A I N SO E I M C I T LN O PE YM E S T IGE R I UAI C CNL EAO 3MP DN O NI AT NA OM I R T O C F EN R I I D T TC N E ET MO ER GP AO NT AT MN FE M O T KI C S T AME ,MS OS C A ND AT AO E CA Il I T L DA I P CD P I O AMN EUM RT OS MY F SYML E DS T RGOA I NCR OI D DPE WT L SANOB R A S RA E A KPI S PPR P AD TOO L R U SWEO TR AME F AD E E N E DT E S T R RY A A OS N DSSWI E T M NNS F EI I OAO L 6T BSE LM I A E VT AS Y YS T D I L N A I A T N A T EA DD lF NO OY CT FR I O G SE S T ON L I L A D I N T A N EY T T O I L I 0B A
E U Q I N U A E V A H O T D E R I U Q E R E R A S R D E I S R UE LS L ! U D E H S I L B A T S E T O N S I Y T I L I B A T N U O C C A R E S 5 O D N T E O D G E N C T A A C I C H S R I X D CE T E R N L Y M EO L LPU HW A M T N S CO U I A S D CH AA ODP SP I I L SH RNA E R G A E U P L H S SA T UO I I R G T FH DN N O T R E EL YS OD T M Wl I D T SNR E S N C T ES AOOT DY PCWE I T ST ES EP S N HE HE AE 4H 4KPT T ODA D Y T ETT N I Z A SI A L R A RDI E A ORT S T HONA UT E DUDDD EANlF Z ANO I N R O Y OAMC T EF HFT I R T O O S G U SE Y A S T NDSON R E L UOH NI T RWS I D T OSS L S F EUN A RP CSA E CE Y I S EART I Y A L HDA I ET B N M S AMAE S I L RI I SA T TSE E ) S HV US Y G U4AS
DHY NCB AUD ESE R D UNW T E AI A V NSE EER HGY E T L L I EV L Z A IC I R R I PD OS HS O T I E U R ACE S SCPR A R E R E E R E N NS A W WU SO OFE MOGM T E L EN E IT T EV S T S I Y R Y 3XP E S NDI N OEE I Z T I C R A I COV HE lT R I D US OAF MNO L UA RI GO N N E I WDD NR EA I O V AN DTO EAI D T Z I FA R OOCM l G HN I T D E I U T OS Y AP MY NO S 5C EE S RU O H T D E T C E T E D N U O G Y A M S E H C A E R B Y T I R U C E 3
DY NB A DD EE GW E GI OV L E SR I AY T L R A A DL EU VG I E T IR S NET ER N S AE OSM T E G SO G S A LN E CEA CH M !T
LM I A E VT AS Y YS T D I L N A I A T N A T EA DD lF NO OY CT FR I O G SE S T ON L I L A D I N T A N EY T T O I L I 0B A
TS S EA L E HC P T MEC IRA U ES N R A NC A S E E SOL SC NT R AU OD I EUO T D R C S I I E E V R T I R T S D S I N E N NO R I I I T SMDA S DEM E Z CAI R R CDO O ANH F N LAT A D UI CE E AS I T SN YU Y L HEN R 0MOO
RNY OE T F I D FI EO R M UEU SS A AH EC T MNA IE E VMH I EE T T K N I ESL VYT ESA 4 E R R P)H DT EN C T LT AA A E URT QEND EVEO DRMO AENm NSO Y ) E RR EI K Vl
EE D KRNE O U R OT CO MA T YI SRT N I E EPDO I KMM M I L E D LTUN H O RD A RE T D HNE N SAL OI L SA CUE GCT S LN I A N V I T T I EE N X EEDR R E MEEAT C S N NRN E E Ol C C RRAV I N I O EE A V T T T NC DA N %EI LD T A O E D N RI MT
SS S U E R CI CV A O AT T A DE RU OD M N EO T I S TS Y A N S CA DI lJ ED O Z R I O4 R OMD H N T DA U ANS NAM 5SR S O OW L
DTT C NE E S ANT E I DFEI T EODI L R SOB T A A PWDR EEE E I R V N ML PE RU SRO I RR FV A K ML ER AUPO G R EW G ER T A2A E I D YN D T E KE IT R RT A U OA G CI DE WP T TU SI E KM .TR POD E N KWA
TAXMANN®
3 % 4 3 9 3 . / ) 4 ! 2 / & . ) % 3 ) 2 0 2 % 4 . % ! # % 3
5.12
Key IT Controls Risks
-
-
-
-
-
e.g. -
-
-
3 % 4 3 9 3 ' . ) + . ! " % 2 / # ( #
TAXMANN®
TE N S EA R B E A F F T I A D TD A K DR EO T W A T DE PN U E DR NA AW T DF EO T S N EM ME ET L S P Y MS IS EA B H OC T C UT DSE E EYE G R NO A L OO W SN T L F A HO SCS L E O N T RF O T I O N T A O C CSI R L EEP Y HA P 4L A
E B D L U O H S E R A W T F O S G N I K N A B E H T S R O T A L U G E R F O SD E E VT I A T C D EP R U I D R YO CD I L E O R PU RI G E F PN SO !C
FG O N I SS T U N ED NE OT PA MD OP CU RD UN OA F D EE HN T I A WT OI N HA DM N AD T S E R R E U DG NI F UN O OC T TE N R AA T R S OS PE N MI IS SUY I BG T I O GL O ENN I CK H NN C EA E (B T
S L I A F 4 ) F ) H G I H D YE R M E R VO F OR SE L A P SE I KB NN AA BC S AE S NS I E YC GO OR L P O NS S HE CN EI T S NU OB EE CH NT EF DO N EE PN EO DN N EE HH 4T
ESW DIE I MN S NRE I O D F DT I EAV DLO DPR EYP G BO O T MO L K EN N EHA R CB A EE T SE H T T N EMF NAO E OSL PEY T MHS 4 O S CY S GE RO N UL I OOS F NU HB LC L A C E I F RTI OHC S F GEE PC US TO N I ARRV VHER ETPE L DSS E D E R A T N LA D A T O E I RI S L R T T U C C N AGU OF I CD D F N O LN L OR ! ACP
ED H N T A L E LSR A E U I SC T I E C L S U O S R PT A S P S ME N O OSI S CE T A NC Z EO I N YRA GPG SR OS L O EO NND HIN S CU A EB T S T EN TR N E EAM MHE R NCI I OHU R W Q I V E S R NT EN Y ER 3N O "O T A #PL U EMG HOE T CR LS NA I E CR I RT E IU VR D ECE WRC O UR OO (F P
GU NG I D E AR VS R E E R PU SD L O E RC T O N OR CP D HN T I E WAR S U SI E T S C C E I U NO L R I T S UPS BSN O GSI NEA T C I OZ K I NRN APA BSG FSR E O NO SS I T D N N EUA NBS OFT PON SE MA OEM CRE R YAI ERU KUQ ROE UFR OEY F HR ETO T LA HL 4A L Ans.
5.13
Q17. Explain the Impact of Technology in Banking.
-
Q18. Information security is critical to mitigate the risks of Information technology. Security refers to ensure Confidentiality, Integrity and Availability of information. Determine the various sub-processes involved/ comprise of in the Information Security. (MTP; 6 Marks)
Ans.
RNY Y N O GO I A OF T L N A O I M NF RN HOO O C EYFI T T I N T L A I NI TCS OBN l A I I R T L E T I E A R A T ME MV N E#E R!L O C DP A F N NM T ) AI A F Y D O T SR I R /I K E G S 3H I ) E R T T EN NR H) I O T A F T EY T N T B I A L/O O A GI I 3 T I OA T) T T I N C F ME Dl O DE I E Ol T S T R SI L N E V U A DC CO D I # H T EAC I E T R O S R U C S E UG S L SS A I D G YN EE T EUR I N R SAI O UT A SST CS A KB ER S EHNO ) A NF E " E OR " V I 2 T A Y A Y H T T N I MR I S OR RU K I UN O CTC F EAE A N 3MS B )
Information Security
-
T ONDN T ONE SIAM T R A ST E E M F R R E A RU 2F P OD E ED N C I O FR S O T I NPN D OE U I T S L I A U A T O T N I EER D A MH V EC T L IA P H D M E IWT DNN NOE ASM I LS E A L VAP OBM RSI I PY D PC N AI LA O OP D T E GYP TO NI I RL T UE A L CV E EE R S D SE E E H R S S 4A E S E CY T OI C I RR T PU C A ECR HE SP T
security is comprised of the following sub-processes:
Information
1. Information Security Policies, Procedures and practices:
FT F SNNO O O O T SNIIR T T E R A A A E MZ R S P I T UUN S S I A SCAN UOGID ODRME O I Y DN R RA C I A I E F VL PEE RO TD OPSES L F NAP I S OS S YI MR T TE I E A R COS R UT CCU CS AEF H I EN DTO S S I E G OM R T T E N N I DA VL SA R O R B E G CA Y F S T DOI E I S D NL R 2U AA O C TT ED)N E S X T O I EAR I T E T HR A AE 4C R EMC S S RS MA M E E S C O T R C S R E A Y F Y S S C DTI H L NUNG O OWAI P I OER T R A H S Y U R T MET I E R RNCS U OIUUC F F RFE E T N DS OS I SS UR E S OT L I E O R R A M T VA N TR O A A C DP N EF T O OI N T EGA NC MI I TL ET L P EP P MSA INS SOU I I T O YA I T R I R R A U UG V CI H F EN G S U WOO OCR HMH T OOS R T F N ST R O E HT I F GC E I A 2RS NN OA I T R T A CR I O L F P PY AI T FR O U C SE T C S ED PN SA A Y T I R U C E S G N I T N E M E L P M I F O S T C E P S A S U O I R A V O T E SR R E A F W E T 2F O S E S A B A T A D E H T R O F MN EO T C S Y E S R A GH NC I T I A H R W E PS OM RE OT F S Y YS T I D R UN CA ES S R E OV T R SE R S E E F H E 2T N I D E L L A T S S R NE I V SR I E HS CE I H H WT O ET R A D E WT TC F E O SN
S R E Y A L S U O I R A V T A D E D I V O R P SR S I YE T V I R R UE CS EE S H T WO OT HY OI T T V ST I R C E F E E N 2N O C D N A K R O W T E N F O 6. Network Security:
L A C I S Y H P H G U O R H T D E T N E M E L P M I Y T I R U C E S O T S R E F E 2 S L O R T N O C S S E C C A
7. Physical Security:
TAXMANN®
FD O N SA A EG N R I Y A S L S E YE R ECU KOC RE LP L S A ND RON I E VTA OAL Y CME RF EO A S F S E N HI E L 4FB O A S T L I N RA AEV Y VA A EL L E E SD R UA SOM I A R A S I YV GT N OA O L I O NT NOA I HT M CA R EM O T F N FRI O O F T N SI A R H E GT YN E AR IR L U DUS C NE N AS E S A H C U S G N I K N A B F O S E L U D O M Y E K L L !
E C I F F O K C A " Ans.
3 % 4 3 9 3 . / ) 4 ! 2 / & . ) % 3 ) 2 0 2 % 4 . % ! # % 3
5.14
2. User Security Administration:
3. Application Security:
4. Database Security:
5. Operating System Security:
-
Q19. What are the Key Modules of CBS?
A T A $
M E T S Y 3 D R A # T I D E R #
H C T I W 3 4 !
R E V R E 3 L A R T N E #
G N I K N A B T E N R E T N ) G N I K N A B E L I B O -
G N I K N A " H C N A R "
E S U O H E R A 7
L A R T N E C E H T H T I W D E C A F R E T N I E R A S N O I T C A S N A R W T O DL EE T B A L D E E R N DI A NL AP DX EE T E C ER NA ND ON CA LR L E A V ER R E A S
S YL NCR ON A ON I T T U A O FAI R L S T EU S S C G I E I N EF F I R F O MOER P DKC AC NE FAAI C O "NF P EF T / UG N ENA I I K DC C AA MA MFD" YTR N O S NE E C I AL C EI PC R V MTSR E OOE CNCS AEN4 A R FA ) R O A D N EN OOL H A C I T W R S G T OLN N PE I T ENEN HNMU T OEO SS L T I R C T EE C E CP S A I F TEE F R D O O C U N KPL C CPN A I AUI L P "SS EDNM HNI OO 4AT C
1. Back-office:
-
3 % 4 3 9 3 ' . ) + . ! " % 2 / # ( #
DN NW AO SR NI OE I H T T A S N R O E VS NI E OT I CR U S E C EE YS ON L E P D MD EI B GR NO I F R OG T I N N I D OA MR T ET KO I L N SE A R EA R A Y NE I KH RT OE R WU S OST SGN L NU A I O YK C AAC MMA
ETG L MNU N I IOC R S IU O F OT F S I T NA TD SE T E GEEA S D H UYT ND L L OA E FAZ HN O AL EI Y R FETA R A A A DN WDC N A F AAEO O T K T A ASS A DT E T L I A EAST I N D S E T URSN O I U S A SEO L H S A T HUF E NA EQO OGR ER I A G Y S P R W S E A E R H L F A O T T O F G RYAN R PA$I E T I GWH S E S NET A I GE HUI K T NTRDI AET E Z E "I TK HN D A RTE A F M DOM NNED AO GN T A A I S S NY DRA C NE A AVMR R U YA AC T F EA I C L L DA P C REHP NE HCA AMT A T MOSEN E T NE DI RS I U E M D V MCO RY A RC A OTP P T N S KE UES NH N CMO AT EIB SG N T E AC EI DN T NHR I T A U V O F FO O P RM R P PTE EU NGC 3 MUDI V E O R EC L K T E L N C S S A A Y AR DB S TENG DNN N REEAI N G A M U O CE D I S T S TGNA I I A A Z D E TI ENN R H A R O T EH # M F MT O UL D E AE RG A A N N CN ON T A I A I TH D MC E AC R NS C ONN I AON I T TA R T N T C O EME I AT S MRI A ONNC EF L A I N GN L R OT P AI 4. Automated Teller Machines (ATM):
-
T NRTYSESSYU I N L ANMK R OE E O I HEDO NET I T S I H V T A T T C AR I G SEA LB A H D E D A A U C S T I EESEO NAWF L R 2H MH P AH S O H R P TR HC MT T DAELE C L I T H N AN NN I A N DC AEGL RA E T N R OR ENNA CEA I T B F / K C H H R AE YB T N T B T D L AHH A T C F A S R E A DCA E BZ E NDR H A AAEY I L E E L EO T EDR A NN T R E R E S I M O Z AY O T S A I RR CN EUE HN SL A E L I E CA E R TAVT #H C S NM R T A N 4 E U E N AO A EBSE ERR C S K G CBF E T K AN N% HAN YY T T M 2 I NE OUTAAT O / A AN O T MDBE RN CO #F DC ETR IO S C EA R S H EM F O S N T D ULATMSN W O N N A A I T A I TE OET I A M R I A S M S T D R TRDE C Y S A E R N I H T L AR EV A HH I T I T T RDEOPSW R P S P T O I E AO V AP TN S N !IDE WRNSEA D % DNH S I C OE E EAT YR T NHRCN S E O O C C AM ERTTT A E T L U E R H F V D OL E S " O E G C R T R E R R T S P E N O H A S UO PAC F TL B E $U CW E H GA SCNRDE A / A E C XR NH %T HA OO O% N BT T T LI
TAXMANN®
R EO E NMOSVT I R S OE4 H L E V!S A CCI AOT W F A T L A -TT S E R SN OS S D RRE R M E K E H S E L CT F ME L S I I S R E S U WN OP 4T E A SECQDR R DU C MNT EC HAR AD T C O N A S SN N F T AR MWA I A C S E OR OL S OT DPP T LBR UA N O !TAATEE D C F S A M O R T E NH I E Y K !TDB A I TIEML A P E UGL L EDS T NI L HRN U I OTOOKB T D CNE GU RG A K NOA I L I HCNBS I K ITWYN NT A I AWD O ODI EL BSR Y L T R A C CNC A I O TES V A N I N E N OTHE RCT A I M A T I R N S C T O E ENWV R X L AENF E E R N S L O NTOC NP AC Y O M I S NEIO SA T R I C !A C B A SS E -ER R E N T 4E L AO L 4R !L E M !T PT
TEL E E HI NT BG RS ON E E T -K I N G ) NR N A E DAL B NHP ACM F EI O GV SD NA L I HER K NSMO ANOW E CL "E ET A ERBI C L G I S SI B A D OEH H E -4 GH NT N I O I K O T N CNI EAT B M N D A AN R S T EAN R HE E T L T L FA S O E T SMA E SL DE H I S MC OOU WC M TE EBA R S EI A V GA G NH N I I K K SN NE ZA AI BS B
S C I I N F N O ORT I REC T H C A T S EO L N E RA R NOT A K L SNA I I AC GBN NAA I N K F I NO F AS E FT "R O I S EEEB NMG E I L N O N T AW S /SR U N SCAO A T S I C T NE U WLUI B T OADT N S NNO N KEC I OTOA L SAT I L H C A T N N OA MT I N EU I T F T S I E T Y S H S NT TI H N LG EI A U MC O YNR AAH PNT
Internet Banking
-
3. Credit-Card System:
-
2. Data Warehouse:
5.15
-
5. Central Server:
6. Mobile Banking & Internet Banking:
-
T U P N I R O F D E R I U Q E R A T A D G N I R U T P A C S T N E M U C O D L A U NE AR MA W GF T NO I T S A O ET R N #I N O I T A Z I R O H T U A L A N R E T N )
S N O I T A R E P O $ / " Y A $ F O G N I N N I G E " G N I T A I T I N )
D N A S N O I T A R E P O $ / % Y A $ F O D N %
N O I T C E R R O C R O R R E D N A L O R T N O C R O F S T R O P E R G N I W E I V E 2
E H T T A G N I K R OS S WE N EL MU F IE T S NU WG ON DI T TA U L CA C SS A HE D NN OA I T S A E T U N S ES MI R EA L L P I MM IS I 3S "I #D N EO DE UM L C I NT OE CM OA 4S
T SHAN R GTU E I U S MO O I C RVC OH T OA S UTT CSDN E I E CE RG HI V N NEI CR I EBK H E HMN S WL T UA HATN" GNUEE UOOLN I I H B OT O RCT I H HAWO0 S T N E L F YA I NOA T RO I T L V A HNA G O NN PI O T OI R T A I K T E R E N C T V T S NAO I I S UBK G I FEN E U 2Q HA AT R B E SF I O A-P TY ) C F4I NO!S AERA OB R MT HE N EE CH T NT U AF C#R T O EC BE XA ET KN NNNO AOAS C#BI
LTY A AE L I HT C NTO A NNM O E I I F T R U RT ST E E INL HS T OB T I O NT A RICT OLAR KASO I N NCA E ANR N A T BN O LH AI A F I P YT C T BC NR AA DU NM ED I DN F 3 I OTA V OCCS ROUA PT D N H ES OC CR I U V ECS R MOE E T S O C S I R ATE S V SU E I MD C OE ST L T S I I UB SC O WS M OT L LIA S A G W TO N A I LS L HA U T F E WEL N T R E E A O A S I T RV T I I TF L I A S EEC HH L E AN G T T NFF I SGI SN MI NSUO SH ET E C T T A L S MBDH Y C S OANN N T DU EAA EA R 3KB Z N I Y"A L E A B#B H R T W 4 A K N O EL NNS CF L A IE KB SR SN OAEN K HA NWNC H ASI N H BS AC T E I EL WRYS R B H M E N T SLV A L O E I A EES L I T E R S S C SD A GES N 3NCOEU O I R H F R "U R C T PA Y #S SE NDASK ENTOG REARN C D K OC AI F R W EAENO B O L M L I B L T D I O O A S F T NNS ME OAU RH PDCO T SNF F E O EOI N R T T
TAXMANN®
3 % 4 3 9 3 . / ) 4 ! 2 / & . ) % 3 ) 2 0 2 % 4 . % ! # % 3
5.16
Mobile Banking
Phone Banking:
7. Branch Banking:
-
Enterprise Information Systems & Strategic Management (EIS SM) | CRACKER AUTHOR PUBLISHER DATE OF PUBLICATION EDITION ISBN NO NO. OF PAGES BINDING TYPE
: : : : : : :
Vivek Panwar TAXMANN June 2022 4th Edition 9789356222168 442 PAPERBACK
Rs. : 495 | USD : 37
Description This book is prepared exclusively for the Intermediate Level of Chartered Accountancy Examination requirement. It covers the questions & detailed answers strictly as per the new syllabus of ICAI. The Present Publication is the 4th Edition & updated till 30th April 2022 for CA-Inter | New Syllabus | Nov. 2022/May 2023 exams. This book is authored by CA Vivek Panwar with the following noteworthy features:
· Strictly as per the New Syllabus of ICAI · Coverage of this book includes: All Past Exam Questions
Solved Paper – CA Intermediate November 2020
Solved Paper – CA Intermediate January 2021
Solved Paper – CA Intermediate July 2021 Solved Paper – CA Intermediate December 2021
Solved Paper – CA Intermediate May 2022
Questions from RTPs and MTPs of ICAI Application Based MCQs & Integrated Case Studies
· [Point-wise Answers] are given in this book for easy learning · [Marks Distribution] Chapter-wise marks distribution from May 2018
· [Trend Analysis] for Past Exams from Nov. 2019 · [Comparison with Study Material] Chapter-wise comparison with ICAI Study Material
ORDER NOW