Question
Each question is divided into four parts a,b,c,d. In
some questions they are not in the sequence so according to grammar and context re- arrangement is given in the options. choose best suitable answer. it prevents third partiesĀ like cloud service providers, (A) while it is being transferred(B) cybercriminals from accessing data(C) internet service providers (ISPs) and (D).Solution
here like is used for cloud service providers , internet service providers and cybercriminals. Correct sequence It prevents third partiesĀ like cloud service providers, internet service providers (ISPs) and cybercriminals from accessing dataĀ while it is being transferred. Ā
The economic value of a bank can be viewed as the sum of present values of the bankās expected ________
The price of a forward or futures contract:
The activities of the bank covering issue and underwriting of shares and debentures for its clients are known as:
What is the l imit on total exposure of an originator /lender to the securitization exposures belonging to a securitisation structure or scheme ?
_______ is the entit y that was formed to identify and check fraudulent activity in lending transactions against equitable mortgages .
If external rating of a borrower is changes from A to BBB, how does risk weight change under Basel norms?
Which of the following statement concerning credit risk is incorrect?
Which of the following is a Credit information companies (CIC) that provides credit score on individuals? Ā
Which of the following factors impact the adequacy of a bankās liquidity position ? Ā
CERSAI was formed to discourage and prevent the practice of taking out various loans from several banks using the same asset or property. What does the ...