Attempt CAIIB IT and Digital Banking Module D Quiz & Download PDF

Add as a preferred source on Google

In modern banking, technology safety is as important as financial knowledge. For CAIIB aspirants, Module D of IT and Digital Banking focuses on how banks protect their systems from cyber threats, frauds, and operational failures. It also explains audit processes, RBI guidelines, and disaster recovery planning.

Attempting the Module D Quiz along with a structured PDF helps you revise security controls, communication protection, and IT audit concepts in a simple and exam-oriented way. This module is highly important for understanding how banks like RBI regulated systems ensure safe digital transactions.

Download CAIIB IT and Digital Banking Module D Practice Quiz

Strengthen your preparation with a structured and exam-focused PDF specially designed for working banking professionals. The PDF helps you quickly revise important concepts like computer security, communication security, information system audit, BCP and DRP, RBI cyber security guidelines, RFP, and SLA before the exam.

Download Free PDF

Attempt CAIIB IT and Digital Banking Module D Quiz

Attempt the CAIIB IT and Digital Banking Module D quiz to improve your accuracy, conceptual clarity, and confidence for the exam.

CAIIB IT and Digital Banking Module D Quiz Score: 0.00

1. Under ISO/IEC 27001:2013, which of the following domains specifically addresses the requirement for physical and environmental security controls in a bank’s data centre?

2. In a bank’s IT security architecture, the principle of ‘Separation of Duties’ is implemented to mitigate which specific risk category?

3. A bank implements a Demilitarised Zone (DMZ) in its network architecture. Which statement BEST describes the primary security function of a DMZ?

4. In biometric authentication systems used by banks, the ‘False Acceptance Rate (FAR)’ and ‘False Rejection Rate (FRR)’ are inversely related. The point at which FAR equals FRR is known as:

5. ISO/IEC 27005:2018 is specifically designed for which aspect of information security management in banking organisations?

6. The Basel Committee on Banking Supervision’s paper on ‘Risk Management Principles for Electronic Banking’ identifies which of the following as a unique risk introduced specifically by e-banking?

7. A ‘Rootkit’ is particularly dangerous in banking IT environments because of which characteristic that distinguishes it from ordinary malware?

8. In banking communications, the Advanced Encryption Standard (AES) with a 256-bit key is preferred over 3DES (Triple DES) primarily because:

9. Under the Information Technology Act, 2000 (as amended), a digital signature is legally valid in India. Which cryptographic operation does the SIGNATORY perform when creating a digital signature?

10. In India’s Public Key Infrastructure (PKI) for banking, the Controller of Certifying Authorities (CCA) operates under which legislation, and what is its primary role?

11. In PKI, when a bank employee’s digital certificate is compromised (private key stolen), what is the IMMEDIATE action the Certifying Authority (CA) must take, and how is this information disseminated?

12. Which statement MOST accurately distinguishes a Business Continuity Plan (BCP) from a Disaster Recovery Plan (DRP) in the context of banking operations?

13. In Business Continuity Planning, a Business Impact Analysis (BIA) serves as a critical foundational step. What does a BIA primarily determine?

14. As per RBI’s guidelines on Business Continuity Planning, which of the following is mandated as the MINIMUM frequency for testing a bank’s BCP?

15. In the context of disaster recovery strategies, a ‘Hot Site’ differs from a ‘Warm Site’ primarily in which respect?

16. The Recovery Point Objective (RPO) in a bank’s disaster recovery plan defines:

17. An Information Systems (IS) Audit differs from a traditional financial audit primarily in which way?

18. During an IS audit of a bank’s Core Banking System (CBS), an auditor discovers that application logs are overwritten after 30 days. Under RBI guidelines and IS audit best practices, this is a finding because:

19. A bank conducts a ‘Penetration Test’ as part of its security audit. Which approach involves the penetration testing team having COMPLETE knowledge of the internal network architecture, source code, and configurations before testing?

20. In IS audit framework, ‘Application Controls’ are distinct from ‘General Controls’. Which of the following is an example of an application control in a banking system?

Quiz Summary

Attempted
0
Correct
0
Wrong
0
Unattempted
0
Final Score: 0.0

What do you learn in CAIIB IT and Digital Banking Module D?

Module D helps you understand how banks protect their digital systems using strong security frameworks and audit systems. It explains how banking data is secured using physical, logical, and network security methods. You also learn about cyber safety tools like encryption, digital signatures, and disaster recovery planning. RBI guidelines play an important role in ensuring safe digital banking operations.

TopicDetails
Computer SecurityPhysical security, logical security, network security, biometric systems, ISO 27000 standards, Basel recommendations, computer viruses and fraud prevention
Communication SecurityCryptography, digital signatures, Public Key Infrastructure (PKI), certification authorities
Business Continuity and Disaster Recovery PlanningBCP vs DRP, planning process, RBI guidelines, disaster avoidance and recovery strategies
Information System AuditConcept of IS audit, audit procedures, security audit, IS controls, RBI audit guidelines
Competitive Bid Process (RFP & SLA)RFP process, proposal evaluation, contract management, SLA structure, outsourcing guidelines by RBI
RBI Guidelines on Cyber Security & Digital Payment SecurityCyber vs information security, RBI cyber security guidelines (2016), digital payment security controls (2021)

Why should you attempt CAIIB IT and Digital Banking Module D Quiz regularly?

Regular practice of Module D quiz helps you understand complex security and audit concepts in a simple way. It improves your ability to handle MCQs related to cyber security, RBI guidelines, and disaster recovery planning. This practice is very useful for working banking professionals who deal with digital systems daily. It also builds strong revision habits before the CAIIB exam.

  • Improves understanding of cyber security frameworks in banking
  • Strengthens knowledge of RBI guidelines and compliance rules
  • Helps in mastering audit and risk management concepts
  • Enhances speed and accuracy in solving exam MCQs
  • Builds confidence in IT and digital banking topics

What are the key topics covered under computer security in Module D?

Computer security forms the base of Module D as it protects banking systems from internal and external threats. It includes both technical and physical safety measures used in banks. Concepts like encryption, biometric security, and fraud detection are important for digital banking safety. RBI and ISO standards also guide security implementation in banks.

AreaCoverage
Physical SecurityProtection of hardware, servers, and bank infrastructure
Logical SecurityPasswords, access control, authentication systems
Network SecurityFirewalls, intrusion detection, secure communication
Biometric SecurityFingerprint, iris, and facial recognition systems
Standards & GuidelinesISO 27000 series, Basel e-banking recommendations
ThreatsComputer viruses, cyber frauds, malware attacks

How does communication security protect banking transactions?

Communication security ensures that data sent between banks and customers remains safe and private. It uses advanced methods like encryption and digital signatures to protect sensitive information. Technologies like Public Key Infrastructure (PKI) help verify identity and prevent fraud. This makes digital transactions safe and trustworthy.

ConceptExplanation
CryptographyConverts data into secure coded format
Digital SignaturesVerifies identity of sender and ensures data integrity
PKIFramework that manages keys and certificates
Certification AuthoritiesTrusted bodies that issue digital certificates

What is the importance of Business Continuity and Disaster Recovery Planning in banks?

Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) ensure that banking services continue even during emergencies. These plans help banks recover quickly from cyber attacks, system failures, or natural disasters. RBI guidelines also make it mandatory for banks to maintain strong continuity frameworks. This ensures smooth customer service without major disruptions.

AreaDetails
BCP vs DRPBCP ensures overall continuity, DRP focuses on IT system recovery
Planning ProcessRisk identification, impact analysis, recovery strategy
RBI GuidelinesMandatory framework for banking continuity
Disaster AvoidanceBackup systems and preventive controls
Recovery StrategiesData backup, system restoration, alternate sites

How is Information System Audit important in Module D?

Information System Audit ensures that banking IT systems are secure, efficient, and compliant with rules. It checks whether security controls are working properly and identifies risks in digital systems. Audit procedures help banks maintain transparency and avoid cyber risks. RBI guidelines ensure regular IS audits in banking institutions.

AreaDetails
IS Audit ConceptReview of IT systems for security and performance
Audit ProceduresExamination of controls and system checks
Security AuditFocus on cyber safety and risk control
IS ControlsPolicies, procedures, and monitoring systems
RBI GuidelinesMandatory audit standards for banks

Also Check: CAIIB Exam Date 2026

What is the role of RFP, SLA, and RBI guidelines in IT outsourcing?

RFP (Request for Proposal) and SLA (Service Level Agreement) help banks manage IT outsourcing in a structured way. RFP is used to select vendors, while SLA defines service expectations. This ensures accountability and performance in banking IT services. RBI guidelines regulate outsourcing to maintain security and service quality.

ConceptExplanation
RFPProcess to invite and evaluate vendor proposals
Proposal EvaluationComparison based on cost, quality, and compliance
SLAAgreement defining service standards and responsibilities
Contract ManagementMonitoring vendor performance
RBI GuidelinesRules for safe IT outsourcing in banks

How do RBI cyber security guidelines strengthen digital banking?

RBI cyber security guidelines provide a strong framework to protect banks from online threats. They define how banks should manage cyber risks and secure digital payment systems. These rules help maintain trust in online banking services. Master directions also ensure safe and secure digital payment operations.

AreaDetails
Cyber vs Information SecurityCyber security focuses on online threats, information security covers all data protection
RBI Guidelines (2016)Framework for cyber security in banks
Digital Payment Security (2021)Controls for safe digital transactions
ObjectiveProtect customer data and banking systems
ImpactImproves trust in digital banking ecosystem

Also Check:

SubjectLink
CAIIB Central Banking Practice QuizAttempt Now
CAIIB Rural Banking Practice QuizAttempt Now
CAIIB Risk Management Practice QuizAttempt Now
CAIIB IT & Digital Banking Practice QuizAttempt Now
CAIIB HRM Practice QuestionsAttempt Now

FAQs

1. Why is Module D important in CAIIB IT and Digital Banking?

It focuses on cyber security, audit systems, and risk control in digital banking operations.

2. What topics are covered in Module D?

It covers computer security, communication security, BCP, DRP, IS audit, RFP, SLA, and RBI guidelines.

3. What is communication security in banking?

It includes encryption, digital signatures, and PKI to secure data transmission.

4. What is the difference between BCP and DRP?

BCP ensures business continuity, while DRP focuses on IT system recovery after a disaster.

5. Why are RBI guidelines important in Module D?

They ensure safe cyber practices and secure digital payment systems in banks.