100% found this document useful (1 vote)
4K views7 pages

Dqi Quiz

The document contains questions and answers related to data governance, data quality, and data privacy. Some key points covered include: - The possible consequences of data leakage include financial loss, reputational damage, and regulatory strictures. - Customer data should not be stored on desktops and must have restricted and registered access. - Data quality issues can impact branch performance on metrics like the Risk and Financial Inclusion Assessment. - The Data Management Office is responsible for formulating the Data Governance Policy and reports to the DMD and CIO.

Uploaded by

Uday Gopal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views7 pages

Dqi Quiz

The document contains questions and answers related to data governance, data quality, and data privacy. Some key points covered include: - The possible consequences of data leakage include financial loss, reputational damage, and regulatory strictures. - Customer data should not be stored on desktops and must have restricted and registered access. - Data quality issues can impact branch performance on metrics like the Risk and Financial Inclusion Assessment. - The Data Management Office is responsible for formulating the Data Governance Policy and reports to the DMD and CIO.

Uploaded by

Uday Gopal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

What is/are the possible consequences of Data Leakage: Ans: d


a. Financial Loss
b. Reputational damage
c. Regulatory strictures
d. All the above  
2. Can we store customer data on our Desktop? Ans: b
a. Yes
b. No
3. Which is the key responsibilies of Data Owners? Ans: d
a. Reviewing and contributing to Data Management Process and Policies
b. Identifying Data Stakeholders and assigning responsibilities for various Business
c. Assuming ownership of Data Management
d. All of the above
4. Caputuring of incorrect CRA rating/ECR in a loan account may result in ____ Ans: c
a. Incorrect Interest Rate
b. Incorrect Risk Weight
c. Both 1 & 2
d. Neither 1 nor 2
5. What are the main sources for low Data Quality? Ans: d
a. Initial Data Conversion
b. Manual Data Entry
c. Batch Feed
d. All of the above
6. As per the Bank’s approved “SOP on Data sharing with External Agencies/Third Parties”
which of the following is to be considered as “Third Party” Ans: d
a. Officials of SBI Life
b. Officials of SBI Card
c. Officials of SBI MF
d. All the above are to be treated as Third Parties
7. Impact of poor Data Quality on a Branch include ___ Ans: d
a. Penal Score (1 to 3 marks) in RFIA for Project Ganga errors
b. Penal Score (1 to 3 marks) in RFIA for DQI errors
c. Either 1 or 2
d. Both 1 & 2 above
8. Objectives of Data Quality are i. Accuracy, validity ii. Timeliness, completeness iii.
Uniqueness, consistency Ans: b
a. i& II only
b. i, ii & iii
c. i only
d. None of above
9. Data Management Office (DMO) is headed by ___ Ans: c
a. AGM(DMO)
b. CGM(DMO)
c. GM & CDMO
d. DMD & CIO
10. DQI Index has been included as one of the Key Responsibility Areas (KRAs) in Career
Development System (CDS) Ans: a
a. True
b. False
11. What are the impacts of feeding incorrect date of birth of customer in CBS Ans: c
a. Incorrect Customer profile
b. Customer could not be able to reset his INB password
c. 1&2
d. No Impact
12. Data (except for Customer & HR Data) at SBI will be purged on yearly rolling window basis
keeping at latest ________ years of history Data or as per Regulatory / Legal guidelines
which is more stringent Ans: d
a. 5 years
b. 3 years
c. 10 years
d. 15 years
13. Project Ganga Dashboard include divergences related to ___ Ans: d
a. Data Quality(DQ) only
b. Key Risk Indicators(KRI) onlye
c. Neither DQ nor KRI
d. Both DQ & KRI
14. Banks obligation to maintain secrecy arises out of the contractual relationship between
banker and customer, and as such no information should be divulged to third parties except
under circumstances which are well defined. Which one of the following does not qualify as
an exception: Ans: b
a. Where disclosure is under compulsion of law
b. Where Data seeker is the blood relative of the customer whose Data is being shared
and the blood relation is established through documents available with the Bank
c. Where interest of bank requires disclosure
d. Where there is duty to the public to disclose
15. As per the Data Governance Policy, Data Governance Officer (DGO) needs to be
nominated/designated at ___ Ans: d
a. Circle
b. Administrative Office
c. RBO
d. All the above
16. To boost the housing loan business of the branch, list of HNIs can be shared with HLCs
through Ans: c
a. Email
b. Physical Copy
c. Not to be shared
d. Pen Drive
17. A staff can be held accountable for Data Quality Errors Ans: a
a. True
b. False
18. The Best principles for improving Data Quality include(s) Ans: d
a. Doing the things right at very first instance
b. Doing the right things every time
c. Either 1 or 2
d. Both 1 & 2 above
19. Classify the following category of Data “most critical business, customer or regulatory
information, which is intended strictly for use within SBI for limited authorized users” Ans: b
a. SENSITIVE
b. CONFIDENTIAL
c. INTERNAL
d. PUBLIC
20. Updated policies or SOPs on Data Governance can be accessed through (Give Four different
paths of SBI times) Ans: a
a. SBI Times >> Knowledge Hub >> SOPs >> DMO >>
b. SBI Times >> MIS Online >> SOPs >> DMO >>
c. SBI Times >> HR Dashboard >> SOPs >> DMO>>
d. None of the above
21. “Medium” severity of Data Breach/Data Leakage – Incident is reported as Ans: a
a. Monthly Report submission
b. Quarterly Report submission
c. Half yearly Report submission general
d. As and when incident occur
22. At the time of account opening, it was found that Educational Qualification was not
mentioned by the customer in AOF, but it is a mandatory field in CBS Ans: c
a. Teller should leave it blank as it has not been filled by customer
b. As it is mandatory in CBS, teller can fill any details as per his understanding
c. Teller should contact the customer and get the required details and then fill in CBS
d. 1 or 2
23. Analytics refers to the process of using Data in order to : Ans: d
a. Perform
b. Monitor
c. Improve business
d. All of the above
24. DQI dashboard displays errors Ans: d
a. Channel-wise
b. Population-code wise
c. Scale-wise
d. All of the above
25. Data Governance Policy is formulated by which Department: Ans: a
a. Data Management Office
b. Data Protection Office
c. Information Security Department
d. Compliance Department
26. Bank’s MCLR falls under the category: Ans: c
a. Sensitive
b. Confidential
c. Internal
d. Public
27. In the Data Infringement Portal, unattended infringements on Data Loss Prevention (DLP)
may result in Ans: c
a. Penal Score (5 marks) in RFIA of the Branch
b. Penal Score (10 marks) in RFIA of the Branch
c. Penal Score (1 to 4 marks) in RFIA of the Branch
d. No impact on Branch RFIA score
28. Data Management Office reports to which of the DMDs Ans: b
a. DMD & Chief Operating Officer
b. DMD & Chief Information Officer
c. DMD & Group Compliance Officer
d. DMD & Chief Risk Officer
29. Which of the following is true: Ans: d
a. Data Governance is about rules how to build the content
b. Data Privacy is about the rules how to protect and use the contents
c. Data Loss Prevention (DLP) tool helps in ensuring Data Privacy
d. All of the above
30. The access to Customer Sensitive Granular Data to the users should be made on the basis of
Ans: c
a. Need-To-Know
b. Need-To-Access
c. Both 1 & 2
d. Neither 1 nor 2
31. vendor analysis reports is classified as_____ Data Ans: b
A. sensitive
B. confidential
C. Internal
D. D Public
32. Sales plan or non-sensitive information Ans: b
A true
B false
33. Some of the key data privacy initiatives include Ans: d
A. Wi-Fi encryption
B. secure cloud data storage system
C. secured network access
D. all of the above
34. Job opening announcements is classified as dash data Ans: d
A. Sensitive
B.confidential
C.internal
D. public
35. Process for submission and handling of the data request is mentioned in Ans: c
A. Data governance policy
B. Data governance procedure and roles and responsibilities
C. Both
D. none of the above
36. What are the two important pillars of the show sop on customer sensitive granular data sharing
and access-within banks environment Ans: b
A. Regulated and Limited access
B. Restricted and registered access
C. Free and uncontrolled access
D. none of the above
37. Advertisements are classified as-data Ans: d
A. sensitive
B. confidential
C. internal
D. public
38. Internal audit reports is classified as-data Ans: b
A. Sensitive data
B. Confidential
C. Public
39. Where does data come from Ans: d
A. Magically
B. External parties
C. Logs and devices
D. People process and Technology
40. Capturing of incorrect/ data adversely affects Ans: c
A. Data quality
B. Analytical models
C. Both 1 and 2
D. Neither 1 or 2
41. A customer has submitted voter card as OVD along with AOF during the scrutiny it was found
that the age of customer is less than 18
A. ovd can be accepted
B. Dob on ovd and aof, if same then only account may be opened
C. Ovd has to be accepted as it is a government document
D. if one can vote he is not a minor ovd should be accepted
42. In the data infringement portal unattended infringements on data loss prevention ( DLP ) may
result in _ Ans: c
A. Penal score(5 marks) in RFIA of the branch
B. PENAL score (10 marks) in RFIA of the branch
C. Penal score (1 to 4 marks) in RFIA of the branch
D. No impact on branch RFIA score
43. Who provides directions in data governance organisation Ans: a
A. Apex data governance Council / data governance executive Council
B. data stakeholders
C. data analyst
D. Data executives
44. Which one is not an approved way of sharing granular data / access data under normal
circumstances: Ans: d
A. Single sign on (Sso)
B. active directory login(ads)
C. secured file transfer protocol sftp
D. email
45. Objectives of data quality i. Accuracy,validity ii. Timeliness, completeness iii. Uniqueness,
consistency Ans: b
A. i& ii only
B. i, ii & iii
C. i only
D. None of the above
46. Branch has sanctioned car loan to one office staff but the loan installment was not fed in HRMS.
The staff paid the installment through his account and inform the BM that an SIhas been registered
for the same Ans: b
A. As the SI has been registered, no need to put recovery details in HRMS
B. Recovery to Staff loan should be through HRMS only, so recovery details in HRMS needs to
be updated
C. As it is a staff account coma even cash recovery can be accepted. No need to put recovery
details in HRMS
D. Either 1 or 2 or 3
47. While inputting temporary address of a customer in CBS, it should be taken care that Ans: a
A. From and to date in the temporary screen needs to be filled in as declared by the customer
B. A longer period can be filled so that customer don't need to give temporary address details
every now and then
C. From and two dates not to be filled in
D. Change the requested temporary address as permanent address in customerCIF details
48. Circle data governance Council (c-dgc) is headed by Ans: a
A. Circle CGM
B. GM Network
C. DGM & CFO
D. DGM and CDO
49. High severityi of data breach / data leakage incident is reported as Ans: a
A. Monthly report submission
B. Quarterly report submission
C. Half yearly report submission general
D. As and when incident occur
50. Data quality assessment is not about assessing data quality in identifying data quality issues
Ans: b
A. true
B. False
51. What does GDPR stand for Ans: b
A. General data privacy regulation
B. General data protection regulation
C. Gross data protection regulation
D. General Data Priority Regulation
52. Who is data owner for data generated at IT department(like logs, configuration files etc) Ans: b
A. DMD & COO
B. DMD & CIO
C. DGM of concerned IT Department
D. None of the above

53. Data breach risk mitigation period for low category of data breach is Ans: d
A. 1 day
B. 2 days
c. 5 days
d. 7 days
54. Which portal to be accessed for Data Loss Prevention incidents? Ans: b
a. Project Ganga Dashboard
b. Data Infringement portal
c. DQI dashboard
d. MIS Online

55. Non-capturing of PAN in CIF, even if furnished in AOF, may result in__ Ans: c
a. Deduction of excess TDS
b. Non reflection of TDS in form 26AS
c. Both a & b
d. neither a nor b

56. ___ is ultimately accountable with regard to a definitions, data quality and value of data in a
given subject area Ans: a
a. Business owner
b. Technical owner
c. Data custodian
d. None of the above

You might also like