Iii Am MCQ Fintech Fair
Iii Am MCQ Fintech Fair
Iii Am MCQ Fintech Fair
2. Choose 3 from all answer that refer to Technologies that contribute to Fintech
Machine Learning
Closed API
Cloud
Biometrics
Answer b) Closed API
13. Automation and digitization collect a lot of personal data from customers which makes
fintech systems vulnerable to attacks from hackers
Cyber attacks
Cryptocurrencies
Cyber treats
P2P Lending
Answer c) Cyber treats
14. As fintechs grow, they will often need new
Operating license
Innovation
Technologies
None
Answer a) Operating license
16. To overcome challenges and take advantage of opportunities in these dynamic markets
needs of
Money
Opportunities
Innovation
Fame
Answer c) Innovation
18. If they cannot evolve to use technology to become a part in the current financial services
model, they will be gone like dinosaurs. “They” means refer to
Startup
Existing large bank and financial institution
Entrepreneur
Customers
Answer b) Existing large bank and financial institution
20. Credit cards are one of the technological innovations implemented in financial services,
which was found in
1950s
1850s
2005s
1990s
Answer a) 1950s
22. Blockchain networks are much _____ and deal with no real single point of failure.
Simpler
Easier to scale
Convenient
Faster
Answer: B) Easier to scale
Network
GPS
Metadata
Server
Answer: C) Metadata
Customer
Brand
Data
Revenue
Answer: b) Brand
41. ______ is concerned with the duties of the financial managers in the business firm.
Financial Management
Accounting Management
Personnel Management
Merger
Answer: a) Financial Management
42. _______ is the process to convert information into computer Readable form.
E-learning
b) E-commerce
c) Digitization
Net Banking
Answer :c) Digitization
45. _____ stores only those educational certificates, issued by Educational institutes through
digital modes
SWAYAM
b) NAD
c) MOOCs
Digi Locker
Answer: a) SWAYAM
49. What are some of the risks of p2p lending? (multiple choice)
Technology Risk
Fraud risk
Skills Risk
Liquidity risk
Answer : b) fraud risk
52. On average how long does a typical equity crowdfunding campaign last?
1 year
30 days
60 days
90 days
Answer: c) 60 days
58. What is one of the hardest problems for P2P networks to solve?
File addressing
Name resolution
Access logging
File sharing
Answer: b) Name resolution
59. Which of the following might be a reason for a stock market to lose value suddenly?
A terrorist attack
The bankruptcy of a big company
Fear of a global recession
All of the above
Answer: d) All of the above
62. In which identical actions are regulated equally regardless of the legal status or type of
the entity doing the activity.
Activity-based regulation
Entity-based regulation
Outcome-based regulation
None
Answer: a) Activity-based regulation
63. Which requires laws to be applied to licenced firms engaged in comparable and specified
activities ate
Activity-based regulation
Entity-based regulation
Outcome-based regulation
None
Answer: b) Entity-based regulation
64. Where firms are required to ensure certain fundamental, common, and technology related
aspects.
Activity-based regulation
Entity-based regulation
Outcome-based regulation
None
Answer: c) Outcome-based regulation
67. An SRO is a
Governmental organisation
Non-governmental organisation
Private organisation
Public enterprises
Answer: b) non-governmental organisation
76. Which of the following pricing model is used to calculate prices for call and put options?
Black Scholes
Binomial option pricing model
Gaussian statistical model
All of these
Answer: a)Black Scholes
80. Which of the following is not the mutual aspect of Financial regulation?
Consumer protection
Payment Processing
Anti-Money Laundering Rules
Public and securities
Answer: d) Public and securities
81. Which among the following includes every activity that is involved in changing savings
into investment?
Financial services
Financial system
Saving system
Economic system
Ans. A. Financial services
84. Which stage of financing includes buyouts, expansion, and financial development?
First round financing
Early-stage financing
Later-stage financing
None of the above
Ans. C. Later-stage financing
85. _____________ is a process which verifies the identity of a user who wants to access the
system.
Authentication
Non-repudiation
Integrity
None of the above
Answer: a) Authentication
87. Cracking digital identity of any individual or doing identity theft, comes under
__________ of IT Act.
section 65
section 66
section 68
section 70
Answer: B. section 66