Users can leverage the amortization schedule created by nCin… Users can leverage the amortization schedule created by nCino’s Rate & Payment functionality to determine the payment schedule for approvals. Read Details
The functionality to associate a relationship’s existing cov… The functionality to associate a relationship’s existing covenants to a relationship’s existing loans in bulk on any relationship is available for Lightning and Classic. Read Details
An end-user is capable of filtering the document placeholder… An end-user is capable of filtering the document placeholder view by selecting checkboxes associated with which document manager field? Read Details
In relation to maintaining the nCino application, nCino supp… In relation to maintaining the nCino application, nCino supports the current release version and up to two previous releases of the application (n-2). Read Details
By default, the nCino Document Manager is available for use… By default, the nCino Document Manager is available for use on which of the following objects? Read Details
nCino’s Loan creation page allows for additional configurati… nCino’s Loan creation page allows for additional configuration, such as adding new initial data capture fields and hiding the Loan name option from end users. Read Details
As a requirement for loan approval, a business has agreed to… As a requirement for loan approval, a business has agreed to maintain a certain level of assets or terms over the course of a loan. What is this agreement called? Read Details
In the Add Signer pop-out window on the Suggested Relationsh… In the Add Signer pop-out window on the Suggested Relationships tab, you cannot filter results by Individuals or Businesses. Read Details
True or False? Social media is often used by attackers to di… True or False? Social media is often used by attackers to distribute misinformation in electronic newsletters to try to damage their targets. Read Details
True or False? Lackadaisical or “lazy” programmers may cause… True or False? Lackadaisical or “lazy” programmers may cause harm by intentionally or unintentionally creating exploitable vulnerabilities. Read Details