刷题
导入试题
【单选题】
贷款人行使不安抗辩权时,借款人在合理期限内未恢复履行债务能力并且未提供适当担保的,贷款人可以解除合同,( )对此负有通知义务和举证责任。___
A. 借款人
B. 原担保人
C. 贷款人
D. 人民法院
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
贷款档案管理的原则不包括( )。___
A. 集中统一
B. 分散管理
C. 定期检查
D. 按时交接
【单选题】
C 公司前期贷了一笔款项,由于其合理经营得当,想提前偿还贷款,应当与( )协商。___
A. 中国人民银行
B. 贷款人
C. 工商部门
D. 法律部门
【单选题】
重组后的贷款如果仍然逾期,或借款人仍然无力归还贷款,应至少归为( )。___
A. 次级类
B. 关注类
C. 可疑类
D. 损失类
【单选题】
真实客观地反映贷款的风险状况是贷款分类原则中的( )。___
A. 真实性原则
B. 及时性原则
C. 重要性原则
D. 审慎性原则
【单选题】
在银行贷款五级分类中,尽管借款人目前有能力偿还贷款本息,但存在一些可能对偿还产生不利影响因素的贷款是( )。___
A. 损失类贷款
B. 可疑类贷款
C. 次级类贷款
D. 关注类贷款
【单选题】
在市场约束和法制健全的情况下,( )几乎是唯一重要的因素。___
A. 借款人的还款能力
B. 贷款的风险程度
C. 贷款的担保程度
D. 贷款的盈利程度
【单选题】
下面哪一项不属于贷款损失准备金的计提原则?( )___
A. 充足性原则
B. 审慎性会计原则
C. 及时性原则
D. 风险性原则
【单选题】
下列关于确定贷款分类结果的说法,正确的是( )。___
A. 对被判定为正常类的贷款,需分析判断的因素最少
B. 如果一笔贷款的贷款信息或信贷档案存在缺陷,即使这种缺陷对还款不构成实质性影响,贷款也应被归为关注类
C. 在判断可疑类贷款时,只需考虑“明显缺陷”的关键特征
D. 损失类贷款并不意味着贷款绝对不能收回或没有剩余价值,只说明贷款已不具备或基本不具备作为银行资产的价值
【单选题】
下列关于还款可能性分析中,说法不正确的是( )___
A. 银行设立抵押或保证的目的在于,当借款人不能履行还贷义务时,银行可以取得并变卖借款人的资产或取得保证人的承诺
B. 在贷款分类中,需要对借款人的各种非财务因素进行分析
C. 担保也需要具有法律效力,并且是建立在担保人的财务实力以及愿意为一项贷款提供支持的基础之上
D. 银行设立抵押或保证后,如果借款人不能偿还贷款,银行不可以追索债权
【单选题】
下列关于还款记录的分析中,说法不正确的是( )。___
A. 借款人还款记录分析从某种程度上反映了借款人的道德水准、经营水平、担保能力等
B. 还款记录对于贷款分类的确定具有特殊的作用
C. 借款人的还款记录包括从贷款档案中直接反映借款人和从信贷监测网络(电子档案)中反映借款人偿还其他银行及所有债务的能力
D. 借款人目前能够偿还该行贷款,不能偿还其他银行贷款,不能说明借款人的偿还能力已经出现了问题
【单选题】
下列关于各类贷款的主要特征的说法,错误的是( )。___
A. 借款人净现金流减少,属于关注类贷款的特征
B. 借款人不能偿还对其他债权人的债务,属于次级类贷款的特征
C. 借款人处于停产状态,属于可疑类贷款的特征
D. 借款人已经资不抵债,属于次级类贷款的特征
【单选题】
下列贷款不能归为次级类的是( )。___
A. 同一借款人对其他银行的部分债务已经不良
B. 借新还旧
C. 借款人分立以恶意逃废银行债务,本金已经逾期
D. 重组后的贷款仍然逾期
【单选题】
我国贷款风险分类的核心标准是( )。___
A. 借款人的信用水平
B. 借款人的还款能力
C. 贷款偿还的可能性
D. 担保人的担保情况
【单选题】
对公评级如果评为 C 级,则()贷款。___
A. 不影响
B. 不能发放贷款
C. 只能发放抵押贷款
D. 不能发放信用贷款
【单选题】
通常银行通过( )来覆盖非预期损失,通过( )来覆盖预期损失。___
A. 筹集资本金;筹集资本金
B. 提取准备金;提取准备金
C. 筹集资本金;提取准备金
D. 提取准备金;筹集资本金
【单选题】
损失类贷款就是( )发生损失,即在采取所有可能的措施后,本息仍然无法收回的或只能极少部分收回的贷款。___
A. 大部分
B. 全部
C. 大部分或者全部
D. 小部分
【单选题】
商业银行应加强对贷款的期限管理,而( )是贷款分类的重要参考指标。___
A. 逾期天数
B. 逾期日期
C. 逾期展期
D. 逾期不还款
【单选题】
商业银行应当随时保持足够弥补贷款内在损失的准备金指的是( )。___
A. 审慎会计原则
B. 保守会计原则
C. 充足性原则
D. 及时性原则
【单选题】
对公客户财务报表需要录入前()年年报和近一期月报(新成立企业除外)。___
A. 一
B. 二
C. 三
D. 四
【单选题】
商业银行计提贷款损失准备金时,要坚持的原则不包括( )。___
A. 流动性原则
B. 及时性原则
C. 充足性原则
D. 审慎会计原则
【单选题】
某银行 2006 年末的可疑类贷款余额为 400 亿元,损失类贷款余额为 200 亿元,各项贷款余额总额为 40000 亿元,若要保证不良贷款率低于 3%,则该银行次级类贷款余额最多为( )亿元。___
A. 200
B. 400
C. 600
D. 800
【单选题】
某项商业银行贷款,借款人无法足额偿还贷款本息,即使执行担保,也肯定造成较大损失的应属于贷款种类中的( )类。___
A. 关注
B. 次级
C. 可疑
D. 损失
【单选题】
打印支付通知书后,由信贷会计审核后到综合系统,做()一般贷款开户,再做 2036 受托支付解付___
A. 2010
B. 2011
C. 2036
D. 2037
【单选题】
关于基本信贷分析,下列说法正确的是( )。___
A. 如果借款人存在不良的还款记录,银行应拒绝对其贷款,然后进一步分析原因
B. 贷款被挪用会使还款周期变化,贷款偿还的不确定性加大
C. 对银行来说,担保抵押是最可靠的还贷方式
D. 资本转换周期通过一个生产周期来完成
【单选题】
根据《贷款风险分类指引》,下列关于贷款分类的说法,错误的是( )___
A. 不良贷款中包括次级类贷款
B. 同一笔贷款应根据比例拆分进行五级分类
C. 贷款分类的实质是判断债务人及时足额偿还贷款本息的可能性
D. 贷款分类是商业银行按照风险程度将贷款划分为不同档次的过程
【单选题】
对于划分为损失类的贷款,应按贷款余额的( )计提专项准备金。___
A. 0.5
B. 0.75
C. 0.9
D. 1
【单选题】
对贷款进行分类时,要以( )为核心,把( )作为贷款的主要还款来源。___
A. 评估借款人的还款能力;借款人的正常营业收入
B. 评诂借款人的还款能力;贷款的担保
C. 借款人的正常营业收入;贷款的担保
D. 借款人的正常营业收入;评估借款人的还款能力
【单选题】
贷款分类的目标不包括( )。___
A. 揭示贷款的实际价值
B. 及时发现信贷管理过程中存在的问题
C. 提高存贷比
D. 为判断贷款损失准备金是否充足提供依据
【单选题】
按照贷款风险从低到高的顺序排列依次为( )___
A. 正常贷款、关注贷款、次级贷款、可疑贷款、损失贷款
B. 正常贷款、次级贷款、关注贷款、可疑贷款、损失贷款
C. 损失贷款、次级贷款、可疑贷款、关注贷款、正常贷款
D. 损失贷款、可疑贷款、次级贷款、关注贷款、正常贷款
【单选题】
债务人所有的( )财产,一般不能作为抵债资产。()___
A. 著作权
B. 土地使用权
C. 公益性质的职工住宅
D. 股票
【单选题】
以下关于抵押资产的处置做法错误的是( )。___
A. 抵债资产收取后原则上不能对外出租
B. 抵债资产在处置时限内不可以出租
C. 银行不得擅自使用抵债资产
D. 抵债资产拍卖原则上应采用有保留价拍卖的方式
【单选题】
依法收贷的对象是( )___
A. 损失贷款
B. 不良贷款
C. 风险贷款
D. 展期贷款
【单选题】
下列资产属于抵押资产的范围有( )。___
A. 抵债资产本身发生的各种欠缴税费,接近、等于或超过该财产价值的
B. 所有权、使用权不明确或有争议的
C. 土地使用权
D. 债务人公益性质的职工住宅等生活设施、教育设施和医疗卫生设施
【单选题】
下列关于不良贷款的处置方式中说法不正确的是( )。___
A. 对于借款人尚存在一定的偿还能力,银行可尝试通过强制手段进行现金清收
B. 对于借款人经营、管理形成的不良贷款,银行可尝试对借款人、担保条件、还款期限等进行恰当的重组
C. 以资抵债是依法保全银行信贷资产的一种特殊形式
D. 对于通过各种方式均无法实现回收价值的不良贷款,银行应该在完善相关手续的前提下予以核销
【单选题】
下列贷款重组方式中,不属于变更担保条件的是( )。___
A. 将抵押或质押转换为保证
B. 将保证转换为抵押或质押,或变更保证人
C. 直接减轻或免除保证人的责任
D. 借款企业变更
【单选题】
诉前财产保全是指债权银行因情况紧急,不立即申请财产保全将会使其合法权益受到难以弥补的损失,因而在起诉前向( )申请采取财产保全措施。___
A. 人民法院
B. 当地银监会
C. 银行总行
D. 当地人民银行
【单选题】
借款企业变更主要是借款企业发生合并、分立、股份制改造等情形时,银行同意将部分或全部债务转移到( )。___
A. 第三方
B. 贷款方
C. 合并方
D. 债权方
【单选题】
关于贷款常规清收过程中需注意的问题,下列说法错误的是( )。___
A. 要分析债务人拖欠贷款的真正原因,判断债务人短期和中长期的清偿能力
B. 利用政府和主管机关向债务人施加压力
C. 强制执行债务人资产
D. 将依法收贷作为常规清收的后盾
【单选题】
A 企业由于经营不善、无力偿债被人民法院宣告破产,A 企业尚有 1 亿元 B 银行贷款未还,该贷款以 A 企业的厂房为担保。A 企业变价出售后的总破产财产为 2 亿元,其中厂房清算价值为 8 000 万元。A 企业的未偿债务还包括欠缴税款 8 000 万元,职工工资及保险费用4 000 万元,其他普通破产债权 1 亿元。则 B 银行可收回( )。___
A. 4 000 万元
B. 6 000 万元
C. 8 000 万元
D. 1 亿元
【单选题】
( )请求( )给付金钱和有价证券,如果债权人和债务人没有其他债务纠纷的,可以向有管辖权的人民法院申请支付令。___
A. 债权人;债务人
B. 债务人;债务人
C. 债权人;债权人
D. 债务人;债权人
推荐试题
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用