【多选题】
17:收单行应设置 以对特约商户进行更好的风险控制和提供更好的金融服务。___
A. 收单业务员
B. 风险管理岗
C. 机具管理员
D. 客户经理岗
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
18:特约商户退出包括___。
A. 不正当竞争退出
B. 主动退出
C. 强制退出
D. 因停业、破产等其他原因
【多选题】
19:特约商户出现下列情况之一的,收单行需立即书面通知特约商户强制解除协议,收回POS机具,并保留对风险损失的追索权利___。
A. 多次出现违规操作,经指出拒不纠正的
B. 存在欺诈行为或虚假交易的;发生套现、洗单的
C. 侧录、泄露账户及交易信息的
D. 三个月未发生有效消费交易的
E. 多次无故拒绝受理银联卡,经指证拒不改正的
F. 屡次无理拒绝或故意拖延收单行查询查复业务和调单要求的
G. 多次受到他行投诉、无法妥善处理相关问题的
【多选题】
21:以下商户禁止发展收单业务:___
A. 非法设立的经营组织
B. 我国法律禁止的赌博及博彩类、出售违禁药品、毒品、黄色出版物、军火弹药等其它与我国法律、法规相抵触的商户
C. 涉嫌违规套现、非法洗钱或隐藏目前实际经营业态、故意套用其他行业分类代码的商户
D. 注册地及经营场所不在收单行所在地的商户
E. 存在实际经营范围与营业执照经营范围不符
F. 存在违反国家法律法规或相关行业管理规定,被有关机构查处、被司法机关立案或介入调查
G. 商户或商户负责人被中国银联列入不良信息系统
H. 被其他机构或组织列入“高风险客户”
【多选题】
22:收单行对目标商户进行现场调查的内容包括___。
A. 营业场所
B. 资信记录、财务状况
C. 拍摄实地照片
D. 经营状况
【判断题】
1:各营业网点在分析客户风险等级时,对于风险级别介于相邻等级之间的,原则上应归入较低等级风险类客户进行管理
【判断题】
2:客户在同一机构有多个账户的,该营业网点应综合多个账户的交易信息评定客户洗钱风险等级
【判断题】
3:客户在多个营业网点开户且被评定为不同风险等级的,以其中较高的风险等级为准
【判断题】
4:省级以上大型国有企业,可评定为低风险客户
【判断题】
5:有权机关直接到各支行进行查询、冻结、扣划时,有权机关查询、冻结、扣划完成后,支行于15日内向反洗钱牵头管理部门提交《建议调整申请表》,经反洗钱牵头管理部门负责人批准后,在反洗钱系统内将该客户等级调为高风险
【判断题】
6:有权机关直接到各支行进行查询、冻结、扣划时,有权机关查询、冻结、扣划完成后,支行于10日内向反洗钱牵头管理部门提交《高风险个人客户认定表》或《高风险单位客户认定表》,经反洗钱牵头管理部门负责人批准后,在反洗钱系统内将该客户等级调为高风险
【判断题】
7:《高风险个人客户认定表》、《高风险单位客户认定表》以及调整为高风险客户的《客户风险等级建议调整申请表》等资料的保管期限为应自认定或调整为高风险客户当年起算,至少5年
【判断题】
8:各支行反洗钱工作小组,成立及变更均需向反洗钱牵头管理部门报备
【判断题】
9:对恐怖活动组织及恐怖活动人员与他人共同拥有或者控制的资产采取冻结措施,但该资产在采取冻结措施时无法分割或者确定份额的,各支行应当一并采取冻结措施
【判断题】
10:审计部门每年至少应对本行开展两次反洗钱内部审计
【判断题】
11:定期存款的本金或者本金加全部或者部分利息转为在同一机构开立的同一户名下的另一账户内的活期存款时,可以免报大额交易报告
【判断题】
12:系统未提取到,按照规定应上报而未上报的大额交易,本行各营业机构应在交易发生后的10个工作日内通过手工方式增加大额交易
【判断题】
13:对既属于大额交易又属于可疑交易的交易,本行应当分别提交大额交易报告和可疑交易报告
【判断题】
14:客户身份资料,自业务关系结束当年或者一次性交易记账当年计起至少保存10年
【判断题】
15:同一介质上存有不同保存期限客户身份资料或者交易记录的,应当按最长期限保存
【判断题】
16:客户要求变更姓名或者名称、身份证件或者身份证明文件种类、身份证件号码、注册资本、经营范围、法定代表人或者负责人的,本行各营业机构应当重新识别客户
【判断题】
17:对代理多人开立账户或经常使用他人账户进行交易的,应当进行客户身份尽职调查,并考虑提交大额交易报告
【判断题】
18:发现已经开立的账户有假名情形的,应终止业务关系,并提交可疑交易报告
【判断题】
19:本行为外国政要客户提供开立账户服务时,应当报本行行长批准后方可开立
【判断题】
20:自然人客户的“身份基本信息”中,客户的住所地与经常居住地不一致的,登记客户的住所地
【判断题】
21:支行各营业网点反洗钱工作人员由营业网点负责人担任
【判断题】
22:反洗钱内部审计以风险导向审计理念为基础,只能采用现场审计方式开展反洗钱内部审计工作
【判断题】
23:属于艺术品、珠宝古董批发和零售行业的客户,可评定为低风险客户
【判断题】
25:本行发现恐怖活动组织及恐怖活动人员拥有或者控制的资产,应当立即采取冻结措施
【判断题】
26:当自然人客户由他人代理办理人民币单笔5万元(含)以上或者外币等值1万元美元(含)以上的现金存款业务时,如果存款人因合理理由无法提供被代理人有效身份证件或者身份证明文件,各营业机构可参照有关一次性金融服务时履行客户身份识别的要求,只对代理人开展相关客户身份识别工作
【判断题】
27:按照账户分类管理有关要求,目前本行Ⅲ类户任一时点余额为1000元, Ⅲ类户非绑定账户转入、转出、消费和缴费日累计限额为5000元,年累计限额为10万元
【判断题】
28:目前本行由前台柜面人员内部操作对已核准或已备案的单位账户进行启用,启用后即可入金,无需客户再到柜面办理
【判断题】
29:一般户在柜面综合前端用1058交易码启用时,若0天启用,提供柜员通过人行账户管理系统打印的开户信息即可
【判断题】
30:单位结算账户启用前账户状态为不收不付,启用后为只收不付状态,3个自然日后方可对外付款
【判断题】
31:基本户在柜面综合前端用1058交易码启用时,授权提交柜员通过人行账户管理系统打印的开户信息即可
【判断题】
32:银行在办理开户业务时,发现个人冒用他人身份开立账户的,应当及时向公安机关报案并将被冒用的身份证件移交公安机关
【判断题】
33:对于被全国企业信用信息公示系统列入“严重违法失信企业名单”,以及经银行核实单位注册地址不存在或者虚构经营场所的单位,银行和支付机构不得为其开户
【判断题】
34:银行应当至少每半年排查企业是否属于严重违法企业,情况属实的,应当在3个月内暂停其业务,逐步清理
【判断题】
35:对存在法定代表人或者负责人对单位经营规模及业务背景等情况不清楚、注册地和经营地均在异地等异常情况的单位,银行应当加强对单位开户意愿的核查。银行应当对法定代表人或者负责人面签并留存视频、音频资料等,开户初期原则上可以开通非柜面业务
【判断题】
1:能辨别面额,票面剩余面积二分之一(含)以上、四分之三(不含)以下,其图案、文字能按原样连接的残缺、污损人民币,应向持有人按原面额的一半兑换
推荐试题
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones