刷题
导入试题
【判断题】
客户申请解挂的,已收取的挂失手续费不退回客户,并且需要登记《挂失登记簿》并签章
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
质押期间存款账户为“质押控制”状态,存款人不得支取,不得挂失
A. 对
B. 错
【判断题】
单位存款账户转入久悬不动户后,账户状态为不收不付
A. 对
B. 错
【判断题】
对私活期存款账户准入睡眠户后,账户状态为不收不付
A. 对
B. 错
【判断题】
被列入久悬不动户或睡眠户管理的账户所有权仍属于存款人,当存款人出具合法拥有账户支配权的证明文件后可办理支取或销户手续
A. 对
B. 错
【判断题】
通过【7317库管尾箱交接】交易进行尾箱交接时,只能单向操作,反向时只能由原交出库管收回
A. 对
B. 错
【判断题】
信用社员工可以保管客户银行卡及密码并替代储户取款
A. 对
B. 错
【判断题】
营业网点必须与客户签订账户管理协议,对账服务协议根据需要可签订也可以不签订
A. 对
B. 错
【判断题】
银行得知存款人已注销或被吊销营业执照的,如存款人超过规定期限未主动办理撤销手续的,银行有权停止其银行结算账户的对外支付,并要求存款人撤销银行结算账户
A. 对
B. 错
【判断题】
对公账户、未通兑的对私账户只能在开户网点办理凭证挂失、密码挂失
A. 对
B. 错
【判断题】
批量开立的银行卡必须先进行初始密码激活,且密码激活只能由持卡人本人办理
A. 对
B. 错
【判断题】
郑州市郊联社目前采取网点对账模式进行对账
A. 对
B. 错
【判断题】
专用存款账户和和临时存款账户不能办理协定存款业务
A. 对
B. 错
【判断题】
周六,某客户想通过网银对外转账30万元,由于大额支付系统已关闭,因而只能通过小额支付系统每笔转5万,共转6笔实现此交易
A. 对
B. 错
【判断题】
做1058账户启用时,对于核准类账户“登记日期”为在人行账户管理系统录入账户信息的日期
A. 对
B. 错
【判断题】
假币持有人若对被收缴的伪造、变造人民币持有异议,可以向中国人民银行或者其授权的国有独资商业银行的业务机构申请鉴定。盖有“假币”字样戳记的人民币,经鉴定为真币的,则按照面额予以兑换;经鉴定为假币的,则予以没收
A. 对
B. 错
【判断题】
经公证机构审查确认身份的继承人,可凭公证机构出具的《存款查询函》查询作为被继承人的存款人在各银行业金融机构的存款信息
A. 对
B. 错
【判断题】
商业银行应当在公告的营业时间内营业,但有特殊情况时,可以自行停止营业或者缩短营业时间
A. 对
B. 错
【判断题】
专用存款账户是存款人按照法律、行政法规和规章,对其特定用途资金进行专项管理和使用而开立的银行结算账户。同一证明文件可以开立多个专用存款账户
A. 对
B. 错
【判断题】
办理1082同客户转账时,转入方账户必须与转出方账户在同一客户号下方能办理
A. 对
B. 错
【判断题】
可以使用特殊业务申请省中心授权通过表代替其他制式申请表
A. 对
B. 错
【判断题】
《特殊业务远程集中授权规范操作对照表》中各附件模板,在业务办理过程中,各行社可根据实际情况,针对要处理的业务对附件内容进行修改或补充,但是模板上面的要素不可缺失
A. 对
B. 错
【判断题】
基本存款账户可以通过【1132】交易将账户分类维护为验资户,同时验资户也可通过1132交易维护为其他类账户
A. 对
B. 错
【判断题】
省联社集中授权以前办理的未进行后续处理的挂失业务,若挂失申请书涂改,需在涂改处加盖柜员私章(同一柜员处理)或出具特殊业务申请省中心授权通过表(非同一柜员处理)
A. 对
B. 错
【判断题】
【1052个人账户开户】业务中个人业务交易单的填写,各项内容应与系统一致,若单据中无账户类别和支取方式的相应选项,应勾选其它并注明具体内容,存期填写与交易界面中产品代号后的存期一致,享档档等存期显示不约定又需要选择到期日期的产品,可以写为不约定或不约定(X年)
A. 对
B. 错
【判断题】
资金从内部账转入客户账,授权时应提供相关转账依据,无法提供的,应有市县行社相关部门的审批(财政类等有单独规定的业务除外)
A. 对
B. 错
【判断题】
单位定期提前支取,授权时需提供单位公函(若提交的授权委托书中写明提前支取单位定期的,则无需再提供公函)
A. 对
B. 错
【判断题】
【6030通存业务】授权需要提交个人业务交易单时,个人业务交易单正面应填写完整,授权时要求有客户(代理人)的签名
A. 对
B. 错
【判断题】
金额冻结可以一次性冻结该账户的全部子账户
A. 对
B. 错
【判断题】
进行质押控制、差错临控操作时,“是否自动解控”字段应选择“否”,否则到期系统会自动解控账户
A. 对
B. 错
【判断题】
卡内定期子账户进行质押时,应通过【1101定期凭证互转】交易转为存单后办理
A. 对
B. 错
【判断题】
借款人(保证人)存款内部止付、解除止付、扣划申请表(特殊业务附件9)是用于控制、扣划不良贷款授权时使用,正常的质押、控制交易和保证金账户转账不允许使用
A. 对
B. 错
【判断题】
冻结扣划业务,系统中文书编号应为协助执行通知书编号,因字符限制无法完整输入时,可依据字符上限适当进行简化,但应保证主要编号录入系统
A. 对
B. 错
【判断题】
有权机关扣划时,柜员可以使用【5625代理文件上送处理】交易中的“代扣”进行处理
A. 对
B. 错
【判断题】
客户凭证作废时,发现通过【7152】交易打印的凭证状态显示异常,需做相关处理后,再进行作废处理
A. 对
B. 错
【判断题】
年龄16周岁(含)至18周岁(不含)客户开立电子银行业务时,除授权应提交资料要求的内容外,需提供能够证明其收入的交易流水或工作证明
A. 对
B. 错
【判断题】
营业网点只接受客户本人及有权机关对客户账户信息的查询,其他人无权查询。但是法定继承人可凭公证机构出具的《存款查询函》或有关法律文书查询相关存款信息
A. 对
B. 错
【判断题】
客户遗产继承,有公证书(非遗嘱公证)或相关法律文书的,授权时不需要提供死亡证明
A. 对
B. 错
【判断题】
柜员账务操作失误,经与客户充分沟通后,客户恶意不退还的,为减少损失,柜员可做1204账户控制及维护,选择差错临控。农信银业务做6034差错控制
A. 对
B. 错
【判断题】
客户持存折或存单来网点办理业务,柜员发现折单号有涂改,应查明原因,授权时填写特殊业务申请省中心授权通过表,同时建议客户销户或换折
A. 对
B. 错
【判断题】
特殊业务申请省中心授权通过表中,因特殊情况无法盖章时,柜员应在备注栏中写明:因什么原因无法盖章,何时补盖章
A. 对
B. 错
推荐试题
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用