刷题
导入试题
【单选题】
402发行人披露盈利预测的,利润实现数未达到盈利预测的___的,除因不可抗力外,中国证监会在36个月内不受理该公司的公开发行证券申请。
A. 80%
B. 70%
C. 60%
D. 50%
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
403到创业板上市的企业应当是最近两年连续盈利,最近两年累计净利润不得少于___万元,且持续增长;或最近一年盈利且浄利润不小千500万。
A. 500
B. 1000
C. 1500
D. 2000
【单选题】
404拟在创业板上市的企业发行后的股本总额不得少于___万
A. 1000
B. 2000
C. 3000
D. 4000
【单选题】
405到创业板上市的企业应当是依法设立且持续经营___年以上的股份有限公司。
A. 1
B. 2
C. 3
D. 5
【单选题】
406到创业板上市的企业发行人最近___年内主营业务和董事、高级管理人没有发生重大变化,实际控制人没有发发生变更。
A. 1
B. 2
C. 3
D. 5
【单选题】
407到创业板上市的企业最近两年累计净利润不得少于1000万元,且持续增长,或最近一年盈利且浄利润不少于___万。
A. 500
B. 800
C. 300
D. 200
【单选题】
408到创业板上市的企业近两年营业收入增长率应不低于___。
A. 20%
B. 25%
C. 30%
D. 35%
【单选题】
409到创业板上市的企业最近一年营业收入应当不少于___万。
A. 3000
B. 2000
C. 6000
D. 5000
【单选题】
410到创业板上市的企业及其___最近三年内不存在损害投资者合法权益和社会公共利益的重大违法行为。
A. 控股股东
B. 控股子公司
C. 控股股东及其控股子公司
D. 控股股东及实际控制人
【单选题】
411到创业板上市的企业需满足最近一期末净资产不少于___万元,且不存在未弥补亏损。
A. 2000
B. 2500
C. 3000
D. 5000
【单选题】
412到创业板上市的企业应当主要经营___业务,其生产经营活动符合法律、行政法规和公司章程的规定,符合国家产业政策及环境保护政策。
A. 一到两种
B. 一种
C. 少数几种
D. 不超过三种
【单选题】
413上市公司及其他信息披露义务人依法披露信息,应当将___报送证券交易所登记,并在中国证券监督管理委员会(以下简称中国证监会)指定的媒体发布。
A. 公告文稿
B. 备查文件
C. 公告文稿和相关备查文件
D. 公告文稿及电子文件
【单选题】
414发行人、上市公司公告的信息披露资料,有虚假记载、误导性陈述或者重大遗漏,致使投资者在证券交易中遭受损失的,以下说法中,___是错误的。
A. 发行人应当承担赔偿责任
B. 上市公司应当承担赔偿责任
C. 发行人、上市公司的董事、监事、高级管理人员和其他直接责任人员以及保荐人,应当与发行人、上市公司承担连带赔偿责任,但是能够证明自己没有过错的除外
D. 证券交易所、国务院证券监督管理机构应当承担连带赔偿责任
【单选题】
415公司应当在毎一会计年度终了时编制财务会计报告,并依法___。
A. 经会计师事务所审
B. 经审查验证
C. 经主管部门同意
D. 公司登记机关审核
【单选题】
416___必须经过注册会计师审计。
A. 月报
B. 中期报告
C. 年报
D. 中报和年报
【单选题】
417下列事项中不需以临时报告形式公告的是___
A. 董事辞职
B. 总经理辞职
C. 中层干部辞职
D. 公司经营范围的重大变化
【单选题】
418董事会秘书负责公司___。
A. 财务报表编制
B. 董事会议案审核
C. 信息批露制度
D. 章程制定
【单选题】
419依法必须披露的信息,应当在___发布,同时将其置备于公司住所、证券交易所,供社会公众查阅。
A. 当地最大报纸
B. 证券专业网站
C. 国务院证券监督管理机构指定的媒体
D. 电视电台
【单选题】
420持有公司___以上有表决权股份的股东,将其持有的股份讲行质柙的,应当自该事实发牛当日,向公司作出书面报告。
A. 1%
B. 5%
C. 10%
D. 25%
【单选题】
421下列不属于上市公司应当披露的定期报告是___。
A. 年度报告
B. 半年度报告
C. 季度报告
D. 月度报告
【单选题】
422公司监事会应当对定期报告提出书面审核意见,说明董事会的___是否符合法律、行政法规和中国证监会的规定,报告的内容是否能够、准确、完整她反映上市公司的实际情况。
A. 意见
B. 编制和审核程序
C. 决议
D. 审核程序
【单选题】
423季度报告应当在每个会计年度第3个月、第9个月结束后的___个月内编制完成并披露。
A. 1
B. 2
C. 3
D. 4
【单选题】
424上市公司应当制定重大事件的报告、传递、审核、披露程序。董事、监事、高级管理人员知悉重大事件发生时,应当按照公司规定立即履行报告义务;董事长在接到报告后,应当立即向董車会报告,并敦促___组织临时报告的发布。
A. 证券事务代表
B. 董事会秘书
C. 总经理
D. 财务总监
【单选题】
425___应当对公司董事、高级管理人员履行信息披露职责的行为进行监督;关注公司信息披露情况,发现信息披露存在违法违规问题的,应当进行调查并提出处理建议。
A. 董事长
B. 总经理
C. 董事会秘书
D. 监事
【单选题】
426___负责组织和协调公司信息披露事务,汇集上市公司应予披露的信息并报告董事会,持续关注媒体对公司的报道并主动求证报道的真实情况。
A. 董事长
B. 总经理
C. 董事会秘书
D. 监事
【单选题】
427上市公司___应当对公司信息披露的真实性、准确性、完整性、及时性、公平性负责。
A. 董事长
B. 总经理
C. 董事会秘书
D. 董事、监事、高级管理人员
【单选题】
428上市公司董事长、经理、___,应当对公司临时报告信息披露的直实性、准确件、完整性、及时性、公平性承担主要责任。
A. 董事
B. 财务负责人
C. 董事会秘书
D. 监事
【单选题】
429上市公司未按本办法规定制定上市公司信息披露事务管理制度的,中国证监会责令改正。拒不改正的,中国证监会___。
A. 警告、罚款
B. 口头批评
C. 出具警示函
D. 罚款
【单选题】
430公开发行证券的申请经___后,发行人应当在(A)公告招股说明书。
A. 中国证监会核准、证券发行前
B. 中国证监会核准、证券发行后
C. 交易所、证券发行前
D. 交易所、证券发行后
【单选题】
431董事、监事、高级管理人员对定期报告内容的真实性、准确性、完整性无法保证或者存在异议的,应当___。
A. 陈述理由和发表意见
B. 拒绝出具意见
C. 陈述理由
D. 发表意见
【单选题】
432定期报告披露前出现业绩泄露,或者出现业绩传闻且公司证券及其衍生品种交易出现异常波动的,上市公司应当及时___。
A. 澄清传闻
B. 披露定期报告
C. 披露本报告期相关财务数据
D. 董事会公告
【单选题】
433公司定期报告中财务会计报告被出具非标准审计意见,证券交易所认为涉嫌违法的,应当___。
A. 提请相关证监局巡检
B. 要求董事会出具专项说明
C. 要求财务顾问专项调查
D. 提请中国证监会立案调查
【单选题】
434发生可能对上市公司证券及其衍生品种交易价格产生较大影响的重大事件,投资者尚未得知时,上市公司应当___,说明事件的起因、目前的状态和可能产生的影响。
A. 二个工作日内披露
B. 一个工作日内披露
C. 立即披露
D. 二天内披露
【单选题】
435证券及其衍生品种发生异常交易或者在媒体中出现的消息可能对公司证券及其衍生品种的交易产生___时,上市公司应当及时向相关各方了解真实情况,必要时应当书面报告。
A. 重大影响
B. 较大影响
C. 影响
D. 股价波动
【单选题】
436涉嫌利用新闻报道以及其他传播方式对上市公司进行敲诈勒索的,中国证监会___,向有关部门发出监管建议函,由有关部门依法追究法律责任。
A. 立案稽查
B. 给予经济处罚
C. 责令改正
D. 给予行政处罚
【单选题】
437以下做法中正确的是___。
A. 召集券商、基金等机构,召开业绩说明会,透露公司业绩将大幅增长
B. 接受中国证券报记者采访,透露公司董事会未披露的重组事 项
C. 开设个人博客,对公司董事会未披露的重大资产收购发表意见
D. 关注公司股票交易以及新闻媒体、网站的报道,对不实传闻及时发布澄清公告
【单选题】
438董事、监事、高级管理人员非经___书面授权,不得对外发布上市公司未披露信息。
A. 股东大会
B. 监事会
C. 董事会
D. 董事长
【单选题】
439公司指定代行董事会秘书职责的人员之前,由___代行董事会秘书职责。
A. 总经理
B. 董事长
C. 股东代表
D. 首席执行官
【单选题】
440发行人应披露发起人、持有发行人___以上股份的主要股东及实际控制人的基本情况。
A. 5%
B. 10%
C. 15%
D. 20%
【单选题】
441凡在招股说明书披露日至___日期间所发生的对投资者做出投资决策有重大影响的信息,均应在上市公告书中披露。
A. 发行公告书刊登
B. 发行
C. 发行申请批准
D. 上市公告书刊登
【单选题】
442首次公开发行股票的公司,在___时,其公司章程(或公司章程草案)的内容,应当按照《上市公司章程指引》的 要求起草或修订。
A. 申请辅导验收时
B. 向中国证监会报送申请材料
C. 取得中国证监会核准时
D. 公司上市之日起一个月内
推荐试题
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用