相关试题
【多选题】
贷款承诺/信贷证明包含以下种类:___
A. 有条件可撤销的贷款承诺
B. 无条件可撤销的贷款承诺
C. 无条件可撤销的信贷证明
D. 不可撤销的信贷证明
【多选题】
授信表外业务的会计核算包括:___
A. 贷款承诺开立
B. 本金付出
C. 解除承诺
D. 信贷证明开立
【多选题】
贷款发放时,需扫描至金融服务中心进行集中录入的表单和凭证包括:___
A. 额度使用申请书
B. 贷款合同
C. 受托支付委托书
D. 贴现申请书
【多选题】
以下哪些是有规律还息计划的还息日期:___
A. 每个月的21日(节假日顺延至第一个工作日)
B. 3、6、9、12月的21日(节假日顺延至第一个工作日)
C. 6、12月的21日(节假日顺延至第一个工作日)
D. 12月21日(节假日顺延至第一个工作日)
E. 每个月的5日(节假日顺延至第一个工作日)
F. 3、6、9、12月的15日(节假日顺延至第一个工作日)
【多选题】
授信表外业务全流程电子化处理包括:___
A. 授信审批
B. 额度生效到贷款承诺/信贷证明的开立
C. 发放贷款
D. 贷款承诺/信贷证明的修改
E. 贷款承诺/信贷证明解除
【多选题】
银团(联合)贷款业务电子化处理包括:___
A. 授信审批
B. 额度生效
C. 贷款发放
D. 贷款归还
【多选题】
贷款还款方式包括以下哪些:___
A. 一次性利随本清
B. 分次还本一次还息
C. 分次还息一次还本
D. 自定义还本还息
【多选题】
贷款资金的支付方式包括:___
A. 联合支付
B. 协议支付
C. 受托支付
D. 自主支付
【多选题】
贷款信息维护主要包括:___
A. 还款计划的建立和维护
B. 贷款利率/费率信息的变更
C. 还款账户的设定
D. 结息周期变更
E. 贷款到期日的变更
【多选题】
银团(联合)贷款利息包括:___
A. 本行利息
B. 应收利息
C. 参加行利息
D. 其他相关利息
【多选题】
融资性保函包括:___
A. 借款保函
B. 租赁保函
C. 债券发行保函
D. 付款保函
【多选题】
根据保函受益人是否为我行分支机构,保函分为:___
A. 系统内保函
B. 系统外保函
C. 一般保函
D. 附条件保函
【多选题】
保函业务实行电子化处理包括:___
A. 授信审批
B. 额度生效到保函开立
C. 对外付款
D. 保函闭卷
【多选题】
保函修改包括:___
A. 保函金额修改
B. 保函营运产品码修改
C. 保函展期
【多选题】
委托贷款业务中的委托人包括:___
A. 中央银行
B. 政府部门
C. 公积金管理中心
D. 银监会
E. 其他单位
F. 政策性银行
【多选题】
对公授信业务中,手续费收取的方式包括:___
A. 业务发放或开立时联动收取
B. 还款或闭卷时联动收取
C. 建立收费计划,系统自动收取
D. 通过柜面账户收费交易收取
【多选题】
对公授信业务中,费用收取需按照服务期摊销的包括:___
A. 先收取的委托贷款手续费
B. 先收取的保函手续费
C. 按计划收取的手续费
D. 贷款承诺费
【多选题】
工程单位普通贷款中,贷款放款后,根据我行与借款人之间的约定,可对___等贷款利率/费率信息进行变更。
A. 贷款利率值
B. 利率浮动周期
C. 利率代码
D. 费率代码
E. 浮动规则
【多选题】
系统增加日始扣款功能后,以下哪些纳入日始扣款的范围___
A. 贷款当日到期的利息
B. 逾期本金产生的利息以及逾期未归还的利息
C. 贷款到期及逾期的本金
D. 为保全该笔贷款垫付的诉讼费垫款
【多选题】
使用单位结算卡在柜面办理转账业务使用的凭证是: ___
A. 转账支票
B. 进账单
C. 结算业务申请书
D. 无需使用凭证
【多选题】
单位结算卡卡号位数是: ___
A. 16位
B. 17位
C. 19位
D. 21位
【多选题】
银联单位结算卡BIN号是: ___
A. 955598
B. 623261
C. 621391
D. 622262
【多选题】
同一单位客户最多可申请开立几张单位结算卡? ___
A. 1张
B. 5张
C. 10张
D. 无限制
【多选题】
单张单位结算卡的自助设备取现交易上限为每卡每日累计: ___
A. 2千元
B. 2万元
C. 50万元
D. 无限制
【多选题】
同一单位银行结算账户关联不同单位结算卡的,同一账户的自助设备取现交易上限为每户每日累计: ___
A. 2千元
B. 1万元
C. 2万元
D. 无限制
【多选题】
客户在交行柜面办理单位结算卡取现、转账业务金额超过 ,取款人须出示本人有效身份证件(委托代理的,须同时出示持卡人有效身份证件)。 ___
A. 2万元(含)
B. 5万元(含)
C. 10万元(含)
D. 20万元(含)
【多选题】
单位结算卡下每个关联账户最多可设置几个用款计划? ___
A. 1个
B. 5个
C. 10个
D. 无限制
【多选题】
银联单位结算卡通过自助渠道办理取现、转账业务时的默认通兑范围是: ___
A. 不通兑
B. 地区通兑
C. 分行通兑
D. 全国通兑
【多选题】
单位结算卡在我行自助票据机可办理的业务包括: ___
A. 取现
B. 转账
C. 回单打印
D. 对账单打印
【多选题】
使用企业网银单位结算卡用款计划快速设置功能时,必须输入的要素包括: ___
A. 用款日期
B. 业务种类
C. 支付限额
D. 总限额
【多选题】
以下哪些自助设备可办理单位结算卡取现业务? ___
A. ATM
B. 交银自助通
C. 自助票据机
D. iTM
【多选题】
以下哪些自助设备可办理单位结算卡转账业务? ___
A. ATM
B. iTM
C. 交银自助通
D. 自助票据机
【多选题】
下列哪些单位结算卡业务必须由持卡人本人办理: ___
A. 激活
B. 开卡
C. 销卡
D. 密码修改
【多选题】
开立单位结算卡必须提交的申请资料包括: ___
A. 交通银行单位结算卡服务协议
B. 交通银行单位结算卡业务申请书
C. 持卡人有效身份证件
D. 单位法定代表人有效身份证件
【多选题】
单位结算卡在他行ATM/CRS可办理的业务包括: ___
A. 存现
B. 取现
C. 转账
D. 密码修改
【多选题】
单位结算卡用款计划支付限额种类包括: ___
A. 单笔限额
B. 每日限额
C. 每月限额
D. 总限额
【多选题】
在电子商业汇票业务中,交行持票人可对持有的票据在企业网银进行背书转让操作。操作时应填写()等信息。___
A. 被背书人开户银行
B. 被背书人账号
C. 被背书人全称
D. 是否允许再次转让
【多选题】
关于电子商业汇票的说法正确的是___
A. 电子商业汇票可以转换为纸质商业汇票,但纸质商业汇票不能转换为电子商业汇票。
B. 我行相关系统保存的电子商业汇票最终信息如与人行电子商业汇票信息不符时,以我行电子商业汇票信息为准。
C. 各营业机构提供电子商业汇票服务时,应对客户基本信息的真实性负审核责任。
D. 收款人、被背书人可与我行签订协议,委托我行代为签收并代理签章。
【多选题】
关于电子商业汇票的付款期限的说法错误的是___
A. 自出票日起、至到期日止,最长不得超过( 3个月)
B. 自出票日起、至到期日止,最长不得超过( 6个月)
C. 自出票日起、至到期日止,最长不得超过( 1年 )
D. 自出票日起、至到期日止,最长不得超过( 2年 )
【多选题】
关于电子商业汇票单张票据金额最高限额说法错误的是___
A. 5千万
B. 1亿
C. 10亿
D. 20亿
推荐试题
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source