相关试题
【多选题】
下列岗位中是营运条线网点标准岗位的有( )___
A. 网点综合柜员(普)
B. 网点管理岗
C. 网点综合柜员(特)
D. 网点营运主管
E. 网点综合柜员(普库)
F. 网点复核岗
【多选题】
知识库中的信息包括( )___
A. 规章制度
B. 优化变更
C. 业务案例
D. 业务文档
E. 产品手册
F. 操作说明
【多选题】
在境内531工程中,拟搭建统一的知识信息管理平台,以实现交银集团内知识信息的唯一性和准确性,从而( )___
A. 加强知识文档管理
B. 提升集团的核心竞争力
C. 提高员工工作效率
D. 加强员工风险防控能力
【多选题】
如下对于生产运维平台描述错误的是:___
A. 生产运维平台仅供于上报总行进行事件处理
B. 一张生产运维工单仅可上报总行一次,不可重复使用
C. 所有生产运维工单上报都必须经过所有流程节点(发起、本部门审批、受理分派、处理等)
D. 发起人上传附件后,在上报总行界面,不可直接勾选所需上报总行的附件,必须下载保存后重新上传才可上报总行
【多选题】
分行内部使用运维平台处理工单,可以与如下系统平台或交易联动关联,确保流程的完整性。___
A. 参数平台
B. 综合记账
C. 账调平台
D. 公共收费
【多选题】
分行可在生产运维工单上报总行后,可查询的内容:___
A. 总行处理流程状态
B. 总行处理人员姓名
C. 技改、缺陷流程业务审批人员电话
D. 技改、缺陷流程业务审批人员名称
【多选题】
如下说法正确的是:___
A. 无法打开生产运维发起交易,报错无交易权限是因为岗位下无此功能。
B. 打开生产运维发起交易,报错无法访问生产运维平台是因为岗位下无此功能。
C. 无法打开生产运维发起交易,报错无交易权限是因为技术条线未维护运维角色。
D. 打开生产运维发起交易,报错无法访问生产运维平台是因为技术条线未维护运维角色。
【多选题】
根据不同的业务控制要求,定制()、()、()的审批流程,实现总分行参数信息的全生命周期管理。___
A. 标准化
B. 规范化
C. 高效化
D. 无纸化
【多选题】
总分行参数主管部门负责对各种参数维护情况进行( )、( )、( )参数处理内容。___
【多选题】
总行营运部制定参数运维的()和()。___
A. 统计制度
B. 考核制度
C. 评比标准
D. 考核标准
【多选题】
总分行各层级参数审批人员应仔细审核上报的参数维护申请,查看参数上报维护的信息有无()、(),是否与描述的维护原因不符。___
【多选题】
公共基础参数运维管理实行统一()、统一()、统一()的管理原则。___
【多选题】
公共基础参数管理中总行营运部职责是:___
A. 负责制定公共基础参数运维管理办法并组织实施,制定公共基础参数的管理规则,对各种参数的使用进行解释。
B. 负责监控全行参数平台公共基础参数运维情况,及时协调解决各类异常情况。
C. 负责设计参数运维管理流程,并配套相关系统平台建设需求,制定公共基础参数的管理流程。
D. 负责组织参数平台在境内外分(子)行、子公司、总行业务部门和直营机构的推广、维护和完善等工作,组织开展相关业务培训。
【多选题】
分行特色业务需求业务层面上报管理分为____和 ____ 两类 。___
A. 业务报备管理
B. 业务批复管理
C. 业务报批管理
D. 业务备案管理
【多选题】
分行特色业务需求在符合_________的前提下,可按业务报备流程处理 。___
A. 总行信息安全管理要求
B. 反洗钱
C. 总行相关制度管理要求
D. 无需总行系统配合开发
【多选题】
分行特色业务需求提交流程分为____和 _____ 。 ___
A. 提交业务评审流程
B. 提交业务测试流程
C. 提交业务审批流程
D. 提交技术评估流程
【多选题】
对于业务报批类需求,必须发起提交业务评审流程,同时可根据需要选择是否需同步发起技术评估流程。因此,该情况下分行业务部门发起方式有以下两种选择:____。 ___
A. 直接发起技术评估流程
B. 先发起业务评审流程, 业务评审完成后再提交技术评估流程 。
C. 先发起提交技术评估流程, 技术评估完成后再提交业务评审流程 。
D. 同步发起业务评审流程和技术评估流程,主要适用于对于部分较为紧急的需求,可由技术人员更早介入需求评估分析工作,但由业务评审完成后方可启动开发。
【多选题】
关于分行优化建议上报审批管理模式,以下上报路径正确的有_______。___
A. 网点-省辖行-省直分行-总行
B. 网点-中心支行-省直分行-总行
C. 中心支行-省直分行-总行
D. 省辖行-省直分行-总行
E. 省直分行-总行
【判断题】
保证金账户依据银行业务管理需要开立,用于存放客户或融资性担保机构向交行缴存的保证金,不得用于存放其他结算资金。保证金存款必须有对应的保证事项
【判断题】
业务系统在办理保证金相关业务时,不可由业务系统联动开立保证金账户
【判断题】
同一保证金账户可以存入不同币种、不同储种的保证金
【判断题】
已在交行开立结算账户并预留印鉴的客户开立保证金账户不需预留印鉴
【判断题】
保证金款项的支取,保证金卡片锁定、解锁、手工结清等处理应由业务经营部门出具《保证金存款账户管理申请表》。基层营业机构凭此进行业务处理
【判断题】
业务卡片编号由外围系统指定生成,存储在保证金系统内,业务编号在同一保证金账号下唯一。一次锁定产生一笔业务卡片,一笔业务卡片只能对应一张保证金核算卡片
【判断题】
“联动锁定”由业务系统发起锁定,既能通过业务系统联动解锁,也能通过柜面进行解锁
【判断题】
保证金账户下所有卡片结清后,才可以进行销户处理
【判断题】
保证金账户中用于担保,并已为交行设定质押权利的,原则上不得办理扣划
【判断题】
活期保证金账户以对年对月对日方式,根据交行挂牌活期存款利率按季计付利息。如遇挂牌利率在结息周期内变化,活期保证金存款分段计息
【判断题】
同一保证金账户只能存入同一币种、不同储种的保证金
【判断题】
存款人缴存保证金必须从同名结算账户转入。在交行同时开立结算账户和保证金账户的,保证金应从同一客户号下结算账户转账存入,对存款人未在交行开立结算账户的,保证金可从暂收账户转账存入
【判断题】
锁定保证金原则上应通过系统联动处理。对业务无法联动锁定保证金的,分行业务经营部门必须填制《保证金款项处理通知书》要求基层营业机构锁定相应保证金。业务结束后,基层营业机构凭业务经营部门填制的保证金款项处理通知书》进行后续处理
【判断题】
保证金资金卡片全部转出后,余额为零自动结清资金卡片
【判断题】
保证金存入时必须指定同一客户号下的结算账户作为入息账户,利息自动转入此账户
【判断题】
《非税收入一般缴款书》用于向中央财政专户缴纳中央财政非税收入资金时使用
【判断题】
中央财政非税收入资金的收缴方式包括直接缴款和集中缴库
推荐试题
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions