刷题
导入试题
【单选题】
个税改革后,下列属于分类所得的项目有: ___
A. 稿酬所得
B. 偶然所得
C. 其他所得
D. 特许权使用费所得
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
在中国境内无住所的个人,在一个纳税年度内在中国境内居住累计不超过___天的,其来源于中国境内的所得,由境外雇主支付并且不由该雇主在中国境内的机构、场所负担的部分,免予缴纳个人所得税
A. 90
B. 183
C. 30
D. 365
【单选题】
个税改革后,省级政府有权制定的税收优惠政策包括:___
A. 烈属取得的经营所得
B. 洪涝灾害但损失不大的
C. 残疾人张三的赌博收益
D. 孤老人员的利息所得
【单选题】
改革后,居民纳税人取得下列所得按次征税的有:___
A. 特许权使用费所得
B. 利息、股息、红利所得
C. 劳务报酬所得
D. 经营所得
【单选题】
纳税人享受子女教育、继续教育、大病医疗、住房贷款利息或者住房租金、赡养老人专项附加扣除,在预缴申报时,纳税人最多可以享受___项
A. 两项
B. 三项
C. 四项
D. 六项
【单选题】
下列属于综合所得中依法确定的其他扣除项目的有:___
A. “三险一金”
B. 大病医疗
C. 商业健康险支出
D. 保险赔款
【单选题】
李某和其妻子钱某婚后购买一套住房,属于首套住房贷款,下列说法正确的是:___
A. 李某和钱某均可以扣除住房贷款利息;
B. 李某和钱某每月均可扣除的额度是1000元;
C. 李某和钱某可以由其中一人扣除,每月扣除额度是1000元;
D. 李某、钱某所购买住房如果在北上广深等城市,扣除的标准要高于1000元。
【单选题】
纳税人享受住房贷款利息专项附加扣除,应当留存:___
A. 住房贷款合同
B. 结婚证
C. 购房发票
D. 物业费收据
【单选题】
纳税人赡养___父母以及其他法定赡养人的赡养支出,可以按照标准定额扣除。
A. 50岁以上
B. 60岁以上
C. 50岁(含)以上
D. 60岁(含)以上
【单选题】
非独生子女赡养老人专项附加扣除的分摊方式不包括___
A. 赡养人平均分摊
B. 赡养人约定分摊
C. 赡养人指定分摊
D. 被赡养人指定分摊
【单选题】
___部门提供技工院校学生学籍信息、技能人员职业资格继续教育信息、专业技术人员职业资格继续教育信息。
A. 教育部门
B. 人力资源社会保障
C. 公安部门
D. 民政部门
【单选题】
纳税人A有姊妹两人,父母均在老家,由在老家的妹妹负责日常照料。以下分摊方法正确的是:___
A. A跟其妹妹约定,每人每月均摊扣除1000元
B. A跟其妹妹约定,由A全部扣除2000元
C. 老人指定A分摊1500元,其妹妹分摊500元
D. 老人指定A分摊500元,其妹妹分摊1500元
【单选题】
纳税人享受子女教育专项附加扣除的起始时间为子女接受教育入学或年满三周岁的___
A. 当月
B. 次月
C. 上月
D. 下年
【单选题】
子女教育专项附加扣除的标准是多少?___
A. 每孩每月1500元
B. 每孩每月800元
C. 每孩每月1200元
D. 每孩每月1000元
【单选题】
纳税人的子女接受___的相关支出,可以按照每个子女规定的标准定额扣除。
A. 课外辅导班
B. 全日制本科学历教育
C. 兴趣辅导班
D. 家庭教师辅导
【单选题】
纳税人在境内接受学历(学位)继续教育,在学历(学位)教育期间按照每月___元的标准定额扣除?
A. 300元
B. 400元
C. 500元
D. 600元
【单选题】
纳税人同一学历继续教育的扣除期限不能超过___月?
A. 24个月
B. 36个月
C. 48个月
D. 60个月
【单选题】
纳税人接受技能人员职业资格继续教育、专业技术人员职业资格继续教育支出,在取得证书的当年,按照___元的标准定额扣除?
A. 2400元
B. 3000元
C. 3600元
D. 4800元
【单选题】
纳税人发生符合条件的大病医疗支出,超过___元的部分在( )元限额内据实扣除。
A. 15000,80000
B. 10000,80000
C. 15000,60000
D. 10000,60000
【单选题】
在一个纳税年度内,与基本医保相关的医药费用,扣除医保报销后个人负担部分,在一定标准内扣除。其中,扣除医保报销后个人负担部分是指___
A. 医保目录范围内自费和自付部分
B. 医保目录范围内自付部分
C. 个人负担的所有费用
D. 医保目录范围内自费部分。
【单选题】
纳税人符合条件的大病医疗支出在什么时候扣除?___
A. 取得大病医疗服务收费等票据的当月
B. 取得大病医疗服务收费等票据的下月
C. 取得大病医疗服务收费等票据的下个季度
D. 取得大病医疗服务收费等票据的次年3月1日至6月30日。
【单选题】
住房租金专项附加扣除标准有几档? ___
A. 两档
B. 三档
C. 四档
D. 五档
【单选题】
纳税人李某符合住房租金扣除条件,具体租房时间自2019年4月起,他可开始享受住房租金扣除的具体时间是? ___
A. 2019年3月
B. 2019年4月
C. 2019年5月
D. 2019年6月
【单选题】
需要办理综合所得汇算清缴的纳税人,应当向任职、受雇单位所在地主管税务机关办理汇算清缴申报,办理时间是___
A. 取得所得的次年1月1日至3月31日内
B. 取得所得的次年3月1日至5月31日内
C. 取得所得的次年1月1日至5月31日内
D. 取得所得的次年3月1日至6月30日内
【单选题】
赡养老人专项附加扣除支出为被赡养人年满60周岁的当月至赡养义务终止的___。
A. 月末
B. 季末
C. 年末
D. 当月
【单选题】
纳税人取得经营所得,向经营管理所在地主管税务机关办理预缴申报时,应报送的表格是___
A. 《个人所得税专项附加扣除信息表》
B. 《个人所得税经营所得纳税申报表(A表)》
C. 《个人所得税经营所得纳税申报表(B表)》
D. 《个人所得税经营所得纳税申报表(C表)》
【单选题】
纳税人在取得经营所得的,应向经营管理所在地主管税务机关办理汇算清缴,办理时间是___。
A. 次年3月31日前
B. 次年4月30日前
C. 次年5月31日前
D. 次年6月30日前
【单选题】
非居民个人在中国境内从两处以上取得工资、薪金所得的,应当向其中一处任职受雇单位所在地主管税务机关办理纳税申报,办理纳税申报的时间是在___
A. 取得所得的次月十五日内
B. 取得所得的季度终了后十五日内
C. 取得所得的次年3月31日前
D. 取得所得的次年6月30日前
【单选题】
纳税人年度中间更换工作单位的,在原单位任职、受雇期间已享受的专项附加扣除金额,不得在新任职、受雇单位扣除。原扣缴义务人应当自纳税人离职不再发放工资薪金所得的___起,停止为其办理专项附加扣除。
A. 当月
B. 次月
C. 当年
D. 次年
【单选题】
享受住房贷款利息专项附加扣除的时间为贷款合同约定开始还款的当月至贷款全部归还或贷款合同终止的当月,扣除期限最长不得超过规定时间,这个规定时间是___
A. 120个月
B. 180个月
C. 240个月
D. 300个月
【单选题】
纳税人次年需要由扣缴义务人继续办理专项附加扣除的,应当在规定时间对次年享受专项附加扣除的内容进行确认,并报送扣缴义务人。这个规定时间是___
A. 每年11月份
B. 每年12月份
C. 每年第三季度
D. 每年第四季度
【单选题】
纳税人报送的《个人所得税专项附加扣除信息表》及其他留存备查资料应当自法定汇算清缴期结束后保存一定时间,这个时间是___
A. 一年
B. 二年
C. 三年
D. 五年
【单选题】
扣缴义务人向居民纳税人支付以下哪项所得时,不需要按预扣预缴方法计算税款。___
A. 利息、股息、红利所得
B. 劳务报酬所得
C. 稿酬所得
D. 特许权使用费所得
【单选题】
支付工资、薪金所得的扣缴义务人应当于年度终了后几个月内,向纳税人提供其个人所得和已扣缴税款等信息。___
A. 一个月
B. 二个月
C. 三个月
D. 四个月
【单选题】
累计减除费用,按照每月5000元乘以什么数计算。___
A. 纳税人当年截至本月在本单位的实际工作月份数
B. 纳税人当年实际任职月份数
C. 纳税人当年截至本月在本单位的任职受雇月份数
D. 当年自然月份数
【单选题】
《个人所得税扣缴申报管理办法(试行)》自什么时候起执行。___
A. 2018年10月1日
B. 2018年12月1日
C. 2019年1月1日
D. 2022年1月1日
【单选题】
纳税人报送给扣缴义务人的《专项附加扣除信息表》,扣缴义务人应当自预扣预缴年度的次年起留存___。
A. 一年
B. 两年
C. 三年
D. 五年
【单选题】
除纳税人另有要求外,扣缴义务人应当于年度终了后___月内,向纳税人提供已办理的专项附加扣除项目及金额等信息。
A. 一个
B. 两个
C. 三个
D. 五个
【单选题】
扣缴义务人向居民个人支付什么所得时,应当按照累计预扣法计算预扣税款。___
A. 劳务报酬所得
B. 稿酬所得
C. 特许权使用费所得
D. 工资、薪金所得
【单选题】
___应当对报送的专项附加扣除信息的真实性、准确性、完整性负责。
A. 纳税人
B. 扣缴义务人
C. 税务机关
D. 公安机关
【单选题】
住房租金专项扣除支出为租赁合同(协议)约定的房屋租赁期开始的当月至租赁期结束的当月,由___享受扣除。
A. 夫妻双方约定扣除
B. 夫妻一方扣除
C. 承租方
D. 出租方
推荐试题
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用