刷题
导入试题
【单选题】
可转换债券筹资的优点不包括___。
A. 有利于稳定股票价格
B. 可以节约利息支出
C. 可转换为股票,不需要还本
D. 增强筹资的灵活性
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
公司在创立时首先选择的筹资方式是___。
A. 融资租赁
B. 向银行借款
C. 吸收直接投资
D. 发行企业债券
【单选题】
下列资金筹集动机中,属于混合性的筹资动机的是___。
A. 银行借款的提前偿还
B. 企业对外产权投资需要大额资金,其资金来源通过举借长期贷款或发行公司债券解决
C. 股东股利的发放
D. 开展对外投资需要大量的追加筹资
【单选题】
直接筹资是企业直接与资金供应者协商融通资本的筹资活动。下列各项中,不属于直接筹资的是___。
A. 发行债券
B. 吸收直接投资
C. 融资租赁
D. 发行股票
【单选题】
按照是否能够转换成公司股权,可将债券分为___。
A. 记名债券和无记名债券
B. 可转换债券和不可转换债券
C. 信用债券和担保债券
D. 不动产抵押债券和证券信托抵押债券
【单选题】
采用销售百分比法预测对外筹资需要量时,下列各项会使对外筹资需要量减少的是___。
A. 股利支付率提高
B. 固定资产增加
C. 应付账款增加
D. 销售净利率降低
【单选题】
企业本年的销售收入为4000万元,下年预计将增长20%,已知每1元销售收入占用资金0.6元,且形成负债0.2元,企业的销售净利率为5%,股利支付率为30%,则企业下年度对外筹资___。
A. 152万元
B. 425万元
C. 325万元
D. 175万元
【单选题】
下列各种筹资方式中,最有利于降低公司财务风险的是___。
A. 发行普通股
B. 发行优先股
C. 发行公司债券
D. 发行可转换债券
【单选题】
下列各种筹资方式中,筹资限制条件相对最少的是___
A. 融资租赁
B. 发行股票
C. 发行债券
D. 发行短期资券
【单选题】
在下列各项资金时间价值系数中,与资本回收系数互为倒数关系的是___。
A. (P/F,i,n)
B. (P/A,i,n)
C. (F/P,i,n)
D. (F/A,i,n)
【单选题】
某公司从本年度起每年年末存入银行一笔固定金额的款项,若按复利制用最简便算法计算第n年末可以从银行取出的本利和,则应选用的时间价值系数是___。
A. 复利终值数
B. 复利现值系数
C. 普通年金终值系数
D. 普通年金现值系数
【单选题】
在下列各项中,无法计算出确切结果的是___。
A. 后付年金终值
B. 即付年金终值
C. 递延年金终值
D. 永续年金终值
【单选题】
根据资金时间价值理论,在普通年金现值系数的基础上,期数减1、系数加1的计算结果,应当等于___。
A. 递延年金现值系数
B. 后付年金现值系数
C. 即付年金现值系数
D. 永续年金现值系数
【单选题】
有甲、乙两个付款方案:甲方案在五年中每年年初付款6000元,乙方案在五年中每年年末付款6000元,若利率相同,则两者在第五年末的终值___。
A. 相等
B. 前者大于后者
C. 前者小于后者
D. 可能会出现上述三种情况中的任何一种
【单选题】
某一项年金前4年没有流入,后6年每年年初流入1 000元,利率为10%,则该项年金的现值为___元。(P/A,10%,10)=6.1446;(P/A,10%,9)=5.7590;(P/A,10%,6)=4.3553;(P/F,10%,3)=0.7513
A. 2974.7
B. 3500.01
C. 3020.21
D. 3272.13
【单选题】
下列关于资金时间价值的叙述错误的是___。
A. 如果其他条件不变,当期数为1时,复利终值和单利终值是相同的
B. 单利终值系数×单利现值系数=1
C. 复利终值系数×复利现值系数=1
D. 年金终值系数×年金现值系数=1
【单选题】
某人为了5年后能从银行取出10000元,在复利年利率4%的情况下,当前应该存入___元。
A. 8333.33
B. 6219.27
C. 7219.27
D. 8219.27
【单选题】
甲打算在未来三年每年年初存入一笔现金,年利率2%,单利计息,甲希望在第三年年末取出的本利和是6240元,那么未来三年每年存入的现金是___元。
A. 1000
B. 1500
C. 2000
D. 2500
【单选题】
利率为10%,期数为5的即付年金现值系数的表达式是___。
A. (P/A,10%,4)+1
B. (P/A,10%,6)-1
C. (P/A,10%,6)+1
D. (P/A,10%,4)-1
【单选题】
A公司向银行借入200万元,期限为5年,每年末需要向银行还本付息50万元,那么该项借款的利率为___。
A. 7.093%
B. 6.725%
C. 6.930%
D. 7.932%
【单选题】
下列各项中属于在简单条件下确定材料采购经济批量不需要予以考虑的因素是___
A. 相关订货成本
B. 相关储存成本
C. 年平均储存量
D. 调整准备成本
【单选题】
对临时性现多的余裕,可如何处置___
A. 进行长期有价证券投资
B. 购买短期有价证券
C. 举借长期负债
D. 出售一年期的债券
【单选题】
企业的偿债风险对营运资金的要求是___
A. 确定营运资金规模时,应只着眼于偿付短期债券的要求
B. 企业不能毫无约束地随意扩大营运资金占用规模
C. 营运资金必须大于零
D. 企业依靠长期资金来源的流动资产的数额成比重增加
【单选题】
下面关于现金的说法错误的有___
A. 现金是变现力量强的资产
B. 现金是一种盈利性极低的资产
C. 持有现金过多,势必给企业造成的机会损失
D. 现金是一种非温利性资产
【单选题】
经常性的现金短缺,可利用___方式予以弥补
A. 增加短期借款
B. 出售1年期的公司债券
C. 举借长期借款
D. 增加应付帐款
【单选题】
企业持有必要量的现金不出于下列哪种动机___
A. 预防动机
B. 信用动机
C. 交易动机
D. 投机动机
【单选题】
下面关于现金待有动机的说法,正确的是___
A. 企业应持有现金总额不等于现金持有动机各自所需现金持有量的简单相加,前者通常大于后者
B. 现金持有动机所需保持的现金,必须是完全的货币形态
C. 现金在使用过程中一般不会出现时间上的差异
D. 现金可以在各种动机中调剂使用
【单选题】
甲公司现金较少,但由于不想向社会大众传递不良信息,财务经理要求发行公司债券支付股利,也就是现金股利的替代,这种支付方式为___。
A. 现金股利
B. 股票股利
C. 负债股利
D. 财产股利
【单选题】
A公司以持有的B公司有价证券作为股利支付给股东,这种股利属于___。
A. 现金股利
B. 负债股利
C. 股票股利
D. 财产股利
【单选题】
在我国,与股权登记日的股票价格相比,除息日的股票价格将___。
A. 上升
B. 下降
C. 不变
D. 不一定
【单选题】
股利所有权与股票本身分离的日期指的是___。
A. 股利宣告日
B. 股权登记日
C. 除息日
D. 股利支付日
【单选题】
股东要求公司发放稳定的股利,但是经营者想保持一定的灵活性,所以适合的股利政策为___。
A. 固定股利政策
B. 固定股利支付率政策
C. 低正常股利加额外股利政策
D. 剩余股利政策
【单选题】
在下列财务分析主体中,必须高度关注企业资本的保值和增值状况的是___。
A. 短期投资者
B. 企业债权人
C. 企业所有者
D. 税务机关
【单选题】
关于衡量短期偿债能力的指标说法正确的是___。
A. 流动比率较高时说明企业有足够的现金或存款用来偿债
B. 如果速动比率较低,则企业没有能力偿还到期的债务
C. 与其他指标相比,用现金流动负债比率评价短期偿债能力更加谨慎
D. 现金流动负债比率=现金/流动负债
【多选题】
企业与投资者之间的财务关系具体表现为,投资者按其出资比例对企业具有___。
A. 管理控制权
B. 利润分配权
C. 净资产分配权
D. 优先分配剩余财产权
【多选题】
以企业价值最大化作为理财目标的优点是___
A. 考虑了资金的时间价值和风险价值
B. 有利于社会资源的合理配置
C. 有利于克服管理上的短期行为
D. 反映了对资产保值增值的要求
【多选题】
所有者通过经营者损害债权人利益的常见形式是___
A. 未经债权人同意发行新债券
B. 未经债权人同意向银行借款
C. 投资于比债权人预计风险要高的新项目
D. 不尽力增加企业价值
【多选题】
协凋所有者与经营者之间矛盾的措施包括___。
A. 解聘
B. 接收
C. 股票选择权方式
D. 规定借款的用途
【多选题】
企业财务管理的内容包括___。
A. 资金筹资管理
B. 资金投放管理
C. 资金营运管理
D. 资金分配管理
【多选题】
以企业价值最大化作为财务管理的目标,其优点是___
A. 考虑资金的时间价值
B. 考虑风险因素的影响
C. 比较容易确定企业价值
D. 充分体现了对企业保值增值的要求
【多选题】
预测所要做的工作包括___
A. 明确预测目标
B. 搜集相关资料
C. 建立预测模型
D. 确定财务预测结果
推荐试题
【单选题】
The___ is the primary device for entering information into the computer
A. :disk
B. :printer
C. :keyboard
D. :memory
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用