刷题
导入试题
【单选题】
直接筹资是企业直接与资金供应者协商融通资本的筹资活动。下列各项中,不属于直接筹资的是___。
A. 发行债券 
B. 吸收直接投资  
C. 融资租赁
D. 发行股票
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
按照是否能够转换成公司股权,可将债券分为___。
A. 记名债券和无记名债券 
B. 可转换债券和不可转换债券
C. 信用债券和担保债券
D. 不动产抵押债券和证券信托抵押债券
【单选题】
采用销售百分比法预测对外筹资需要量时,下列各项会使对外筹资需要量减少的是___。
A. 股利支付率提高
B. 固定资产增加
C. 应付账款增加
D. 销售净利率降低
【单选题】
企业本年的销售收入为4000万元,下年预计将增长20%,已知每1元销售收入占用资金0.6元,且形成负债0.2元,企业的销售净利率为5%,股利支付率为30%,则企业下年度对外筹资___。
A. 152万元
B. 425万元
C. 325万元
D. 175万元
【单选题】
下列各种筹资方式中,最有利于降低公司财务风险的是___。
A. 发行普通股
B. 发行优先股
C. 发行公司债券
D. 发行可转换债券
【单选题】
下列各种筹资方式中,筹资限制条件相对最少的是___
A. 融资租赁
B. 发行股票
C. 发行债券
D. 发行短期资券
【单选题】
在下列各项资金时间价值系数中,与资本回收系数互为倒数关系的是___。
A. (P/F,i,n)
B. (P/A,i,n)
C. (F/P,i,n)
D. (F/A,i,n)
【单选题】
某公司从本年度起每年年末存入银行一笔固定金额的款项,若按复利制用最简便算法计算第n年末可以从银行取出的本利和,则应选用的时间价值系数是___。
A. 复利终值数
B. 复利现值系数
C. 普通年金终值系数
D. 普通年金现值系数
【单选题】
在下列各项中,无法计算出确切结果的是___。
A. 后付年金终值
B. 即付年金终值
C. 递延年金终值
D. 永续年金终值
【单选题】
根据资金时间价值理论,在普通年金现值系数的基础上,期数减1、系数加1的计算结果,应当等于___。
A. 递延年金现值系数
B. 后付年金现值系数
C. 即付年金现值系数
D. 永续年金现值系数
【单选题】
有甲、乙两个付款方案:甲方案在五年中每年年初付款6000元,乙方案在五年中每年年末付款6000元,若利率相同,则两者在第五年末的终值___。
A. 相等
B. 前者大于后者
C. 前者小于后者
D. 可能会出现上述三种情况中的任何一种
【单选题】
某一项年金前4年没有流入,后6年每年年初流入1 000元,利率为10%,则该项年金的现值为___元。(P/A,10%,10)=6.1446;(P/A,10%,9)=5.7590;(P/A,10%,6)=4.3553;(P/F,10%,3)=0.7513
A. 2974.7
B. 3500.01
C. 3020.21
D. 3272.13
【单选题】
下列关于资金时间价值的叙述错误的是___。
A. 如果其他条件不变,当期数为1时,复利终值和单利终值是相同的
B. 单利终值系数×单利现值系数=1
C. 复利终值系数×复利现值系数=1
D. 年金终值系数×年金现值系数=1
【单选题】
某人为了5年后能从银行取出10000元,在复利年利率4%的情况下,当前应该存入___元。
A. 8333.33
B. 6219.27 
C. 7219.27
D. 8219.27
【单选题】
甲打算在未来三年每年年初存入一笔现金,年利率2%,单利计息,甲希望在第三年年末取出的本利和是6240元,那么未来三年每年存入的现金是___元。
A. 1000 
B. 1500 
C. 2000
D. 2500
【单选题】
利率为10%,期数为5的即付年金现值系数的表达式是___。
A. (P/A,10%,4)+1 
B. (P/A,10%,6)-1
C. (P/A,10%,6)+1
D. (P/A,10%,4)-1
【单选题】
A公司向银行借入200万元,期限为5年,每年末需要向银行还本付息50万元,那么该项借款的利率为___。
A. 7.093% 
B. 6.725% 
C. 6.930%
D. 7.932%
【单选题】
下列各项中属于在简单条件下确定材料采购经济批量不需要予以考虑的因素是___
A. 相关订货成本
B. 相关储存成本
C. 年平均储存量
D. 调整准备成本
【单选题】
对临时性现多的余裕,可如何处置___
A. 进行长期有价证券投资
B. 购买短期有价证券
C. 举借长期负债
D. 出售一年期的债券
【单选题】
企业的偿债风险对营运资金的要求是___
A. 确定营运资金规模时,应只着眼于偿付短期债券的要求
B. 企业不能毫无约束地随意扩大营运资金占用规模
C. 营运资金必须大于零
D. 企业依靠长期资金来源的流动资产的数额成比重增加
【单选题】
下面关于现金的说法错误的有___
A. 现金是变现力量强的资产
B. 现金是一种盈利性极低的资产
C. 持有现金过多,势必给企业造成的机会损失
D. 现金是一种非温利性资产
【单选题】
经常性的现金短缺,可利用___方式予以弥补
A. 增加短期借款
B. 出售1年期的公司债券
C. 举借长期借款
D. 增加应付帐款
【单选题】
企业持有必要量的现金不出于下列哪种动机___
A. 预防动机
B. 信用动机
C. 交易动机
D. 投机动机
【单选题】
下面关于现金待有动机的说法,正确的是___
A. 企业应持有现金总额不等于现金持有动机各自所需现金持有量的简单相加,前者通常大于后者
B. 现金持有动机所需保持的现金,必须是完全的货币形态
C. 现金在使用过程中一般不会出现时间上的差异
D. 现金可以在各种动机中调剂使用
【多选题】
企业与投资者之间的财务关系具体表现为,投资者按其出资比例对企业具有___。
A. 管理控制权
B. 利润分配权
C. 净资产分配权
D. 优先分配剩余财产权
【多选题】
以企业价值最大化作为理财目标的优点是___
A. 考虑了资金的时间价值和风险价值
B. 有利于社会资源的合理配置
C. 有利于克服管理上的短期行为
D. 反映了对资产保值增值的要求
【多选题】
所有者通过经营者损害债权人利益的常见形式是___
A. 未经债权人同意发行新债券
B. 未经债权人同意向银行借款
C. 投资于比债权人预计风险要高的新项目
D. 不尽力增加企业价值
【多选题】
协凋所有者与经营者之间矛盾的措施包括___。
A. 解聘
B. 接收
C. 股票选择权方式
D. 规定借款的用途
【多选题】
企业财务管理的内容包括___。
A. 资金筹资管理
B. 资金投放管理
C. 资金营运管理
D. 资金分配管理
【多选题】
以企业价值最大化作为财务管理的目标,其优点是___
A. 考虑资金的时间价值
B. 考虑风险因素的影响
C. 比较容易确定企业价值
D. 充分体现了对企业保值增值的要求
【多选题】
预测所要做的工作包括___
A. 明确预测目标
B. 搜集相关资料
C. 建立预测模型
D. 确定财务预测结果
【多选题】
影响股票价格的外部因素包括___
A. 经济环境因素
B. 法律环境因素
C. 社会环境因素
D. 金融环境因素
【多选题】
金融市场利率的决定因素有___
A. 纯利率
B. 通货膨胀补偿率
C. 风险报酬率
D. 借款利率
【多选题】
假定甲公司向乙公司赊销产品,并持有丙公司债券和丁公司的股票,且向戊公司支付公司债券利息。假定不考虑其他条件,从甲公司的角度看,下列各项中属于本企业与债务人之间财务关系___。
A. 甲公司与乙公司之间的关系
B. 甲公司与丁公司之间的关系
C. 甲公司与丙公司之间的关系
D. 甲公司与戊公司之间的关系
【多选题】
企业筹资可以满足___。
A. 生产经营的需要
B. 对外投资的需要
C. 调整资本结构的需要
D. 归还债务的需要
【多选题】
企业进行筹资需要遵循的基本原则包括___。
A. 规模扩张原则
B. 筹措及时原则
C. 来源合理原则
D. 方式经济原则
【多选题】
以下不属于普通股筹资缺点的有___。
A. 会降低公司的信誉
B. 容易分散控制权
C. 有固定到期日,需要定期偿还
D. 使公司失去隐私权
【多选题】
认股权证的特征包括___。
A. 在认股之前持有人对发行公司拥有债权
B. 它具有促销的作用
C. 可以提高每股收益
D. 用认股权证购买普通股票,其价格一般低于市价
【多选题】
关于吸收直接投资,下列说法正确的有___。
A. 投资者只能以现金和实物出资
B. 容易分散企业控制权
C. 有利于尽快形成生产能力
D. 资金成本较低
【多选题】
下列属于企业留存收益来源的有___。
A. 法定公积金
B. 任意公积金
C. 资本公积金
D. 未分配利润
【多选题】
补偿性余额的存在,对借款企业的影响有___。
A. 增加了应付利息
B. 减少了可用资金
C. 提高了筹资成本
D. 减少了应付利息
推荐试题
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用