刷题
导入试题
【单选题】
在应用MA指标时,最常见的是下列哪项法则___。
A. 艾略特法则
B. 逆时钟法则
C. 葛兰碧法则
D. 葛兰威尔法则
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【多选题】
证券是指___。
A. 各类记载并代表一定权利的法律凭证
B. 各类证明持有者权利和义务的凭证
C. 用以证明或设定权利而做成的书面凭证
D. 用以证明持有人或第三者有权取得该证券拥有的特定权益的凭证
【多选题】
机构投资者在资金来源、投资目的等方面虽然不相同,但一般具有的特点有___。
A. 投资资金来源分散而量小
B. 注重投资的安全性
C. 收集和分析信息的能力强
D. 对市场影响力小
【多选题】
商品证券是证明持有人有商品___的凭证。
A. 所有权
B. 使用权
C. 收益权
D. 债权
【多选题】
下列关于证券的说法中,正确的有___。
A. 记载并代表一定权利的法律凭证
B. 用于证明持有人有权依其所持凭证记载的内容而取得应有的权益
C. 用于证明或设定权利的书面证明
D. 可以采用纸面形式或其他形式
【多选题】
我国《上市公司证券发行管理办法》规定,上市公司增资的方式有___。
A. 向原股东配售股份
B. 向不特定对象公开募集股份
C. 非公开发行股票
D. 发行可转换公司债券
【多选题】
下列既可以是证券发行人,也可以是证券投资者的是___。
A. 政府机构
B. 保险公司
C. 商业银行
D. 个人
【多选题】
主要有___。
A. 公司名称
B. 公司成立的日期
C. 股票种类
D. 票面金额
【多选题】
证券市场的结构可以有许多种,但较为重要的结构有___。
A. 层次结构
B. 品种结构
C. 投资收益结构
D. 交易市场所结构
【多选题】
在我国,依法设立的可经营证券业务的证券公司的主要业务有___。
A. 代理证券发行
B. 代理证券买卖
C. 自营性买卖
D. 其他咨询业务
【多选题】
证券投资基金具有___特点。
A. 定向投资
B. 集合投资
C. 专业理财
D. 分散风险
【多选题】
股票发行的定价方式,包括___。
A. 协商定价方式
B. 一般询价方式
C. 累计投标询价方式
D. 上网竞价方式
【多选题】
下列对证券投资基金认识正确的是___。
A. 通过公开发售基金份额募集资金
B. 由基金托管人托管,由基金管理人管理和运用资金
C. 在台湾称为“证券投资信托基金”
D. 以资产组合方式进行证券投资活动
【多选题】
按照交易场所划分,我国证券账户可划分为___。
A. 上海证券账户
B. 深圳证券账户
C. 人民币普通股票账户D.人民币特种股票账户
【多选题】
上海证券交易所目前公布的指数包括___。
A. 上证综合指数
B. 上证A股指数
C. 上证基金指数
D. 中小企业板指数
【多选题】
关于证券发行与证券交易的关系以下说法是正确的有___。
A. 证券交易有利于证券发行的顺利进行
B. 证券交易决定了证券发行的规模
C. 证券发行为证券交易提供了对象
D. 证券发行与证券交易相互促进
【多选题】
须满足的条件包括 ___。
A. 最近年度净资本不低于人民币5亿元
B. 最近年度净资产不低于人民币8亿元
C. 同时具有承销业务、外资股业务和网上证券委托业务资格
D. 具有15家以上的营业部且布局合理
【多选题】
证券交易原则是反映证券交易宗旨的一般法则。在我国证券交易的原则有___。
A. 公开
B. 充分
C. 公平
D. 公正
【多选题】
证券经纪商在代理业务中禁止从事的行为有___。
A. 挪用客户交易结算资金
B. 为客户提供咨询服务
C. 向客户进行风险教育加强防范证券投资风险的意识
D. 侵占客户国债兑付金
【多选题】
投资者作为证券经纪业务中的委托人必须履行的义务包括___。
A. 如实填写开户申请书和委托单并接受经纪商的审核
B. 按规定缴存交易结算资金
C. 正确选择委托买卖价格保证委托能够成交
D. 接受交易结果并履行交割清算义务
【多选题】
影响股票价格的宏观经济与政策因素包括___。
A. 货币政策
B. 市场利率
C. 通货膨胀
D. 经济周期循环
【多选题】
财政政策是政府的重要宏观经济政策,其对股票价格的影响表现在___。
A. 通过扩大财政赤字、发行国债筹集资金,增加财政支出,刺激经济发展
B. 通过调节税率影响企业利润和股息
C. 干预资本市场各类交易适用的税率
D. 国债发行量会改变证券市场的证券供应和资金需求,从而间接影响股票价格
【多选题】
涉及黄金分割线的数字中,股价极易在___数字产生的黄金分割线处产生支撑和压力。
A. 0.618
B. 1.618C.2.618 D.3.236
【多选题】
关于趋势,下列论述正确的是___。
A. 下降行情里,不断出现的新低价会使投资者心情悲观,人心涣散
B. 简单地说,趋势就是股票价格市场运动的方向
C. 一般说来,市场变动不是朝一个方向直来直去,中间肯定要有曲折
D. 上升的行情里,虽然也时有下降,但不影响上升的大方向
【多选题】
技术分析的理论基础是基于___市场假设。
A. 价格围绕价值波动
B. 价格沿趋势移动
C. 市场行为涵盖一切信息
D. 市场总是理智的
【多选题】
在使用道氏理论时,下述做法或说法正确的有___ 。
A. 使用道氏理论对大趋势进行判断有较大的作用
B. 道氏理论对每日波动无能为力
C. 道氏理论对次要趋势的判断也作用不大
D. 道氏理论的不足在于它的可操作性较差
【多选题】
一条K线上完整地记录了___。
A. 开盘价
B. 收盘价
C. 最高价
D. 最低价
【多选题】
一条K线上完整地记录了___。
A. 开盘价
B. 收盘价
C. 最高价
D. 最低价
【多选题】
以下属于反转突破形态的有___。
A. 楔形
B. 头肩形
C. 旗形
D. 多重顶(底)形
【多选题】
M头形成以后,可以做如下判断___。
A. 头部形成,应当做空
B. 可能形成矩形整理形态
C. 如果向下突破颈线,应当做空
D. 反转形态,股价下行
【多选题】
支撑线和压力线被突破的确认原则主要包括___。
A. 反方向原则,即要求突破是反方向的
B. 成交量原则,即要求突破伴随着大的成交量
C. 百分比原则,即要求突破到一定的百分比数
D. 时间原则,即要求突破后至少维持若干日
【多选题】
下列属于趋势型指标的有___。
A. MA
B. MACD
C. 威廉指标
D. KDJ
【多选题】
下列属于超买超卖型的是___。
A. BIAS
B. MACD
C. 威廉指标
D. KDJ
【多选题】
下列属于超买超卖型的是___。
A. BIAS
B. MACD
C. 威廉指标
D. KDJ
【多选题】
下列属于能量型指标的是___。
A. BIAS
B. PSY
C. 人气指标AR
D. 买卖意愿指标BR
【多选题】
中小企业板上市公司出现___情形之一时,深圳证券交易所对其股票交易实行退市风险警示。
A. 连续20个交易日公司股票每日收盘价均低于每股面值
B. 最近一个会计年度的审计结果显示公司或有负债超过1亿元
C. 最近一个会计年度被注册会计师出具否定意见的审计报告
D. 最近一个会计年度的审计结果显示其股东权益为负数
【多选题】
对于开市期间停牌的申报问题我国上海证券交易所和深圳证券交易所规定___。
A. 复牌时对申报实行连续竞价
B. 停牌期间可以申报撤销
C. 停牌期间可以进行申报
D. 停牌前的申报参加当日该证券复牌后的交易
【多选题】
根据《证券法》以下对证券交易所的描述正确的是___。
A. 证券交易所的设立和解散由国务院证券监督管理机构决定
B. 证券交易所是为证券集中交易提供场所和设施组织和监督证券交易实行自律管理的法人
C. 证券交易所是有组织的市场又称“场内交易市场”
D. 证券交易所不持有证券也不进行证券的买卖但能决定证券交易的价格
【多选题】
下列有关整数委托和零数委托的表述中正确的有___。
A. 零数委托是指数量不足证券交易所规定的一个交易单位的委托
B. 零数委托是指数量不足证券交易所规定的一个报价计价单位的委托
C. 整数委托是指数量为一个交易单位或交易单位的整数倍的委托
D. 整数委托是指数量为一个报价计价单位或报价计价单位的整数倍的委托
【判断题】
证券交易市场又称“二级市场”或“次级市场”,是已发行和新发行的证券通过买卖交易实现流通转让的市场。
A. 对
B. 错
【判断题】
证券市场是财产权利直接交换的场所。
A. 对
B. 错
推荐试题
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用