刷题
导入试题
【单选题】
信托是随着商品经济的发展而出现的一种财产管理制度,其本质是_____。___
A. 吸收存款,融通资金
B. 受人之托,代人理财
C. 项目融资
D. 规避风险,发放贷款
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
基础货币等于_____。___
A. 通货+存款货币
B. 存款货币+存款准备金
C. 通货+存款准备金
D. 原始存款+派生存款
【单选题】
国际中长期资金流动机制中的核心问题是__________
A. 预期国民收入没有增长
B. 清偿风险问题
C. 债务利率主要以固定利率为主
D. 心理预期影响
【单选题】
按贷款对象,消费贷款可分为买方信贷和卖方信贷,后者是发放给_____的贷款。___
A. 金融机构
B. 消费者
C. 销售企业
D. 社会公众
【单选题】
在项目融资的所有协议中,核心的协议是_____。___
A. 信用担保协议
B. 特许权协议
C. 完工协议
D. 融资协议
【单选题】
在资产证券化中,发行人从银行借入信用增级所需的资金,并将其投资于高信用等级的短期商业票据。这种信用增级措施是_____。___
A. 设计银行信用证
B. 建立超额担保
C. 建立储备基金账户
D. 设置现金担保账户
【单选题】
在资产证券化中,将原始权益人的资产过户给特殊目的公司(SPV),必须以真实销售的方式进行。这里的真实销售是指_____。___
A. SPV破产时该资产不列入清算范围
B. 原始权益人破产时该资产不列入清算范围
C. SPV获得证券发行收入
D. 原始权益人破产时该资产列入清算范围
【单选题】
并非所有资产都可以证券化,以下属于可以证券化资产特征的是_____。___
A. 具有标准化的合同条款
B. 付款间隔期限长
C. 资产组合中资产数量少
D. 本金到期一次偿还
【单选题】
商业银行存放在中央银行的一般性存款的作用之一是用来满足结算的需求,另一作用是_____。___
A. 扩大贷款规模
B. 调剂库存现金余额
C. 增加资本金
D. 提高收益
【单选题】
在金融租赁活动中,一种适合于资产流动性差的企业进行紧急融资的方式是_____。___
A. 杠杆租赁
B. 直接租赁
C. 回租租赁
D. 转租赁
【单选题】
银行系统吸收的、能增加其存款准备金的存款,称为_____。___
A. 派生存款
B. 原始存款
C. 现金存款
D. 支票存款
【单选题】
在消费或使用上,公共物品的特点是___________
A. 竞争性和排他性
B. 非竞争性和排他性
C. 非竞争性和非排他性
D. 竞争性和非排他性     
【单选题】
担保贷款是属于贷款________     ___
A. 风险抑制       
B. 风险转移    
C. 风险的内部分散      
D. 风险的外部分散 
【单选题】
美国经济学家科斯认为企业的本质或者显著特征是作为________的替代物___
A. 价格机制或竞争机制
B. 价格机制或供求机制
C. 市场机制或供求机制
D. 市场机制或价格机制
【单选题】
产生逆向选择和道德风险的原因是___________
A. 垄断
B. 外部性
C. 市场失灵
D. 信息不对称  
【单选题】
利用市场不完全条件下有内在联系的金融工具之间的价格背离来获取利润的金融技术,称之为_____。___
A. 金融期货
B. 金融期权
C. 掉期
D. 套利
【单选题】
法定存款准备金应该等于_____。___
A. 存款准备金率×存款总额
B. 存款准备金率×法定存款总额
C. 法定存款准备金率×存款总额
D. 法定存款准备金率×原始存款总额
【单选题】
法定存款准备金率×原始存款总额币乘数等于_____。___
A. 货币需求量×基础货币
B. 货币供给量×基础货币
C. 货币需求量÷基础货币
D. 货币供给量÷基础货币
【单选题】
交易双方在合约中规定在未来某一确定时间以约定价格购买或出售一定数量的某种资产的业务品种,称之为_____。___
A. 远期
B. 互换
C. 套期
D. 套利
【单选题】
下列属于商业银行资产业务创新的是_____。___
A. 可转让支付命令帐,
B. 个人退休金帐户
C. 周转性贷款承诺
D. 市场互助基金
【单选题】
商业银行经营的核心目标是_____。___
A. 保证安全
B. 持续发展
C. 追求盈利
D. 稳健经营
【单选题】
银行营销要通过交换发挥作用,即金融产品必须存在_____的可能性。___
A. 价格交换
B. 货币交换
C. 商品交换
D. 价值交换
【单选题】
在商业银行资产负债管理中,规模对称原理的动态平衡的基础是_____。___
A. 合理经济体制
B. 合理经济结构
C. 合理经济规模
D. 合理经济增长
【单选题】
根据商业银行资产负债管理的对称原理,如果平均流动率大于l,表示_____。___
A. 资产运用过度
B. 资产运用不足
C. 负债经营过度
D. 负债经营不足
【单选题】
识别和认定银行各类资产风险含量的基本标准是资产风险的_____。___
A. 基本权数
B. 基本程度
C. 基本数量
D. 基本性质
【单选题】
反映商业银行一定时期内资产、负债和所有者权益各项目增减变化的报表是_____。___
A. 资金平衡表
B. 资产负债表
C. 损益表
D. 财务状况变动表
【单选题】
资本逃避一般出现_______阶段。___
A. 经常账户下的货币有条件兑换
B. 经常账户下的货币可自由兑换
C. 资本金融账户下的货币有条件兑换
D. 资本金融账户下的货币可自由兑换
【单选题】
费里德曼的货币需求函数强调的是_____。___
A. 恒常收入的影响
B. 资本的影响
C. 利率的主导作用
D. 汇率的主导作用
【单选题】
凯恩斯主义认为,货币政策的传导变量是_____。___
A. 基础货币
B. 超额储备
C. 利率
D. 货币供应量
【单选题】
影响一国汇率制度选择的因素有多方面,下列说法不正确的是__________
A. 本国经济的结构特征
B. 地区性经济合作情况
C. 国际收支的可维持性
D. 国际国内经济条件的制约
【单选题】
在项目融资中一般需要_____。___
A. 抵押担保
B. 质押担保
C. 保证贷款
D. 严谨的担保体系
【单选题】
在多数情况下,项目融资中的借款单位是_____。___
A. 项目建设工程公司
B. 项目公司
C. 出口信贷机构
D. 项目管理公司
【单选题】
TOT融资模式转让的是经营期内项目的_____。___
A. 股权
B. 所有权
C. 产权
D. 经营权
【单选题】
BOT融资模式转让的是经营期内项目的_____。___
A. 建设阶段
B. 运营阶段
C. 持有阶段
D. 转让阶段
【单选题】
下列关于市场主导的金融体系的说法,不正确的是_____。___
A. 直接融资比重大
B. 金融机构种类少
C. 企业融资更多依赖于包括风险资本在内的外部融资
D. 企业融资更多通过金融市场进行
【单选题】
根据《中国人民银行法》的规定,中国人民银行可以_____。___
A. 经营国家黄金储备
B. 确定市场利率
C. 代理工商信贷业务
D. 代理政策性银行业务
【单选题】
在心理预期带来的对汇率制度的投机性冲击中,投机冲击没有引发货币危机意味着__________
A. 投机者的预期收益大于其成本
B. 投机引发了羊群效应
C. 政府维持汇率制度的态度十分坚决
D. 政府维持汇率制度的收益小于其成本
【单选题】
经常账户中,最重要的项目是__________
A. 贸易收支
B. 劳务收支
C. 投资收益
D. 单方面转移
【单选题】
美元等同于黄金,实行可调整的同定汇率制度,是_____的特征。___
A. 布雷顿森林体系
B. 国际金本位制
C. 牙买加体系
D. 国际金汇兑本位制
【单选题】
下列属于银行风险产生的主观因素是_____。___
A. 同业竞争
B. 利率变化
C. 宏观金融政策变动
D. 风险控制环节出现问题
【单选题】
在我国对银行业金融机构实行并表监督管理是_____的职责。___
A. 中国人民银行
B. 证监会
C. 保监会
D. 银监会
推荐试题
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用