刷题
导入试题
【单选题】
某企业期初存货200万元,期末存货300万元,产品营业收入为1500万元,营业成本为1000万元,则该存货周转率为 ___ 。
A. 3.3次
B. 4次
C. 5次
D. 6次
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
当企业的流动比率小于1时,赊购原材料将会___ 。
A. 增大流动比率
B. 降低流动比率
C. 降低营运资金
D. 增大营运资金
【单选题】
___不是评价企业长期偿债能力的指标。
A. 资产负债率
B. 股东权益比率
C. 权益乘数
D. 现金比率
【单选题】
下列各项中,会导致企业流动比率变化的经济业务是___。
A. 无形资产摊销
B. 无形资产计提减值准备
C. 以库存商品进行长期股权投资
D. 固定资产计提减值准备
【单选题】
在进行财务报表分析时,债权人更关注的信息是___。
A. 营运能力
B. 偿债能力
C. 发展能力
D. 盈利能力
【单选题】
以下业务中,不影响企业营业利润的是___。
A. 处置固定资产净收益
B. 支付广告费
C. 应收账款计提减值准备
D. 报废固定资产净损失
【单选题】
在下列各项税费中应在利润表中的“税金及附加”项目下反映的是___。
A. 印花税
B. 房产税
C. 土地使用税
D. 资源税
【单选题】
利润表是指反映企业___中经营成果的报表。
A. 特定日期
B. 年末
C. 一定会计期间
D. 季末
【单选题】
下列不属于利润表作用的是___。
A. 是评价考核企业经营业绩的依据
B. 反映企业一定会计期间的经营成果
C. 反映企业财务状况
D. 反映企业利润形成过程
【单选题】
利润表中的利润项目中不是完全根据表内项目计算的是___。
A. 营业利润
B. 利润总额
C. 净利润
D. 每股收益
【单选题】
下列不是利润表填列项目的是___。
A. 应交税费
B. 税金及附加
C. 投资收益
D. 所得税费用
【单选题】
在下列各项税费中不在利润表中的“税金及附加”项目下反映的是___。
A. 增值税
B. 城市维护建设税
C. 消费税
D. 资源税
【单选题】
我国利润表采用格式是___。
A. 单步式
B. 多步式
C. 账户式
D. 报告式
【单选题】
下列与计算营业利润无关的项目是___。
A. 营业收入
B. 营业外收入
C. 营业成本
D. 资产减值损失
【单选题】
下列与计算利润总额无关的是___。
A. 投资收益
B. 营业外收入
C. 管理费用
D. 所得税费用
【单选题】
关于利润表的作用,下列说法正确的是___。
A. 反映企业利润形成的过程
B. 反映企业资产构成情况
C. 报表使用者通过利润表,评价企业财务状况
D. 反映企业负债构成情况
【单选题】
下列指标中衡量企业获利能力大小的指标是___。
A. 流动资产周转率
B. 每股收益
C. 权益乘数
D. 产权比率
【单选题】
某股份公司上市流通的普通股每股股价为17元,每股收益为2元,该公司的市盈率为___。
A. 17元
B. 34元
C. 8.5元
D. 2元
【单选题】
企业经营成果结构分析的共同比基数是___。
A. 营业利润
B. 营业成本
C. 营业收入
D. 利润总额
【单选题】
以下___指标是评价上市公司获利能力的基本核心指标。
A. 每股收益
B. 市盈率
C. 每股市价
D. 净利润
【单选题】
在下列各项中,计算结果等于股利支付率的是___ 。
A. 每股收益除以每股股利
B. 每股股利除以每股收益
C. 每股股利除以每股市价
D. 每股收益除以每股市价
【单选题】
下列不属于反映盈利能力的指标是___ 。
A. 销售净利率
B. 应收账款周转率
C. 每股收益
D. 总资产报酬率
【单选题】
计算下列各项指标时,不需要采用平均数的有___。
A. 净资产收益率
B. 成本费用利润率
C. 存货周转率
D. 总资产报酬率
【单选题】
以下应在“吸收投资收到的现金”项目下反映的是___。
A. 发行股票
B. 取得股票股利
C. 长期借款
D. 取得现金股利
【单选题】
2018年营业收入为100万元,增值税销项税为17万元,2018年应收账款年初数为15万元,期末数为12万元。假定不考虑其他因素,根据上述资料,该企业2016年“销售商品收到的现金”项目的金额为___万元。
A. 114
B. 117
C. 120
D. 129
【单选题】
以下项目属于投资活动产生的现金流量的是___。
A. 取得投资收益收到的现金
B. 分配股利支付的现金
C. 吸收投资收到的现金
D. 经营租赁支付的现金
【单选题】
编制现金流量表的目的是为会计信息使用者提供企业一定会计期间内___流入和流出的信息。
A. 现金
B. 现金等价物
C. 现金及现金等价物
D. 净利润
【单选题】
以流量表中的营业收入为起点,调节与经营活动有关的项目的增减变动,然后计算出经营活动产生的现金流量的方法是___。
A. 间接法
B. 直接法
C. 计算法
D. 调整法
【单选题】
引起现金流量发生变动的经济业务是___。
A. 将现金存入银行
B. 用现金购买短期国债
C. 用现金偿还短期银行借款
D. 向银行存入现金
【单选题】
以下应在“吸收投资收到的现金”项目下反映的是___。
A. 发行股票
B. 取得股票股利
C. 长期借款
D. 取得现金股利
【单选题】
下列各项中,属于投资活动的有___。
A. 购买原材料
B. 支付生产经营人员工资
C. 缴纳税款
D. 购建固定资产
【单选题】
不引起现金流量净额变动的项目是___。
A. 用银行存款清偿10万元的债务
B. 从银行提取现金
C. 用固定资产抵偿债务
D. 用银行存款支付管理费用
【单选题】
某企业本期企业出售股票,该股票的投资成本2.5万元,出售收入3万元存入银行,则现金流量表中,收回投资收到的现金是___。
A. 3万元
B. 2.5万元
C. 5.5万元
D. 0.5万元
【单选题】
企业出售一项债券投资,本金为30万元,收回全部投资金额35万元,其中,5万元是债券利息,则现金流量表中收回投资收到的现金是___。
A. 65万
B. 5万
C. 30万
D. 35万
【单选题】
现金流量表的编制范围是___。
A. 涉及现金项目之间增减变动的经济业务
B. 涉及非现金项目之间增减变动的经济业务
C. 涉及现金项目与非现金项目之间增减变动的经济业务
D. 涉及所有的经济业务
【单选题】
甲企业本期发生下列业务:①企业本年实际支付工资及各种奖金 津贴共100万元,其中,在建工程人员工资20万元;②支付离退休人员工资40万元;③支付在岗职工困难补助10万元;④支付职工养老保险40万元。则现金流量表中,支付给职工以及为职工支付的现金为___。
A. 120万元
B. 140万元
C. 130万元
D. 150万元
【单选题】
下列不属于现金流量表编制方法的是___。
A. 工作底稿法
B. T型账户法
C. 现金类日记账法
D. 直接填列法
【单选题】
不会引起现金流量发生变化的事项是___。
A. 纳税
B. 计提折旧
C. 发工资
D. 支付电费
【单选题】
构建固定资产而发生的借款利息资本化部分,在现金流量表中的___项目中反映。
A. 构建固定资产无形资产和其他长期资产支付的现金
B. 取得借款收到的现金
C. 偿还债务支付的现金
D. 分配股利 利润或偿付利息所支付的现金
【单选题】
下列不属于经营活动的现金流量项目的是___。
A. 收到的退税
B. 支付劳务费付出的现金
C. 取得投资收益收到的现金
D. 经营性租赁收到的现金
【单选题】
捐赠现金计入现金流量表中___项目。
A. 支付的与投资活动有关的现金
B. 支付的与经营活动有关的现金
C. 支付的其他与筹资活动有关的现金
D. 偿还债务支付的现金
推荐试题
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用