刷题
导入试题
【判断题】
非居民个人取得工资薪金、劳务报酬、稿酬和特许权使用费所得,无论是否有扣缴义务人,由纳税人自行申报,不办理汇算清缴
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
纳税人有中国公民身份号码的,以中国公民身份号码为纳税人识别号;纳税人没有中国公民身份号码的,以护照或者其他证件号码为纳税人识别号
A. 对
B. 错
【判断题】
居民个人向扣缴义务人提供专项附加扣除信息的,扣缴义务人按月预扣预缴税款时应当按照规定予以扣除,不得拒绝
A. 对
B. 错
【判断题】
范某准备于2019年3月移居新加坡并注销中国户籍,他应当在注销中国户籍后办理税款清算
A. 对
B. 错
【判断题】
对居民个人控制的设立在实际税负明显偏低的国家(地区)的企业,无合理经营需要,对应当归属于居民个人的利润不作分配或者减少分配的,税务机关有权按照合理方法进行纳税调整
A. 对
B. 错
【判断题】
扣缴义务人应当按照国家规定办理全员全额扣缴申报,并向纳税人提供其个人所得税已扣缴税款等信息
A. 对
B. 错
【判断题】
小明是合伙企业的合伙人,其经营所得个人所得税按年计算,按季预缴,办理汇算清缴时间是次年的五月三十一日前
A. 对
B. 错
【判断题】
李某2018年10月份取得工资薪金收入4800元,李某该月工资薪金应纳的个人所得税额为零
A. 对
B. 错
【判断题】
个人所得税专项扣除包括居民个人按照国家规定的范围和标准缴纳的基本养老保险、基本医疗保险、失业保险、工伤保险、生育保险等社会保险费和住房公积金等
A. 对
B. 错
【判断题】
2018年7月,某公司在户外宣传活动中,随机向行人赠送礼品,对行人取得的礼品,该公司不需扣缴个人所得税
A. 对
B. 错
【判断题】
王先生开的制衣厂与员工签署放弃参加社会保险的承诺书,并对员工给予一定的经济补偿,这种做法符合法律的规定
A. 对
B. 错
【判断题】
国家设立的科研机构和高校根据《中华人民共和国促进科技成果转化法》规定,从职务科技成果转化收入中给予科技人员的现金奖励,可减按10%的税率按“财产转让所得”,依法缴纳个人所得税
A. 对
B. 错
【判断题】
张某2018年10月申报9月份实际取得的工资薪金个人所得税时适用5000元的减除费用标准
A. 对
B. 错
【判断题】
某作家将自己的小说手稿原件公开拍卖取得的所得,应按“稿酬所得”项目征税
A. 对
B. 错
【判断题】
张女士在甲市某企业任职,参加了甲市职工社会医疗保险。同时,她还在户口所在地的乙市参加城乡居民医疗保险
A. 对
B. 错
【判断题】
王某个人购买商业健康保险未获得税优识别码,其支出金额不得税前扣除
A. 对
B. 错
【判断题】
2018年10月1日后,个人所得税工资薪金费用扣除标准提高至5000元/月。对于月度工资薪金扣除专项扣除后不够5000元的纳税人,扣缴义务人可以不进行全员全额明细申报
A. 对
B. 错
【判断题】
张某个人直接对某学校的捐赠,准予在个人所得税税前全额扣除
A. 对
B. 错
【判断题】
小张2018年12月取得当年度绩效工资,可按全年一次性奖金的计税方法计算缴纳个人所得税
A. 对
B. 错
【判断题】
依照2018年8月新修订的个人所得税法,税务机关依法作出反避税纳税调整,需要补征税款的,应当补征税款,并依法加收滞纳金
A. 对
B. 错
【判断题】
职工因请病假而被单位扣掉的部分工资在计算个人所得税时应并入工资中计算个人所得税
A. 对
B. 错
【判断题】
张某购买体育彩票一次中奖收入7000元,暂免征收个人所得税
A. 对
B. 错
【判断题】
黄某提前退休取得的一次性补贴收入可以免征个人所得税
A. 对
B. 错
【判断题】
依照2018年8月新修订的个人所得税法,个人所得税以所得人为纳税人,以支付所得的单位或者个人为扣缴义务人
A. 对
B. 错
【判断题】
个人因住房拆迁而取得标准内的补偿费免于征收个人所得税
A. 对
B. 错
【判断题】
个人转让上市公司股票取得的所得,免征个人所得税
A. 对
B. 错
【判断题】
英国剑桥大学教授詹姆斯先生受中国某大学的邀请于2019年3——6月在授课(该年度的其他时间,詹姆斯先生没有在中国停留),该大学支付劳务费用2万英镑。那么,詹姆斯先生的该项所得向中国缴纳个人所得税
A. 对
B. 错
【判断题】
非上市公司股权奖励的计税价格参照获得股权时的公平市场价格,依次按照净资产法、类比法和其他合理方法确定
A. 对
B. 错
【判断题】
居民个人的综合所得,以每一纳税年度的收入额减除费用六万元以及专项扣除、专项附加扣除和依法确定的其他扣除后的余额,为应纳税所得额
A. 对
B. 错
【判断题】
残疾、孤老人员和烈属的所得经批准,可以减征个人所得税
A. 对
B. 错
【判断题】
个人出租土地使用权取得的收入,应当按照“特许权使用费所得”项目征收个人所得税
A. 对
B. 错
【判断题】
个人发生非货币性资产投资行为应按照“财产转让所得”税目依法缴纳个人所得税
A. 对
B. 错
【判断题】
从2019年1月1日起,在中国境内无住所又不居住,或者无住所而在连续12个月之内在中国境内居住累计不满一百八十三天的个人,为居民个人
A. 对
B. 错
【判断题】
对于地市级政府颁发的科学、教育、技术、文化、卫生、体育、环保等方面的奖金,免征个人所得税
A. 对
B. 错
【判断题】
张某于2019年出租房产取得租金10万元,但支付人未扣缴税款,张某应当在取得所得的次年的三月一日至六月三十日前,缴纳税款
A. 对
B. 错
【判断题】
总承包企业派驻跨省异地工程项目的管理人员在异地工作期间的工资、薪金所得个人所得税,由总承包企业、分承包企业依法代扣代缴并向主管税务机关申报缴纳
A. 对
B. 错
【判断题】
国内某大学教授拥有持有期不足1年的某上市公司股票取得的股息,免予征收个人所得税
A. 对
B. 错
【判断题】
某高校利用其教师李某主持的科研项目成果与企业开展合作获得良好经济效益,该高校在2018年8月向李某发放5万元现金奖励,李某取得的该笔现金奖励免予缴纳个人所得税
A. 对
B. 错
【判断题】
房地产开发企业与商铺购买者个人签订协议,以优惠价格出售其开发的商铺给购买者个人,购买者个人则在一定期限内将商铺无偿提供给房地产开发企业对外出租使用。购买者个人少支出的购房价款应按照“偶然所得”项目缴纳个人所得税
A. 对
B. 错
【判断题】
《中华人民共和国个人所得税实施条例》由全国人民代表大会制定
A. 对
B. 错
【判断题】
股份制企业为股东购买车辆并将车辆所有权登记到股东个人名下,该股东应就其按“工资、薪金所得”项目征税
A. 对
B. 错
推荐试题
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用