【判断题】
国家设立的科研机构和高校根据《中华人民共和国促进科技成果转化法》规定,从职务科技成果转化收入中给予科技人员的现金奖励,可减按10%的税率按“财产转让所得”,依法缴纳个人所得税
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
张某2018年10月申报9月份实际取得的工资薪金个人所得税时适用5000元的减除费用标准
【判断题】
某作家将自己的小说手稿原件公开拍卖取得的所得,应按“稿酬所得”项目征税
【判断题】
张女士在甲市某企业任职,参加了甲市职工社会医疗保险。同时,她还在户口所在地的乙市参加城乡居民医疗保险
【判断题】
王某个人购买商业健康保险未获得税优识别码,其支出金额不得税前扣除
【判断题】
2018年10月1日后,个人所得税工资薪金费用扣除标准提高至5000元/月。对于月度工资薪金扣除专项扣除后不够5000元的纳税人,扣缴义务人可以不进行全员全额明细申报
【判断题】
张某个人直接对某学校的捐赠,准予在个人所得税税前全额扣除
【判断题】
小张2018年12月取得当年度绩效工资,可按全年一次性奖金的计税方法计算缴纳个人所得税
【判断题】
依照2018年8月新修订的个人所得税法,税务机关依法作出反避税纳税调整,需要补征税款的,应当补征税款,并依法加收滞纳金
【判断题】
职工因请病假而被单位扣掉的部分工资在计算个人所得税时应并入工资中计算个人所得税
【判断题】
张某购买体育彩票一次中奖收入7000元,暂免征收个人所得税
【判断题】
黄某提前退休取得的一次性补贴收入可以免征个人所得税
【判断题】
依照2018年8月新修订的个人所得税法,个人所得税以所得人为纳税人,以支付所得的单位或者个人为扣缴义务人
【判断题】
个人因住房拆迁而取得标准内的补偿费免于征收个人所得税
【判断题】
个人转让上市公司股票取得的所得,免征个人所得税
【判断题】
英国剑桥大学教授詹姆斯先生受中国某大学的邀请于2019年3——6月在授课(该年度的其他时间,詹姆斯先生没有在中国停留),该大学支付劳务费用2万英镑。那么,詹姆斯先生的该项所得向中国缴纳个人所得税
【判断题】
非上市公司股权奖励的计税价格参照获得股权时的公平市场价格,依次按照净资产法、类比法和其他合理方法确定
【判断题】
居民个人的综合所得,以每一纳税年度的收入额减除费用六万元以及专项扣除、专项附加扣除和依法确定的其他扣除后的余额,为应纳税所得额
【判断题】
残疾、孤老人员和烈属的所得经批准,可以减征个人所得税
【判断题】
个人出租土地使用权取得的收入,应当按照“特许权使用费所得”项目征收个人所得税
【判断题】
个人发生非货币性资产投资行为应按照“财产转让所得”税目依法缴纳个人所得税
【判断题】
从2019年1月1日起,在中国境内无住所又不居住,或者无住所而在连续12个月之内在中国境内居住累计不满一百八十三天的个人,为居民个人
【判断题】
对于地市级政府颁发的科学、教育、技术、文化、卫生、体育、环保等方面的奖金,免征个人所得税
【判断题】
张某于2019年出租房产取得租金10万元,但支付人未扣缴税款,张某应当在取得所得的次年的三月一日至六月三十日前,缴纳税款
【判断题】
总承包企业派驻跨省异地工程项目的管理人员在异地工作期间的工资、薪金所得个人所得税,由总承包企业、分承包企业依法代扣代缴并向主管税务机关申报缴纳
【判断题】
国内某大学教授拥有持有期不足1年的某上市公司股票取得的股息,免予征收个人所得税
【判断题】
某高校利用其教师李某主持的科研项目成果与企业开展合作获得良好经济效益,该高校在2018年8月向李某发放5万元现金奖励,李某取得的该笔现金奖励免予缴纳个人所得税
【判断题】
房地产开发企业与商铺购买者个人签订协议,以优惠价格出售其开发的商铺给购买者个人,购买者个人则在一定期限内将商铺无偿提供给房地产开发企业对外出租使用。购买者个人少支出的购房价款应按照“偶然所得”项目缴纳个人所得税
【判断题】
《中华人民共和国个人所得税实施条例》由全国人民代表大会制定
【判断题】
股份制企业为股东购买车辆并将车辆所有权登记到股东个人名下,该股东应就其按“工资、薪金所得”项目征税
【判断题】
个人兼职取得的收入,应当按照“工资、薪金所得”项目征收个人所得税
【判断题】
个人从公开发行和转让市场取得的上市公司股票,持股期限在1个月以上至1年(含1年)的,暂减按10%税率计算个人所得税
【判断题】
英国人詹姆斯在中国境内无住所,假定2019年度在中国境内居住累计80天,则英国人詹姆斯为非居民个人
【判断题】
假定周华(居民个人)2019年在我国境内甲企业取得工资薪金5万元,从境外乙企业取得特许权使用费人民币10万元。其中仅工资薪金5万元需要按规定缴纳个人所得税
【判断题】
自2019年1月1日起,公安、人民银行、金融监督管理等相关部门应当协助税务机关确认纳税人的身份、金融账户信息
【判断题】
假定2019年8月刘某在转让商铺过程中,因实施不具有合理商业目的的安排而获取不当税收利益。对于这种情形,税务机关有权按照合理方法进行纳税调整
【判断题】
假定甲公司2019年1月扣缴个人所得税100万元,按规定应当取得2万元扣缴手续费
【判断题】
自2019年1月1日起,纳税人没有中国公民身份号码的,由纳税人自行确定其纳税人识别号
【判断题】
一名在中国境内无住所的美国公民于2018年10月10日开始到中国进行商务考察,假设离境时间为2019年6月10日,则该美国公民应就此期间从境外取得的股息、红利所得在中国缴纳个人所得税
【判断题】
王先生与他人共同注册了一家合伙企业,2018年5月,王先生用企业资金为本人购买了一辆汽车,在计算个人所得税时应视为企业对个人投资者的红利分配,依照“利息、股息、红利所得”项目计税
【判断题】
自2018年10月1日起,我国个人所得税基本减除费用标准提升至5000元/月,同时外籍人员还可以再扣除1300元/月的附加减除费用
推荐试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management