刷题
导入试题
【单选题】
按照文明规范服务监测制度,按___通过现场巡检、调阅录像等方式自查,按( )评价,按年总结,及时整改,记录完整。
A. 年,月
B. 月,季
C. 年,季
D. 月,年
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
对客户意见簿上的客户意见、建议___小时内响应,并对留有电话信息的客户在规定时间内予以回复、回访。
A. 12
B. 18
C. 24
D. 48
【单选题】
客户意见簿真实完整记录客户意见、建议及回复信息,页码连续、内容完整、格式规范;按___归档保管,一年以内的意见簿可随时调阅。
A. 月
B. 年
C. 季
D. 网点
【单选题】
下列哪项不是大堂经理平时日常的工作内容___
A. 快速妥善地处理客户提出的批评性意见,避免客户与柜员发生直接争执,化解矛盾
B. 减少客户投诉,对客户意见和有效投诉的处理结果在规定时间内及时回复
C. 协助收集和整理客户意见与建议,及时向甲方指定人员反馈
D. 每个工作日对所在网点进行一次现场巡检,并做好《大堂经理工作日志》工作
【单选题】
银行从业人员服务语言要规范、___简洁、语句清晰( )。( )
A. 准确,音量适中
B. 标准、音量稍低
C. 正确,音量适中
D. 准确,音量稍高
【单选题】
标准化服务规程规定,柜员在上班时间不得有如下举止___
A. 更换打印纸
B. 理财营销
C. 与同事耳语议论客户
D. 与客户谈话
【单选题】
以下哪些不属于良好的沟通习惯? ___
A. 在与客户沟通时,非常严肃,从不笑
B. 注意客户的弦外之音
C. 控制自己的谈话时间
D. 适当做笔记
【单选题】
服务类工单指客户对银行产品、服务质量、硬件设施不满,服务类工单应于___个工作日内作出处理并完成回访,当天()时以后接收的工单,系统处理日期延长一天,双休及法定节假日顺延。( )
A. 1,18
B. 2,17
C. 3,17
D. 5,18
【单选题】
建议表扬类工单应于___个工作日内做出处理并完成回访,并对客户满意的产品或体验服务做好记录,回复内容包括建议内容是否采纳,对被表扬人员是否有实质性奖励等要素。
A. 1
B. 2
C. 3
D. 5
【单选题】
疑难类工单应于___个工作日内作出处理并完成回访
A. 1
B. 2
C. 3
D. 5
【单选题】
客户表达购买意向时,客户(理财)经理按规定对客户进行必要、客观、真实的___ 、风险认知和风险承受能力等相关内容测试,并得到客户本人( ) 确认,确保将合适的产品和服务提供给合适的客户。( )
A. 风险爱好,书面
B. 风险偏好,口头
C. 风险偏好,口头
D. 风险偏好,书面
【单选题】
坚持___的服务原则,在客户办理业务过程中,始终关注客户业务办理的情况和进程。
A. 首问负责制
B. 先外后内
C. 先内后外
D. 先急后缓
【单选题】
在处理投诉中,关于补偿性的主动服务,说法错误的是___
A. 为客户提供费率的优惠、赠送礼品或与客户建立个人交往等
B. 在情感上给客户的一种弥补和安抚
C. 只用于银行对客户的伤害或给客户造成的损失是无法改正或补偿的时候
D. 可以代替整个预期的服务
【单选题】
有下列哪种行为,应给予开除处分___
A. 设置账外账
B. 现金出纳业务没有做到日清日结
C. 未按规定处理长短款
D. 违反规定擅自增加、取消金融服务收费项目
【单选题】
储蓄业务人员之间进行交接时未作交接登记,或违反规定调剂现金、储蓄重要单证的,给予警告至记过处分;后果或情节严重的,给予___处分
A. 开除
B. 记大过至开除
C. 降级至开除
D. 降级至撤职
【单选题】
本规定所称从重处理,是指在规定的处理幅度以内按___处理
A. 上追两级
B. 上追一级
C. 上限
D. 下限
【单选题】
员工违反廉洁从业规定,收受各种名义的回扣、礼金、礼品、有价证券、手续费的,应当给予___处分,后果或情节严重的,给予开除处分
A. 通报批评至警告
B. 警告至记过
C. 记过至记大过
D. 记过至撤职
【单选题】
受到记过处分的,从处分决定下达次月起按当年绩效考核工资标准扣发___
A. 1个月的绩效工资
B. 2个月的绩效工资
C. 3个月的绩效工资
D. 6个月的绩效工资
【单选题】
违反ATM管理规定,违反ATM密码、钥匙管理使用规定的,给予有关责任人员___处分;后果或情节严重的,给予记大过至开除处分
A. 通报批评至警告
B. 警告至记大过
C. 警告至记过
D. 记过至撤职
【单选题】
违反现金收付、整点、票币兑换及现金调拨规定进行业务操作的,给予有关责任人员___处分;后果或情节严重的,给予记大过至开除处分。
A. 罚款
B. 通报批评
C. 警告至记过
D. 诫勉谈话
【单选题】
处分期间发生新的违规行为,加重处理,处分期为___
A. 原处分期尚未执行的期限与新处分期限之和
B. 原处分期尚未执行的期限
C. 新处分期限
D. 原处分期尚未执行的期限或新处分期限
【单选题】
受到开除处分或辞退的员工,同时___,所在单位按规定办理档案和社会保险关系的转移手续。
A. 留用察看
B. 留用察看1年
C. 留用察看2年
D. 解除劳动合同
【单选题】
“重大责任事故”其中包括:一人死亡或三人重伤,或造成___损失责任事故的
A. 20万元以上(含)
B. 30万元以上(含)
C. 50万元以上(含)
D. 100万元以上(含)
【单选题】
扣减绩效收入,每人每次原则上不得超过相当于本人___。赔偿经济损失金额不得超出实际风险或损失金额。责任人全额赔偿后又挽回损失的,超出实际损失部分退还有关赔偿责任人。
A. 3个月的绩效工资
B. 6个月的绩效工资
C. 一年的绩效工资
D. 二年的绩效工资
【单选题】
违反反洗钱管理规定,对大额交易应报告未报告或对可疑交易未尽职调查的,给予有关责任人员___处分;后果或情节严重的,给予记大过至开除处分。
A. 警告至记过
B. 记过至撤职
C. 记大过至开除
D. 警告至记大过
【单选题】
未按规定查库或查库流于形式的,后果或情节严重的,给予___处分
A. 记过
B. 记大过
C. 记大过至开除
D. 开除
【单选题】
无正当理由拒不服从组织分配、调动或岗位交流决定的,给予___处分;情节或后果严重的,给予降级至撤职处分。
A. 记过
B. 记大过
C. 警告至记大过
D. 记大过至开除
【单选题】
不履行或不正确履行职责,致使农信社受到司法机关或银行监管、审计、税务等行政机关处罚的,给予有关责任人员___处分。
A. 记过
B. 记过至撤职
C. 记大过至开除
D. 警告至记大过
【单选题】
商业银行应当根据募集方式的不同,将理财产品分为___理财产品和( )理财产品。( )
A. 个人、对公
B. 个人、定制
C. 公募、私募
D. 公开、非公开
【单选题】
公募理财产品是指商业银行面向___公开发行的理财产品,公开发行认定的标准包括向( )募集资金、或向特定对象募集资金累计超过( )人,以及法律、行政法规规定的其他情形。( )
A. 不特定社会公众、不特定对象、200
B. 不特定社会公众、不特定对象、100
C. 不特定社会公众、不特定对象、150
D. 不特定社会公众、不特定对象、300
【单选题】
目前联社发行的预期收益型一般个人理财产品属于___理财产品,私人银行专属理财产品及机构理财产品属于()。( )
A. 个人、定制
B. 个人、私募
C. 公募、私募
D. 公募、定制
【单选题】
基金与银行理财产品的比较,有误的是___。
A. 从投资范围来看,银行理财产品的投资领域更为宽广
B.
C. 银行理财产品的流动性相对较高
D. 银行理财产品投资门槛通常较高,限制了资金较少的投资者
E. 银行理财产品信息披露程度一般不如基金
【单选题】
以下不属于理财产品风险揭示书必须包含的内容是___。
A. 理财非存款、产品有风向、投资需谨慎
B. 理财产品的类型、期限、风险评级结果
C. 投资者风险承受能力评级
D. 第三方专业机构出具的评价结果
【单选题】
商业银行销售理财产品,应遵循___原则。
A. 成本可算
B. 风险可控
C. 风险匹配
D. 信息充分披露
【单选题】
下列选项中,___不属于个人理财业务风险管理中的主要风险。
A. 操作风险
B. 信用风险
C. 管理风险
D. 市场风险
【单选题】
对于风险评估过期的机构投资者,不属于理财办理流程的是___。
A. 投资者填写风险评估问卷、投资者理财风险等级修改
B. 投资者签约
【单选题】
商业银行从事理财产品销售,下列行为没有违反《商业银行理财产品销售管理办法》的是___。
A. 通过电视、电台渠道对具体理财产品进行宣传
B. 通过电话、短信开展理财产品宣传
C. 销售人员代替投资者签署文件
D. 将理财产品与其他产品进行捆绑销售
E. 答案:B
【单选题】
根据《商业银行理财产品销售管理办法》,理财产品销售文件不包括___。
A. 理财产品销售协议书
B. 理财产品说明书
C. 理财产品宣传页
D. 风险揭示书
E. 答案:C
【单选题】
商业银行发行的封闭式理财产品的期限不得低于___天。
A. 120
B. 90
C. 60
D. 30
【单选题】
商业银行下列行为不正确的是:___
A. 商业银行应当建立健全销售人员资格考核、继续培训、跟踪评价等管理制度
B. 商业银行采用销售人员采用以销售业绩作为单一的考核和奖励指标的考核方法
C. 商业银行对65岁(含)的投资者进行风险承受能力评估时,应当充分考虑投资者年龄、相关投资经验等因素。
D. 商业银行应当定期或不定期地采用当面或网上银行方式对投资者进行风险承受能力持续评估。
【单选题】
经办人需要提醒购买理财产品投资者一旦购买,认购资金进入___状态,并且在产品成立日直接扣款,不再提醒。
A. 正常
B. 激活
C. 冻结
D. 封闭
推荐试题
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用