刷题
导入试题
【单选题】
根据《保险公司管理规定》第16条规定:保险公司以2亿元人民币的最低资本金额设立的,在其住所地以外的每一省、自治区、直辖市首次申请设立分公司,应当增加不少于人民币___千万元的注册资本。( )
A. 1
B. 2
C. 3
D. 5
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
根据《保险公司管理规定》第21条规定:保险公司应当自收到筹建通知之日起___个月内完成分支机构的筹建工作。( )
A. 3
B. 6
C. 9
D. 12
【单选题】
根据《保险公司管理规定》第24条规定:中国保监会应当自收到保险公司分支机构完整的开业验收报告之日起___日内,进行开业验收,并作出批准或者不予批准的决定。( )
A. 15
B. 20
C. 30
D. 60
【单选题】
根据《保险公司管理规定》第67条规定:保险公司的股东大会、股东会、董事会的重大决议,应当在决议作出后___日内向中国保监会报告。( )
A. 15
B. 20
C. 30
D. 60
【单选题】
根据《人身保险业务档案管理规范》第9条规定:销毁人身保险业务电子档案的方式,包括销毁实体和___两种。( )
A. 焚毁
B. 销毁信息
C. 粉碎
D. 物理销毁
【单选题】
根据《人身保险业务档案管理规范》第7条规定:投保单纸质业务文件保管期限是___。( )
A. 保险合同终止之日起10年
B. 保险合同终止之日起5年
C. 保险合同终止之日起6年
D. 档案形成之日起6年
【单选题】
根据《人身保险业务档案管理规范》第7条规定:犹豫期解除合同纸质业务文件保管期限是___。( )
A. 保险合同终止之日起10年
B. 保险合同终止之日起5年
C. 档案形成之日起5年
D. 档案形成之日起6年
【单选题】
根据《人身保险业务档案管理规范》第7条规定:理赔协议书纸质业务文件保管期限是___。( )
A. 保险合同终止之日起10年
B. 保险合同终止之日起5年
C. 保险合同终止之日起6年
D. 档案形成之日起6年
【单选题】
根据《人身保险业务档案管理规范》第9条规定:销毁档案时,必须有___人监销。( )
A. 1
B. 2
C. 3
D. 4
【单选题】
根据《人身保险业务基本服务规定》第5条规定:保险公司应当提供每日24小时电话服务,并且工作日的人工接听服务不得少于___小时。( )
A. 6
B. 7
C. 8
D. 9
【单选题】
根据《人身保险业务基本服务规定》第10条规定:投保人提交的投保单填写错误或者所附资料不完整的,保险公司应当自收到投保资料之日起___个工作日内一次性告知投保人需要补正或者补充的内容。( )
A. 5
B. 10
C. 15
D. 20
【单选题】
根据《人身保险业务基本服务规定》第11条规定:保险公司认为需要进行体检、生存调查等程序的,应当自收到符合要求的投保资料之日起___个工作日内通知投保人。( )
A. 5
B. 10
C. 15
D. 20
【单选题】
根据《人身保险业务基本服务规定》第11条规定:保险公司认为不需要进行体检、生存调查等程序并同意承保的,应当自收到符合要求的投保资料之日起___个工作日内完成保险合同制作并送达投保人。( )
A. 5
B. 10
C. 15
D. 20
【单选题】
根据《人身保险业务基本服务规定》第12条规定:保险公司应当自收到被保险人体检报告或者生存调查报告之日起___个工作日内,告知投保人核保结果,同意承保的,还应当完成合同制作并送达投保人。( )
A. 5
B. 10
C. 15
D. 20
【单选题】
根据《人身保险业务基本服务规定》第17条规定:投保人、被保险人或者受益人委托他人向保险公司领取金额超过人民币___元的,保险公司应当将办理结果通知投保人、被保险人或者受益人。( )
A. 500
B. 1000
C. 1500
D. 2000
【单选题】
根据《人身保险业务基本服务规定》第19条规定:保险公司应当自收到资料齐全、符合合同约定条件的保全申请之日起___个工作日内完成受理。( )
A. 1
B. 2
C. 3
D. 5
【单选题】
根据《人身保险业务基本服务规定》第18条规定:保险公司在回访中发现存在销售误导等问题的,应当自发现问题之日起___个工作日内由销售人员以外的人员予以解决。( )
A. 5
B. 10
C. 15
D. 20
【单选题】
根据《人身保险业务基本服务规定》第29条规定:保险公司应当自受理投诉之日起___个工作日内向投诉人做出明确答复。( )
A. 5
B. 10
C. 15
D. 20
【单选题】
根据《人身保险业务基本服务规定》第21条规定:保险合同效力中止的,保险公司应当自中止之日起___个工作日内向投保人发出效力中止通知。( )
A. 5
B. 10
C. 15
D. 20
【单选题】
根据《人身保险业务基本服务规定》第15条规定:保险公司应当在犹豫期内对合同期限超过___的人身保险新单业务进行回访。( )
A. 半年
B. 1年
C. 2年
D. 5年
【单选题】
根据《保险公司中介业务违法行为处罚办法》第20条规定:保险公司及其工作人员委托未取得合法资格的机构或者个人从事保险销售活动的,由中国保监会责令改正,处___万元以上( )万元以下的罚款;情节严重的,限制保险公司业务范围、责令停止接受新业务或者吊销业务许可证。( )
A. 1,5
B. 5,10
C. 5,30
D. 10,30
【单选题】
根据《保险公司中介业务违法行为处罚办法》第21条规定:保险公司及其工作人员在保险业务活动中虚构个人保险代理人资料的,由中国保监会责令改正,处___万元以上( )万元以下的罚款;情节严重的,可以限制其业务范围、责令停止接受新业务或者吊销业务许可证。( )
A. 10,20
B. 10,30
C. 10,50
D. 20,30
【单选题】
根据《保险公司中介业务违法行为处罚办法》第19条规定:保险公司未按照中国保监会的规定,对保险代理人进行法律法规和职业道德培训,并保留详细的培训档案的,由中国保监会责令改正,给予警告,对有违法所得的处违法所得1倍以上3倍以下的罚款,但最高不得超过___万元,对没有违法所得的处( )万元以下的罚款。( )
A. 3,1
B. 2,1
C. 3,2
D. 2,2
【单选题】
根据《关于规范人身保险业务经营有关问题的通知》第5条规定:个人寿险保单趸缴保费的直接佣金占保费的比例不得超过___。( )
A. 4%
B. 5%
C. 6%
D. 10%
【单选题】
根据《关于规范人身保险业务经营有关问题的通知》第5条规定:个人寿险保单期缴保费的直接佣金总额占保费总额的比例不得超过___。( )
A. 4%
B. 5%
C. 6%
D. 10%
【单选题】
根据《关于规范人身保险业务经营有关问题的通知》第4条规定:“犹豫期”是从投保人收到保险单并书面签收日起___日内的一段时期。( )
A. 1
B. 3
C. 5
D. 10
【单选题】
根据《关于明确保险机构案件责任追究管理有关问题的通知》第2条规定:保险机构应对案件问责档案保存至少___年。( )
A. 1
B. 3
C. 5
D. 10
【单选题】
根据《关于明确保险机构案件责任追究管理有关问题的通知》第1条规定:保险机构案件中追缴资金和赔偿损失达到损失金额___以上的,问责时可以减轻相关人员处分的等级。( )
A. 10%
B. 30%
C. 50%
D. 100%
【单选题】
根据《关于明确保险机构案件责任追究管理有关问题的通知》第2条规定:对于案发之日起6个月内不能做出问责处理决定的已立案查处案件,各保险机构应在问责期限满前___个工作日内向监管机构提出延期申请,并根据案件责任调查情况等说明延期的原因。( )
A. 1
B. 3
C. 5
D. 10
【单选题】
根据《关于明确保险机构案件责任追究管理有关问题的通知》第2条规定:经监管机构同意,保险机构可适当延长案件问责时限,但每次延长期限不得超过___个月。( )
A. 1
B. 3
C. 5
D. 10
【单选题】
根据《关于明确保险机构案件责任追究管理有关问题的通知》第2条规定:保险机构案件责任追究中受到撤职纪律处分的人员,原则上应在其原职基础上至少下调___级或降为普通员工。( )
A. 1
B. 2
C. 3
D. 5
【单选题】
根据《关于明确保险机构案件责任追究管理有关问题的通知》第2条规定:保险机构案件责任追究中受受到调离处理的人员___年内不得提拔或在其他单位担任高于其原职的职务(级)。( )
A. 1
B. 2
C. 3
D. 5
【单选题】
根据《关于明确保险机构案件责任追究管理有关问题的通知》第2条规定:保险机构案件责任追究中受到引咎辞职、责令辞职、免职等组织处理的人员,___年内不得重新担任与其原职相当的职务(级)。( )
A. 1
B. 2
C. 3
D. 5
【单选题】
根据《关于明确保险机构案件责任追究管理有关问题的通知》第2条规定:保险机构案件责任追究中受到引咎辞职、责令辞职、免职等组织处理的人员,___年内不得提拔或在其他单位担任高于其原职的职务(级)。( )
A. 1
B. 2
C. 3
D. 5
【单选题】
根据《关于加强保险业突发事件应急管理工作的通知》第2条规定:保监会及派出机构应明确其___为本单位突发事件应急处理的工作机构,并明确具体岗位及职责。( )
A. 办公室
B. 寿险处
C. 产险处
D. 人教处
【单选题】
根据《保险公司养老保险业务管理办法》第二十三条规定:对投保人具有投资选择权的养老年金保险产品,在保险合同约定的开始领取养老金年龄的前 以内,保险公司不得向投保人推荐高风险投资组合。___
A. 1年
B. 3年
C. 5年
D. 10年
【单选题】
根据《保险公司养老保险业务管理办法》第二十三条规定:个人养老年金保险的投保人自愿选择高风险投资组合的,保险公司应当制作独立的 ,明确提示投资风险。___
A. 投保提示书
B. 高风险投资组合提示书
C. 红利演示书
D. 产品说明书
【单选题】
根据《保险公司养老保险业务管理办法》第三十条规定:团体养老年金保险的投保人退保的,保险公司应当要求其提供已通知退保事宜的有效证明,并以银行转账方式将退保金退至___
A. 投保人单位账户
B. 投保单位法定代表人个人账户
C. 被保险人的个人账户
D. 受益人的个人账户
【单选题】
根据《保险销售从业人员监管办法》第七条规定:报名参加资格考试中国保监会组织的保险销售从业人员资格考试的人员,应当具备 以上学历和完全民事行为能力。___
A. 初中
B. 高中
C. 大专
D. 本科
【单选题】
根据《保险销售从业人员监管办法》第八条规定:参加资格考试的人员,考试成绩合格,且无本办法第七条第二款规定情形的,自申请资格证书之日起 个工作日内,由中国保监会颁发资格证书。___
A. 5
B. 10
C. 15
D. 20
【单选题】
根据《保险销售从业人员监管办法》第十三条规定:执业登记事项发生变更的,保险公司、保险代理机构应当及时在信息系统中予以变更,并在 个工作日内换发执业证书。___
A. 1
B. 3
C. 5
D. 7
推荐试题
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用