相关试题
【多选题】
在办理业务时,农信社员工应以客户为中心,提供优质规范的服务,以下属于优质规范服务的选项是___。
A. 办理业务过程中,严格执行首问负责制。
B. 大堂经理热情接待,语言规范,言谈得体。
C. 能够尊重客户隐私,公平对待所有客户。
D. 对残障者或语言存在障碍的客户,能够尽可能为其提供便利。
【多选题】
下列依法可以抵押的财产有___。
A. 建筑物和其他土地附着物、建设用地使用权
B. 以招标、拍卖、公开协商等方式取得的荒地等土地承包经营权
C. 正在建造的建筑物、船舶、航空器
D. 交通运输工具
【多选题】
商业银行对未取得哪些证件的房地产项目不得发放贷款___
A. 公司营业执照
B. 国有土地使用证
C. 建设用地规划许可证
D. 建设工程规划许可证
E. 建筑工程施工许可证
F. 房地产预售许可证
【多选题】
借款逾期后如何延长诉讼时效,下列说法正确的是___
A. 提起诉讼
B. 申请仲裁
C. 向借款人和担保人主张权利
D. 从借款人账户中扣收本息
E. 直接冻结借款人和担保人存款
F. 直接将抵押财产收为抵债资产
【多选题】
当一个集团客户授信需求超过一家银行风险的承受能力时,商业银行应采取组织___等措施分散风险。
A. 银团贷款
B. 贷款转让
C. 增加客户抵押品
D. 联合贷款
【多选题】
2018年末,按照贷款五级分类的口径,我国某商业银行各类贷款余额及贷款损失准备的情况是:正常贷款1000亿元;关注贷款100亿元;次级贷款20亿元;可疑贷款10亿元;损失贷款10亿元;贷款损失准备100亿元。根据我国《商业银行风险监管核心指标》和《商业银行贷款损失准备管理办法》的监管要求,该商业银行的___。
A. 不良贷款率高于监管指标要求
B. 不良贷款率低于监管指标要求
C. 贷款拨备率高于监管指标要求
D. 贷款拨备率低于监管指标要求
E. 拨备覆盖率高于监管指标要求
【多选题】
担保物权担保的范围包括?___
A. 本金
B. 利息
C. 违约金
D. 诉讼费用
【多选题】
有下列情形之一的,担保物权消灭?___
A. 主债权消灭
B. 担保物权实现
C. 债权人放弃担保物权
D. 担保物权超过诉讼时效
【多选题】
银行业监督管理机构根据审慎监管的要求,可以采取下列哪些措施进行现场检查?___
A. 进入银行业金融机构进行检查;
B. 询问银行业金融机构的工作人员,要求其对有关检查事项作出说明;
C. 查阅、复制银行业金融机构与检查事项有关的文件、资料,对可能被转移、隐匿或者毁损的文件、资料予以封存;
D. 检查银行业金融机构运用电子计算机管理业务数据的系统。
【多选题】
贷款人应在借款合同中约定由借款人承诺以下事项:___
A. 向贷款人提供真实、完整、有效的材料;
B. 配合贷款人进行贷款支付管理、贷后管理及相关检查;
C. 进行对外投资、实质性增加债务融资,以及进行合并、分立、股权转让等重大事项前征得贷款人同意;
D. 贷款人有权根据借款人资金回笼情况提前收回贷款;
【多选题】
中国银监会关于整治银行业金融机构不规范经营行为规定的“四公开”具体内容___
A. 收费项目公开
B. 服务质价公开
C. 效用功能公开
D. 优惠政策公开
【多选题】
不良贷款率=()+()+()/(各项贷款)×100%。___
A. 次级类贷款
B. 可疑类贷款
C. 损失类贷款
D. 关注类贷款
【多选题】
重大操作风险事件应当根据本行操作管理政策的规定及时间向___报告。
A. 董事会
B. 监事会
C. 高级管理层
D. 相关管理人员
【多选题】
债务履行期届满抵押权人未受清偿的,可以与抵押人协议采取下列何种方式处置抵押物来获得受偿?___
【多选题】
以下说法正确的是___
A. 城市房地产抵押合同签订后,土地上新增的房屋不属于抵押物
B. 为债务人抵押担保的第三人,在抵押权人实现抵押权后,有权向债务人追偿
C. 抵押权因抵押物灭失而消灭
D. 因抵押物灭失所得的赔偿金,应当作为抵押财产
【多选题】
下列有关抵押物登记部门的说法正确的是___
A. 以无地上定着物的土地使用权抵押的,为核发土地使用权证书的土地管理部门
B. 以城市房地产或者乡(镇)、村企业的厂房等建筑物抵押的,为县级以上地方人民政府规定的部门
C. 以林木抵押的,为市级以上林木主管部门
D. 以航空器、船舶、车辆抵押的,为运输工具的登记部门
【多选题】
可作为个人质押贷款的质物主要有___。
A. 汇票、支票、本票
B. 债券
C. 仓单、提单
D. 存款单
E. 应收账款
【判断题】
进入诉讼执行程序的贷款,其五级分类结果不得优于次级类
【判断题】
注册验资的临时存款账户在验资期间只收不付,注册验资资金的汇缴人应与出资人的名称一致
【判断题】
在理财顾问服务活动中,客户根据商业银行提供的理财顾问服务管理和运用资金,并承担由此产生的收益和风险
【判断题】
商业银行完成客户风险承受能力评估后应当将风险承受能力评估结果告知客户,即可留存归档
【判断题】
商业银行分支机构不具有法人资格,在总行授权范围内依法开展业务,其民事责任由总行承担
【判断题】
商业银行向关系人发放担保贷款的条件不得优于其他借款人同类贷款的条件
【判断题】
商业银行有权拒绝任何单位和个人强令要求其发放贷款或者提供担保
【判断题】
商业银行应当设立统一的投诉电话、书面投诉联系方式等渠道,并在营业场所和网站醒目位置进行公示,以便及时受理客户对服务价格的相关投诉
【判断题】
《会计法》规定,以不同的依据编制的财务会计报告,是一种严重的违法行为
【判断题】
财务会计报告由资产负债表、现金流量表、利润表组成
【判断题】
会计报表附注是对单位一定会计期间内财务、成本等情况进行分析总结的书面报告
【判断题】
在债务人的管理人接管债务人的财产后,已经开始的而尚未终结的有关债务人的民事诉讼或者仲裁应当中止
【判断题】
债权申报期限自人民法院作出受理破产申请裁定之日起计算,最短不得少于30日,最长不得超过3个月
【判断题】
对于借款人以公开向不特定的自然人、法人和其他组织募集的存单申请质押贷款的,贷款人不得向其发放贷款
【判断题】
单位在金融机构办理定期存款时,金融机构为其开具的《单位定期存款开户证实书》可以作为质押的权利凭证
【判断题】
金融机构进行客户身份识别,认为必要时,可以向公安、工商行政管理等部门核实客户的有关身份信息
【判断题】
对依法履行反洗钱职责或者义务获得的客户身份资料和交易信息,应当予以保密;非依法律规定,不得向任何单位和个人提供
【判断题】
《贷款通则》中规定,对借款人不能依照合同约定归还贷款本息或不能落实还本付息事宜的,贷款人应当及时进行债权保全,必要时可以依法在新闻媒体披露或采取诉讼等法律措施
【判断题】
信贷业务合同内容填制必须完整,正副文本的内容必须一致,不得涂改
【判断题】
原客户经理工作岗位变动时,应在客户部门负责人主持和监交下进行移交,由原责任人、接手责任人、监交人签字后登记存档,责任移交后,接手责任人对信贷客户贷后管理负责
【判断题】
客户经理在贷后管理中,未按规定及时向借款人、担保人主张权利导致借款、担保合同超过诉讼时效的将应依照《河南省农村信用社员工违规行为处理暂行办法》及相关制度办法的有关条款,视情节轻重进行处理,涉嫌犯罪的,要移交司法机关处理
推荐试题
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE