刷题
导入试题
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
推荐试题
【多选题】
在协助有权机关办理冻结存款业务时,冻结的执行类别有:___
A. 只进不出
B. 存单质押
C. 部分冻结
D. 只出不进
【多选题】
冻结、扣划特种存款和保证金的注意事项___
A. 对社会保险基金帐户资金可以冻结、扣划。
B. 对工会在银行开设的工会会费帐户不得冻结、扣划。
C. 证券公司开立的客户交易结算资金专用账户的存款不得冻结扣划;
D. 新股发行验资专用账户中的资金不得冻结扣划;
E. 被执行人为金融机构时,对其缴存人民银行的存款准备金和备付金不得冻结扣划。
【多选题】
下列有关解冻说法正确的是___。
A. 系统会根据解冻执行机构来筛选相应的“冻结登记号”,所以在选解冻执行机构时,需要考虑原冻结机构,否则无法查出对应的登记号。
B. 解冻可在冻结网点办理。
C. 分期冻结一经解冻,所在分期的一并解冻。
D. 授权:必须授权。
【多选题】
办理协助冻结业务时,经办人员应当核实以下证件和法律文书___
A. 有权机关执法人员的双人双证(工作证与执行证,或根据有关规定出示一项证明)
B. 有权机关是镇团级以上机构签发的协助冻结存款通知书,法律、行政法规规定应当由有权机关主要负责人签字的,应当由主要负责人签字;
C. 人民法院出具的冻结存款裁定书、其他有权机关出具的冻结存款决定书。
【多选题】
对于冻结、扣划特种存款和保证金以下说法正确的是___
A. 对社会保险基金帐户资金不得冻结、扣划。
B. 对工会在银行开设的工会会费帐户不得冻结、扣划。
C. 被执行人为金融机构时,对其缴存人民银行的存款准备金和备付金不得冻结扣划。
D. 信用证开证保证金,人民法院在审理或执行案件时,可依法采取冻结措施,但不得扣划。
E. 银行承兑汇票保证金,人民法院在审理或执行案件时,可依法采取冻结措施,但不得扣划。
【多选题】
归还垫款时,还款类型只能选归还欠款或___。
A. 提前还本
B. 逾期结清
C. 到期一次还本付息
D. 归还垫款
【多选题】
受托支付的贷款发放后,系统同时会把贷款金额做___处理。
A. 止付
B. 冻结
C. 汇出
D. 存入同名账户
【多选题】
当委托贷款的还款方式为自动时,是指委托贷款还款后本金会自动返还到___
A. 委托人结算账户
B. 委托存款账户
C. 借款人结算账户
D. 借款人存款账户
【多选题】
垫款贷款在银行中被列为不良资产,属于逾期贷款一类,按年利率___计收罚息。
A. 5%
B. 10%
C. 18%
D. 20%
【多选题】
借款借据的___应盖贷款审批专用章。
A. 第一联
B. 第二联
C. 第三联
D. 第四联
【多选题】
___作为贷款发放的主凭证。
A. 借款借据第一联
B. 放款通知书
C. 提款申请书
D. 通用凭证
【多选题】
贷款到期日___还款不用审批提前还款审批表。
A. 前10天
B. 前五天
C. 前一天
D. 当天
【多选题】
受托支付支付确认交易码 ___。
A. 3005
B. 3002
C. 2005
D. 3001
【多选题】
关于受托支付说法正确的是___
A. 该交易是将受托支付金额作解除止付处理,解除后允许撤销
B. 受托支付确认成功后允许贷款发放冲账
C. 同一条受托支付信息多次操作,系统会报错
D. 受托支付通书中的名称和账号可以与系统中不一致
【多选题】
贷款归还业务操作代码为___
A. 3001
B. 3002
C. 3003
D. 3004
【多选题】
垫款账号的科目号为___
A. 1250
B. 1260
C. 1270
D. 1280
【多选题】
以保本型理财产品办理理财产品质押贷款的(对公流动资金贷款),贷款金额一般不超过理财产品金额的___。
A. 65%
B. 75%
C. 85%
D. 90%
【多选题】
以下关于贷款发放说法正确的是___。
A. 借款申请书、借款借据是否加盖贷款审批专用章;
B. 借款借据第一联是否签具借款单位预留印鉴;
C. 各类申请书和合同是否按规定由各方签章确认,签章是否符合规定;
D. 放款通知书、借款借据和合同的各项要素是否相符;
E. 抵(质)押合同上的金额是否与抵(质)押收据上的金额相符。
【多选题】
“入账账号”字段账户状态和账户属性判断,账户属性为___则不允许放款。
A. 全部止付
B. 冻结
C. 资金池
D. 中间业务
E. 今日开户
【多选题】
以下关于贷款业务说法正确的是___。
A. 贷款归还类型为提前还本和提前结清时,需要先由客户经理在信贷系统审批通过。
B. 同一贷款账号下,如果当天先做过提前还本,之后再做提前结清,系统会报错,需将提前还本冲账后再处理提前结清。
C. 有欠款的情况下,允许做提前还本,但还款方式为等额本息(按月、按季)和等额本金(按月、按季)时系统控制,必须先归还欠款后才能做提前还本。
D. 归还垫款时,还款类型只能选归还欠款或逾期结清。
【多选题】
进行受托支付支付确认操作时应注意的事项包括:___
A. 该交易是将受托支付金额作解除止付处理,解除后不允许撤销。
B. 贷款发放后需要冲账,必须受托支付确认成功后再冲账。
C. 同一条受托支付信息允许多次操作。
D. 受托支付通知书中的名称和账号必须与系统中一致。
【多选题】
还款类型为提前还本时,如果还款方式为___时,需选择变期/变额,用于确定提前还本后的剩余本金重新计算还款计划。
A. 等额本息按月
B. 等额本金按月
C. 按月付息到期一次还本
D. 利随本清
【多选题】
贷款归还时,选择还款类型,下拉选项有___
A. 归还欠款
B. 提前还本
C. 提前结清
D. 到期日及逾期结清
【多选题】
下列哪项业务操作前需信贷部门提供有权人签字的相关资料?___
A. 贷款发放
B. 归还欠款
C. 提前还本
D. 提前结清
【多选题】
发放贷款时应审核哪些资料:___
A. 借款申请书、贷款合同、放款通知书、提款申请书、信贷业务审批表、贷款人受托支付通知书(或计划支付清单、实际支付清单)等是否由相关信贷审批人员批准签字;
B. 借款申请书、借款借据是否加盖贷款审批专用章;
C. 借款借据第一联是否签具借款单位预留印鉴;
D. 各类申请书和合同是否按规定由各方签章确认,签章是否符合规定;
E. 放款通知书与借款借据和合同的各项要素是否相符;
F. 抵(质)押合同上的金额是否与抵(质)押收据上的入库金额相符。
G. 各类合同是否加盖双方的骑缝章
【多选题】
下列说法正确的有___
A. 必须凭信贷部门提交的经有权人签批的相关资料办理贷款发放、提前归还等业务
B. 柜台可以直接办理贷款发放、提前归还等业务,无需经过有权人的签批
C. 贷款到期后可由借款人使用支付凭证柜面归还,也可以通过批处理每天扣收欠款。
D. 贷款抵质押物品按信贷部门提供的金额(认定价值)入账,纳入“704抵(质)押品”表外科目核算,记账员和保管员分离,并按规定入库保管
【多选题】
以下关于受托支付说法错误的是___
A. 受托支付支付确认是指将受托支付金额作解除止付处理,解除后不允许撤销。
B. 受托支付支付确认成功后也可做贷款发放冲账。
C. 同一条受托支付信息允许多次操作。
D. 受托支付通知书中的名称和账号必须与系统中一致。
【多选题】
经办柜员须对信贷部门提交的提款申请书___进行合规性审核。
A. 是否填写经办行意见,客户经理及审核人是否签字。
B. 是否加盖单位公章、法人章。
C. 与支付凭证上收付款人是否一致。
D. 与支付凭证上金额、资金用途是否一致。
【多选题】
垫款贷款在银行中被列为不良资产,属于逾期贷款一类,按年利率___计收罚息。
A. 10%
B. 12%
C. 15%
D. 18%
【多选题】
垫款发放后按___结息 。
A. 周
B. 月
C. 季
D. 年
【多选题】
垫款发放日为2016年1月1日,那么下一个结息日为___。
A. 2月1日
B. 4月1日
C. 3月20日
D. 贷款原到期日
【多选题】
垫款贷款属于逾期贷款,还款顺序产品层默认为___。
A. 先还利息,再还本金
B. 先还本金,再还利息
C. 先还费用,再还本金
D. 先还费用,再还利息
【多选题】
归还银承垫款时,借据号为___。
A. 信贷流水号
B. 承兑协议号
C. 备款清单中的号
D. 垫款清单中的贷款账号
【多选题】
垫款贷款属于贷款___
A. 正常贷款
B. 委托贷款
C. 保证贷款
D. 逾期贷款
【多选题】
垫款发放的交易码为___
A. 3001
B. 3002
C. 3003
D. 3004
【多选题】
我行垫款贷款根据业务种类不同,可分为___
A. 担保垫款
B. 承兑垫款
C. 远期结售汇项下垫款
D. 保函项下垫款
E. 其他垫款
【多选题】
垫款发放后按月结息,结息日为次月的对应发放日。例如垫款发放日为2016年3月1日,那么其结息日依次为___,以此类推。
A. 3月21日
B. 4月1日
C. 3月20日
D. 5月1日
【多选题】
下列关于垫款说法正确的是___。
A. 垫款发放后按月结息,结息日为次月的对应发放日。例如垫款发放日为2016年1月1日,那么下一个结息日为2月1日,3月1日等,以此类推。
B. 入账账号账户属性和状态正常情况下,才能入账成功,即放款成功,否则不能放款。
C. 垫款贷款发放后,资金须及时划转,专款专用,网点应协助信贷部门监控垫款账户资金动向.
D. 如有存款,系统自动扣收相应垫款及罚息
【多选题】
___是指由委托人提供合法来源的资金转入委托银行委托存款账户,委托银行根据委托人确定的贷款对象、用途、金额、期限、利率等代为发放、监督使用并协助收回的贷款业务;
A. 微型贷
B. 委托贷款
C. 贴现业务
D. 公积金贷款
【多选题】
当产品为委托贷款时,还款模式为自动,是指委托贷款还款后本金会返还到___,还款模式手工,是指还款本金返回到()。
A. 委托人结算账户 委托人贷款账户
B. 委托人存款账户 委托人结算账户
C. 委托人结算账户 委托存款账户
D. 委托人贷款账户 委托人存款账户
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用