刷题
导入试题
【多选题】
对借款人的信用分析一般包括__________
A. 借款人的品格  
B. 借款人能力   
C. 借款人资本  
D. 借款人的经营环境
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
根据《中华人民共和国合同法》,下列合同中,属于可变更、可撤销合同的有______。___
A. 限制民事行为能力人订立的合同
B. 因无权代理而订立的合同
C. 因重大误解而订立的合同
D. 订立时显失公平的合同
【多选题】
当社会总供给大于总需求时,政府可实施的财政政策措施有______。___
A. 实行中性预算平衡政策
B. 增加财政补贴支出
C. 降低税率
D. 提高政府投资支出水平
【多选题】
以下各项中关于价格歧视说法正确的是______。___
A. 价格歧视也叫差别定价
B. 价格歧视一般可以分为四类
C. 第一类价格歧视又叫完全价格歧视
D. 第三类价格歧视是指不同的购买者规定不同的价格
【多选题】
公共物品的特点主要包括______。___
A. 非竞争性
B. 消费的不可储存性
C. 必须直接购买
D. 非排他性
【多选题】
关于科斯的企业形成理论的说法,正确的有______。___
A. 企业的产生增加了市场交易费用
B. 企业与市场机制是两种不同的协调生产和配置资源的方式
C. 企业作为生产的一种组织形式大大减少了需要签订的契约数量
D. 导致市场机制和企业交易费用不同的主要因素在于信息的不完全性
【多选题】
金融风险的基本特征有______。___
A. 不确定性
B. 相关性
C. 传染性
D. 高杠杆性
【多选题】
担保物权的法律特征有______。___
A. 价值权性
B. 从属性
C. 物上代位性
D. 法定性
【多选题】
现代市场经济中,财政实现收入分配职能的手段主要有______。___
A. 加强税收调节
B. 增加社会保障支出
C. 增加经济建设支出
D. 提供社会福利
【多选题】
根据《中华人民共和国物权法》,下列财产中,必须进行抵押登记后其抵押权才发生法律效力的有______。___
A. 正在建造的船舶
B. 房屋
C. 正在建造的建筑物
D. 建设用地使用权
【多选题】
在我国支付清算网络体系中,起到中枢作用的系统有______。___
A. 银行内部业务系统
B. 行业清算组织内部业务系统
C. 大额实时支付系统
D. 小额批量支付系统
【多选题】
制约商业银行创造派生存款能力的主要因素包括______。___
A. 储户提取现金的数量
B. 商业银行创造货币的能力
C. 企事业单位及公众缴付税款的数量
D. 商业银行缴存中央银行存款准备金的数量
【多选题】
下列不可以作为保证人的有__________
A. 具有代为清偿能力的公民   
B. 国家机关  
C. 医院
D. 企业的分支机构
【多选题】
经济法的调整对象包括______。___
A. 经济管理关系
B. 市场管理关系
C. 组织管理性的流转和协作关系
D. 社会管理关系
【多选题】
下列关于有限责任公司股权转让的提法中,正确的有______。___
A. 有限责任公司的股东之间可以相互转让其全部或者部分股权
B. 经股东同意转让的股权,在同等条件下,其他股东有优先购买权
C. 股东应就其股权转让事项书面通知其他股东征求同意,其他股东自接到书面通知之日起满30日未答复的,视为同意转让
D. 其他股东半数以上不同意转让的,不同意的股东应当购买该转让的股权;不购买的,视为同意转让
【多选题】
调整社会主义市场经济的法律体系中,______主要调整市场力量发挥作用的经济领域。___
A. 民法
B. 商法
C. 劳动法
D. 环境法
【多选题】
质押担保的范围__________
A. 主债权及利息  
B. 违约金  
C. 损害赔偿金 
D. 实现债权的费用
【多选题】
下列财产可以用作抵押的是______。___
A. 抵押人依法有权处分的国有土地使用权
B. 抵押人所有的房屋
C. 土地所有权
D. 抵押人所有的机器
【多选题】
下列实现公共财政职能的手段中,属于实现收人分配职能的手段有______。___
A. 征收企业所得税
B. 征收遗产税
C. 开征资源税调节自然资源形成的级差收人
D. 征收个人所得税
【多选题】
合同的生效要件中,内容合法是指______。___
A. 合同的内容,不得与法律的强行性或禁止性规范相抵触
B. 合同行为必须遵守国家法律,法律没有规定的,应当遵守国家政策
C. 合同不得违反社会公共利益
D. 合同不得违背社会的公序良俗
【多选题】
关于投资乘数、边际消费倾向和边际储蓄倾向之间的关系说法错误的是______。___
A. 投资乘数是边际消费倾向的增函数
B. 投资乘数是边际消费倾向的减函数
C. 投资乘数是边际储蓄倾向的增函数
D. 投资乘数与边际消费倾向和边际储蓄倾向之间不存在函数关系
【多选题】
根据《中华人民共和国会计法》,应该进行会计核算的经济业务事项包括______。___
A. 款项和有价证券的收付
B. 债权、债务的发生和结算
C. 会计人员的交接
D. 收入、支出、费用、成本的计算
【多选题】
市场类型划分的标准是______。___
A. 本行业内部的生产者数目或企业数目
B. 本行业内各生产者的产品的差别程度
C. 进入障碍的大小
D. 生产要素的效率
【多选题】
下列可以作为抵押物的财产__________
A. 土地所有权
B. 抵押人所有的房屋和其他地上定着物
C. 抵押人依法有权处分的国有的机器.交通运输工具
D. 抵押人依法承包并经发包方同意抵押的荒山的土地使用权
【多选题】
下列属于不正当竞争的行为的是______。___
A. 假冒行为
B. 商业贿赂行为
C. 虚假宣传行为
D. 侵犯商业秘密行为
【多选题】
在下述______情况下,市场机制是失灵的或不能充分发挥其调节作用,从而无法对资源进行有效配置。___
A. 外部经济的存在
B. 外部不经济的存在
C. 公共物品的生产
D. 垄断的存在
【多选题】
关于完全竞争市场的说法,正确的有______。___
A. 整个行业的需求曲线向右下方倾斜
B. 所有企业都是价格的接受者
C. 不同企业生产的产品存在差别
D. 个别企业的需求曲线是一条平行于横轴的水平线
【多选题】
实施价格歧视的前提条件有______。___
A. 生产者必须具有一定的规模
B. 企业生产的产品存在产品差别
C. 必须有可能根据不同的需求价格弹性划分出两组或两组以上的不同购买者
D. 市场必须是能够有效地隔离开的
【多选题】
个人汽车贷款的具体流程包括__________
A. 贷款的受理和调查
B. 贷款的审查和审批
C. 贷款的签约
D. 贷款的发放
【多选题】
所有权的法律特征包括______。___
A. 所有权的存续性
B. 所有权的单一性
C. 所有权的弹力性
D. 所有权的独占性
【多选题】
以下各项不属于自动稳定的财政政策的表现的是______。___
A. 营业税的比例税自动稳定作用
B. 个人所得税的累进所得税自动稳定作用
C. 企业所得税的累进所得税自动稳定作用
D. 政府预算的自动稳定作用
【多选题】
根据《企业会计准则》的规定,企业的会计报表至少包括______。___
A. 资产负债表
B. 利润表
C. 现金流量表
D. 利润分配表
【多选题】
所有者权益的来源有______。___
A. 投资人投入的资本
B. 直接计入所有者权益的利得和损失
C. 留存收益
D. 出售资产所得
【多选题】
下列对税负转嫁的说法,正确的是______。___
A. 经济交易是税负转嫁的必要条件
B. 课税范围越窄,税负越容易转嫁
C. 对生活必需品课税,税负容易转嫁
D. 税负转嫁情况如何还与商品的竞争程度有关
【多选题】
关于通货膨胀的原因,下列说法中正确的是______。___
A. 在现代信用货币制度下,银行体系的活期存款对货币均衡状况没有影响,与通货膨胀无关
B. 形成通货膨胀的直接原因不仅在于过度的现金发行,更在于过度的信用供给
C. 财政赤字或推行赤字财政政策,可能造成通货膨胀
D. “信用膨胀”是通货膨胀的幕后推手
【多选题】
实现货币政策的目标必须运用货币政策工具,以下属于中央银行传统货币政策工具的有______。___
A. 存款准备金率
B. 公开市场业务
C. 利率管制
D. 再贴现率
【多选题】
具体来说,国际资本流动的动因包括______。___
A. 各国收益率的差异
B. 汇率变动
C. 各种风险因素如汇率风险、市场风险等
D. 投机、规避贸易保护、国际分工
【多选题】
货币最基本的职能是__________
A. 价值尺度
B. 流通手段
C. 贮藏手段
D. 支付手段
【多选题】
消除外部性的方法包括______。___
A. 税收和补贴
B. 合并相关企业
C. 明晰产权
D. 反垄断
【多选题】
下列项目中,从短期来看,属于企业可变成本的有______。___
A. 厂房和设备折旧
B. 原材料费用
C. 燃料和动力费用
D. 生产工人的工资
【多选题】
影响需求变动的主要因素有______。___
A. 消费者偏好
B. 预期
C. 互补品价格
D. 消费者的收入
推荐试题
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用