【多选题】
个人活期账户销户注意事项正确的是___
A. 账户存在属性异常不可销户时,可通过1603交易查询其属性,然后可在分别的交易里进行取消才可以销户
B. 通过1603交易查询出该账户为“不可销户”的,则要在2105交易里的可销户标识维护项进行维护
C. 可以当日冲账,凭证状态恢复,建议在2901交易更换凭证
D. 支持卡的销户冲正
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
关于个人账户管理的说法正确的有___
A. 个人账户按储蓄种类可分为活期账户、定期储蓄账户和其他储蓄账户;
B. 活期账户从性质上可分为个人储蓄账户和个人结算账户;
C. 活期结算账户一般只开立存折,可进行存款、取款,但不能进行转账结算;
D. 定期储蓄账户既可以开立储蓄账户,也能开立结算账户。
【多选题】
保证金账户系空开账户,存值可以通过___值。
A. 网银互联
B. 二代支付
C. 同城
D. 柜面转账
【多选题】
下列关于活期账户的说法正确的有___。
A. 一个身份证只能开立一个白金卡;
B. 代理开卡,不需设置密码,只能办理存款类业务;
C. 16周岁以下监护人代理开卡,视同本人,账户不需再去激活;
D. 现金10万(含),转账50万(含),柜员相互授权;
E. 人民币转账开户允许异名转入,但必须是个人结算账户。
【多选题】
关于二类账户___下列哪些交易不受限制
A. 理财扣款、兑付
B. 贷款发放(仅限采用自主支付的30(含)万元以下的个人消费类贷款、50(含)万元以下个人经营类贷款)
C. 还款
D. 非绑定一类账户转账
【多选题】
若本人未满16周岁,须由监护人代为办理,需提供监护人的身份证,本人身份证或户口簿,以及证明监护人关系的户口簿。如果户口簿无法证明监护人关系,需额外提供能证明监护人关系的证明,如___
A. 公证证明、
B. 派出所的子女关系证明、
C. 法院判决、
D. 出生证明等
【多选题】
下列哪些信息可以在柜面进行信息维护的?___
A. 联系地址
B. 姓名
C. 手机号码
D. 支取方式
【多选题】
无折(卡)续存,则存款人需提供哪些资料___。
A. 个人业务申请单
B. 办理人身份证件
C. 持卡人身份证件
D. 授权书
【多选题】
下列哪些交易必须刷卡才能进行交易___。
【多选题】
我行现有业务币种有哪些___。
A. 人民币
B. 英镑
C. 港币
D. 美元
E. 日元
F. 欧元
【多选题】
2105维护类型可以有哪些___
A. 通存通兑
B. 可销户标识
C. 支取方式维护
D. 属性标签维护
【多选题】
活期存取款选择凭证类型,可以选择___
A. 普通存折
B. 兰花一卡通
C. 金融IC卡
D. 市民卡
E. 兰花白金卡
F. 无_个人保证金
【多选题】
个人活期存款支取方式有___
A. 凭密码
B. 凭证件
C. 凭印签
D. 凭存折
【多选题】
当活期账户存在下列情况时,___,不可销户
A. 约定转存
B. 代扣关系
C. 挂失止付
D. 存在子账户
【多选题】
在做2003个人现金存款时选择凭证类型,可以选择___
A. 普通存折
B. 兰花一卡通
C. 金融IC卡
D. 市民卡
E. 兰花白金卡
F. 无凭证。
【多选题】
存款时是否代理可选择是/否,若有代理,需输入___输入身份信息后可进行核查。
A. 代理人证件类型
B. 代理人证件号码
C. 代理人姓名
【多选题】
账户存在属性异常现象主要包括___
A. 约定转存
B. 签约关系
C. 冻挂止付关系
D. 久悬
【多选题】
以下业务中需要授权中心授权的有___。
A. 现金支取10万(含)以上
B. 现金存款10万(含)以上
C. 转账10万(含)以上
D. 转账50万(含)以上
【多选题】
以下说法正确的是___
A. 5万元(含)以上的取款交易须进行复核,复核人员应在取款凭条上签章确认;
B. 取款金额柜面累计5万(含)以上,必须提供本人身份证件,代理的还需提供代理人的身份证;
C. 所有涉及现金或转账的取款交易,必须刷卡才能办理;
D. 外币现汇账户也可以取现。
【多选题】
我行活期储蓄存款按积数计息:就是按实际天数每日累计账户余额,以累计积数乘以日利率计算利息的方法。积数计息法的计息公式为:利息=累计计息积数×日利率,日利率(‰)计算公式为:___。
A. 年利率(%)÷360
B. 年利率(%)÷365
C. 月利率(‰)÷30
【多选题】
账户存在属性异常,比如活期账户有___关系时,不可销户。
A. 约定转存
B. 理财签约
C. 支付宝
D. 冻挂止付
【多选题】
建立约定转存时活期帐户下限与自动转存基数可以是___。
A. 600
B. 1000
C. 1050
D. 1500
【多选题】
以下说法正确的是___
A. 兰花卡批量开卡密码既能统一设置为“888888”,又有随机生成的功能
B. 兰花卡卡内个人通知存款账户的开立分为现金开户、转账开户二种方式。
C. 个人通知存款账户和付款账户必须是同一个人所有,才能进行转账开户。
D. 兰花卡理财功能既能自动转存整存整取存款,又具有自动转存个人通知存款功能。
【多选题】
金融IC卡借记账户和金融IC卡电子现金账户挂失情况___
A. 金融IC卡借记账户可挂失
B. 电子现金账户不可挂失
C. 金融IC卡借记账户不可挂失
D. 电子现金账户可挂失
【多选题】
下列选项属于电子现金账户性质的是___
A. 无借记功能
B. 可以随时支取
C. 最高余额不得超过1000元人民
D. 无密码
【多选题】
以下关于金融IC卡说法错误的有___
A. 金融IC卡换卡后,原卡片中的电子现金账户和新卡片中的电子现金账户是两个独立的电子现金账户。
B. 金融IC卡内电子现金账户销户清算是指电子现金账户办理销户登记45天后将原卡片由于芯片损坏而留存在电子现金账户中的余额以现金的方式支付给客户。
C. 金融IC卡内电子现金账户销户登记可隔日撤销。
D. 金融IC卡销卡前先进行圈提交易,电子现金账户的余额全额转入主帐户,圈提后电子现金账户余额为零。
【多选题】
下列属于Ⅱ类户存入、转取限额控制的是___。
A. 开户转账存入
B. 利息转入
C. 转出开实体定期存单
D. 有权机关扣划
【多选题】
市民卡的实物卡分为哪几种___
A. 空白卡
B. 备用卡
C. 预制卡
D. 废卡
E. 成品卡
【多选题】
单位新增人员的批量申领仅限于绍兴市参加社会保险的各用人单位、学校(幼儿园),新增人员是指未申领过绍兴市社会保障卡的人员。单位经办人员需在社保经办机构办理好社保参保手续;单位授权办理人登录社会保障市民卡公司网站(www.sxssmk.com)下载批量申领所需要的各类资料,或到我行服务网点领取,按要求填写,并收集有效证件复印件,审核资料。其中所需资料为___
A. 《批量办理绍兴市社会保障市民卡协议书》(一式二份);
B. 《批量办理绍兴市社会保障市民卡业务委托书》;
C. 《绍兴市社会保障市民卡批量申请表》(一式三份);
D. 《批量办理绍兴市社会保障市民卡明细清单》;
E. 单位授权办理人身份证原件、授权人身份证复印件;
F. 申领人本人签字的有效证件复印件,如申领人未满16周岁则需要提供户口簿对应联复印件及与其同一户口簿监护人的户口簿相关对应联复印件(若监护人不在同一户口簿,需提供的其他监护关系证明)。
【多选题】
个人申领社会保障市民卡申领对象:具有绍兴市户籍的本市市民和在绍兴市行政区域内参加社会保险的非本市户籍人员。其中所需资料为___
A. 《绍兴市社会保障市民卡申请表》;
B. 本人有效证件原件。
C. 未满16周岁的未成年人申领社会保障市民办卡时,应由其监护人代为办理,并按规定出示代理人有效身份证件、被代理人有效身份证件或户口簿、监护关系证明(即户口簿,或不在同一户口簿时需要提供的其他监护关系证明)。
D. 户口本
【多选题】
绍兴市社会保障市民卡是指由绍兴市人力资源和社会保障局发放的,具有___等基本功能
A. 信息存储
B. 信息查询
C. 身份认证
D. 交易支付
【多选题】
市民卡的主要功能:___
A. 政府公共管理服务功能
B. 社会保障功能
C. 公用事业功能
D. 金融支付商业便民功能
【多选题】
个人申领社会保障市民卡的申领对象是___
A. 在绍兴市行政区域内参加社会保险的非本市户籍人员
B. 具有绍兴市越城区户籍的本市市民
C. 具有绍兴市户籍的本市市民
D. 具有绍兴市暂住证的非本市市民
【多选题】
社会保障市民卡交易密码有3个,分别为___
A. 社保密码
B. 联机账户密码
C. 银行账户密码
D. 电子钱包密码
【多选题】
市民卡挂失中,社保账户和联机账户分为___。
A. 临时挂失
B. 正式挂失
C. 密码挂失
D. 书面挂失
【多选题】
下列情况中可以由代理人携带相关证明资料办理市民卡补卡的有___
A. 持卡人为未成年人(未满十六周岁)
B. 持卡人行动不便但意识清晰
C. 持卡人意识不清晰
D. 持卡人死亡
【多选题】
卡片状态为___等状态的,账户可以做还款交易。
A. 激活
B. 挂失
C. 申请销户
D. 换卡
【多选题】
兰花公务卡激活须出示哪些___。
A. 公务卡
B. 本人有效身份证件
C. 户口本
D. 市民卡
【多选题】
公务卡密码分为___。
A. 查询密码
B. 交易密码
C. 兰盾密码
D. 登入密码
【多选题】
公务卡交易密码是___时使用的密码。
A. 柜台
B. 自助机具
C. 凭密消费
D. 网上登录
【多选题】
以下说法,哪些是正确的___
A. 公务卡持卡人可到我行任一营业网点或致电24小时客户服务热线及时办理挂失。
B. 公务卡挂失后可立即办理补卡手续。
C. 公务卡挂失埋单以本行公务卡发卡系统成功受理挂失业务的系统时间为准。
D. 公务卡补换卡有效期视同原卡有效期。
推荐试题
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring