【判断题】
同业存放,也称同业存款,目前包括同业活期存款和同业定期存款。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
同业存放,也称同业存款,是指因支付清算和业务合作等的需要,由其他金融机构存入于商业银行的款项。
【判断题】
同业存放属于对公存款种类,一般情况都会对其进行利率浮动,浮动比例与银行协商。
【判断题】
存款银行申请在本行开立人民币同业存放银行结算账户,由总行运营管理部(总行营业部)受理。分支行及以下分支机构不得作为人民币同业存放银行结算账户的开户银行,分行级营业机构确有需要的,可以直接办理。
【判断题】
开立的定期账户,在未存入钱之前或者已有值的定期账户,都可以当日销户。
【判断题】
同业存入是指信用社以及财务公司、信托公司等非银行金融机构开办的存款业务。
【判断题】
若是开立人民币同业存放银行结算账户,非一级法人开户的,还应出具一级法人(或者一级分行)以正式发文形式的授权书原件。对存款银行申请开立人民币同业银行结算账户用途超越经营范围的,应当拒绝办理。
【判断题】
协议存款应付利息是指手工结息结出来的利息,若手工结息结了两次,则该利息为累计额。
【判断题】
只有定期类未到期的协议和同业可以手工结息,一经账户到期,这个功能就无法实施。
【判断题】
协议定期销户转账金额50万(含),需会计主管授权。
【判断题】
协议存款是按照中国人民银行及中国银行业监督管理委员会的有关规定,银行与其他机构法人或法人授权机构,通过签订协议约定存放利率办理的固定期限、固定金额的存款业务。
【判断题】
开立的定期零值账户,在未存入钱之前,当日不能销户只能冲账。已有值的定期账户,可以当日销户。
【判断题】
协议存款开户时,录入柜员审核客户提供的一式二份的《绍兴银行人民币单位协议存款合同》是否正确、完整和法人身份证是否有效。
【判断题】
协议存款应付利息划转时,若开户时设定了转入账户,则会返显,且不可以修改。
【判断题】
开立存放同业账户,存款类型为普通存款,按季计息。
【判断题】
存放同业内部账户开户,客户号统一为999999999。
【判断题】
存放同业是指我行存入于境内、境外银行和非银行金融机构的款项。
【判断题】
存放同业内部帐户开户,可以由各分支行网点前台柜员直接在系统中开立,开立账户时,“是否计息”需要选择“Y计息”。
【判断题】
同业内部帐户开户选取产品(只能选择产品号为3开头的活期产品),不计息。
【判断题】
总行相关业务部门可根据业务发展需要在其他银行机构开立人民币存放同业银行结算账户,其中人民币投融资性存放同业银行结算账户可以在其他银行二级分行以下(含)开立。
【判断题】
分行及县域支行可以在所属地国有银行或一级法人银行开立人民币结算性存放同业银行结算账户(分行不超过2家、县域支行不超过1家),可开立人民币投融资性存放同业银行结算账户。
【判断题】
总行相关业务部门可根据业务发展需要在其他银行机构开立人民币存放同业银行结算账户,其中人民币投融资性存放同业银行结算账户只能在其他银行二级分行以上(含)开立,支行及以下分支机构不得开立。
【单选题】
CCB-Ⅱ型制动机中X-IPM是指( ) 。(1.0分)
A. 电子制动阀
B. 继电器接口模块
C. 微处理器
D. 制动显示屏
【单选题】
当制动缸内漏风沟过长时,有可能造成制动机( )。(1.0分)
A. 自然制动
B. 缓解不良
C. 不起制动作用
D. 紧急制动
【单选题】
104型分配阀属于( )。(1.0分)
A. 二压力机构直接作用方式控制阀
B. 三压力机构控制阀
C. 二压力机构间接作用方式控制阀
D. 二、三压力混合机构的控制阀
【单选题】
为防止总风管漏泄时,为保证空气弹簧内有一定的压缩空气,在高度调整阀内一般设置有( )。(1.0分)
A. 减压阀
B. 双向阀
C. 单向阀
D. 增压阀
【单选题】
CCB-Ⅱ型制动机中BPT是指( )压力传感器。(1.0分)
A. 平均管压力
B. 列车管压力
C. 总风压力
D. 均衡风缸压力
【单选题】
制动缸缓解不良的主要原因是( )。(1.0分)
A. 缓解弹簧折断
B. 活塞皮碗漏泄
C. 制动缸内漏风沟堵塞
D. 制动缸漏泄
【单选题】
哪个不属于SP2制动单元中闸片间隙自动调整器的部件。( )(1.0分)
A. 引导螺母
B. 连接螺母
C. 调整螺母
D. 回程螺母
【单选题】
DK-1型电空制动控制器制动位时列车管最大减压量为( )kPa。(1.0分)
A. 150~200 kPa
B. 190~240 kPa
C. 200~250 kPa
D. 210~230 kPa
【单选题】
DK-1型制动机电动放风阀有两个作用位置,排风位和( )(1.0分)
A. 充风位
B. 关闭位
C. 中立位
D. 保压位
【单选题】
CCB-Ⅱ型制动机中RIM是指( ) 。(1.0分)
A. 电子制动阀
B. 继电器接口模块
C. 继电器接口模块
D. 制动显示屏41、
【单选题】
70T货车制动软管长度应符合( )的规定。(1.0分)
A. 715±10mm
B. 695±10mm
C. 795±10mm
D. 585±10mm
【单选题】
货车集尘盒有( )集尘盒和铸铁集尘盒两种。
A. 塑钢
B. 尼龙
C. 不锈铁
D. 不锈钢
【单选题】
DK-1型制动机电空位故障不能继续运行时,可停车后转( )操纵。(1.0分)
A. 空气位
B. 电空位
C. 中立位
D. 缓解位
【单选题】
DK-1型空气制动阀手柄置制动位,作用管压力由0升至280kPa的时间不大于( )S。
【单选题】
DK-1型制动机紧急放风阀的作用是:在紧急制动作用时使列车管压力迅速排出,同时通过本身电器动作接通电路,是相应继电器动作来( )。(1.0分)
A. 切断列车管供风风源
B. 产生增压作用
C. 使ZDF放风阀迅速排风
D. 局部减压
【单选题】
CCB-II型制动机当总风缸压力低于( )时,IPM接收到MREP压力开关信号,使机车实施制动,不允许机车加载牵引。(1.0分)
A. 250kPa
B. 350kPa
C. 450kPa
D. 550kPa
【单选题】
制动软管须在( )内进行风压试验。(1.0分)
【单选题】
GK型三通阀减速部是根据制动管不同的( ),实现制动机产生不同的制动和缓解作用。(1.0分)
A. 增压速度
B. 充气速度
C. 减压速度
D. 保压时间
推荐试题
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa