【判断题】
在接到协助冻结、扣划存款通知书后,可先扣划应当协助执行的款项用于收贷收息。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
协助查询、冻结、扣划是指本行分支机构依法协助有权机关查询、冻结、扣划单位或个人在本行存款(不含理财)及存款资料的行为。
【判断题】
冻结交易打印一联通用空白凭证作主凭证,执法人员工作证件复印件、相关法律文书等资料应专夹保管以备查。
【判断题】
同一条受托支付信息多次操作,系统会报错
【判断题】
贷款资金流向应与申请贷款的资金用途相符,不得挪作他用,借款人应按期偿还本息。
【判断题】
贷款到期后可由借款人使用支付凭证柜面归还,也可以通过批处理每天扣收欠款。
【判断题】
针对不同的担保方式,客户经理所提供资料也不同。若采取保证的方式,则提供保证合同(包括一般保证合同或最高额保证合同),做传票附件,若采取抵押的方式,则提供抵押合同(一般抵押合同或最高额抵押合同),做传票附件。
【判断题】
受托支付支付确认成功后,不允许贷款发放冲账。
【判断题】
如果贷款发放的入账账号是新开户(新开账户未满三天),贷款资金只能在新开户止付三天期满后对外支付。
【判断题】
等额本金按月、按季;等额本息按月、按季的还款方式和自定义还款方式的贷款,其放款日须与贷款到期日的年月日的“日”前后一致。
【判断题】
如果贷款发放的入账账号是新开户(新开账户未满三天),那么当天可以发放,已取消三天止付限制
【判断题】
受托支付支付确认交易是将受托支付金额作解除止付处理,如当天发现错误,可经主办会计授权后进行撤销,隔日不可冲账。
【判断题】
还款方式为自动,是指委托贷款还款后本金会自动返还到委托人结算账户。
【判断题】
如果住房类贷款产品需要将贷款转给第三方,贷款发放时候入账账号直接输第三方结算账号即可。
【判断题】
还款类型为提前还本时,需要输入“提前还款本金”金额,输入的金额应大于等于剩余本金。
【判断题】
同一贷款账号下,如果当天先做过提前还本,之后再做提前结清,系统会报错,需将提前还本冲账后再处理提前结清。
【判断题】
委托贷款在发放前,需先从委托人结算账户将金额转入委托存款账户。贷款发放后将贷款金额从委托存款账户转到委托存款账户下的镜像账户。
【判断题】
我行只作为参加行的银团贷款如果代理行划回的金额与我行计提利息金额不符,先做利息调整再做还款。
【判断题】
贷款“入账账号”字段账户状态和账户属性判断,如果状态为正常、今日开户的,属性为正常、止付-部分止付、止付-存款证明、中间业务等属性可以进行放款,账户属性为止付、冻结、资金池则不允许放款。
【判断题】
还款类型为提前还本时,需要输入“提前还款本金”金额,输入的金额应小于剩余本金。
【判断题】
如果贷款发放的入账账号是当日开户,那么在发放的贷款将无法入账。
【判断题】
归还垫款时,还款类型只能选归还欠款或逾期结清。
【判断题】
现转标识可选现金或转账,还款账号可输入结算账号,内部账号,不能输入科目号,还款账号户名回显,不可修改。
【判断题】
住房类贷款产品需要将贷款转给第三方的,贷款发放时不可以直接将第三方结算账号作为贷款的入账账号。
【判断题】
等额本金按月、按季;等额本息按月、按季的还款方式和自定义还款方式的贷款,其放款日须与贷款到期日的年月日的“日”前后一致。如:2016年1月12日--2026年1月12日。
【判断题】
贷款抵质押物品按信贷部门提供的金额(认定价值)入账,纳入“704抵(质)押品”表外科目核算,记账员和保管员分离,并按规定入库保管。
【判断题】
柜员在核心系统进入3002交易码发放贷款。
【判断题】
还款类型为归还欠款且需要调整欠款顺序时无需会计主管授权。
【判断题】
如果贷款是由总行放款中心审批的,无需对放款通知书、借款借据、贷款人受托支付通知书(或计划清单、实际支付清单)的合规性审查。
【判断题】
贷款抵质押物品按信贷部门提供的金额(认定价值)入账,纳入“704抵(质)押品”表外科目核算,记账员和保管员可以同时兼任,并按规定入库保管。
【判断题】
贷款发放交易成功后需到6205进行贷款短信签约,系统不会联动交易。
【判断题】
若贷款是由总行放款中心审批的,只需对放款通知书、借款借据、提款申请书、贷款合同的合规性审查。
【判断题】
贷款到期或逾期,在客户未主动出具还款支付结算凭证的情况下,会计部门填制特种转账凭证进行还贷。
【判断题】
垫款发放后按月结息,结息日为次月的对应发放日。
【判断题】
银承垫款发放时,需要信贷部门提供《绍兴银行垫款发放通知书》,然后在核心系统里发放垫款。
【判断题】
垫款发放后按月结息,结息日为下月的20日。
【判断题】
垫款贷款在银行中被列为不良资产,属于逾期贷款一类,按年利率18%计收罚息。
【判断题】
垫款贷款属于逾期贷款,还款顺序产品层默认为先还本金,再还利息。
【判断题】
垫款发放后按季结息,结息日为次月的对应发放日。
推荐试题
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.