相关试题
【多选题】
营业终了,普通柜员尾箱现金实行___万元限额控制,普通柜员日结前必须将超限额现金上交现金柜员,严禁只移交账务不移交实物。
【多选题】
网点领取、上缴款箱发生差错情况时,应立即报告上级领导,查明原因,手工登记 ___备查。
A. 《营业网点一日安全检查记录簿》
B. 《差错事故登记簿》
C. 《营业网点现场巡视记录表》
D. 《款箱(封包)交接重要事项登记簿》
【多选题】
ATM机的新增尾箱操作由___操作
A. 柜员
B. 主办会计
C. 网点负责人
D. 运营管理人
【多选题】
柜员进行尾箱与柜员号进行绑定关系时,一个柜员最多能绑定几个尾箱。___
【多选题】
下列说法正确的有___
A. 营业终了,普通柜员盘点库箱现金无误后上锁上封;现金柜员款箱由现金业务主管和现金柜员共同清点,双人双锁封箱,办理款箱上缴。
B. 营业终了,盘点库箱时遇到账实不符时,应白条抵库。
C. 营业终了,经办柜员应结轧尾箱款项,经会计主管卡大数复核后封箱,遇节假日由临柜人员相互卡大数复核。
D. 营业终了,普通柜员尾箱现金实行5万元限额控制,普通柜员日结前必须将超限额现金上交现金柜员,严禁只移交账务不移交实物。
【多选题】
以下关于款箱管理说法正确的是?___
A. 柜员接收款箱后必须清点核对,确认无误后,再进行现金业务处理,以分清责任。
B. 现金柜员必须及时将超限额的成捆现金上缴总行或缴存同业,营业终了,普通柜员尾箱现金实行5万元限额控制,普通柜员日结前必须将超限额现金上交现金柜员,严禁只移交账务不移交实物。
C. 营业终了经办柜员应结轧尾箱款项,经会计主管卡大数复核后封箱,遇节假日由临柜人员相互卡大数复核。
D. 柜员必须每日对所保管的现金、重要空白凭证进行账实盘点,现金盘点要求每日二次,重要空白凭证日终盘点,确保账实相符。
【多选题】
ATM钞箱由ATM专管员双人管理,装取现钞坚持“____、_____、_______”,钥匙和密码必须分人掌管,定向交接。___
【多选题】
12各网点对须___等都须在《款箱、封包重要事项登记薄》进行登记。
A. 留库
B. 移库
C. 临时性寄库
D. 日常出入库库箱
【多选题】
我行核心系统产品号的长度统一设置为___位。
【多选题】
内部账号的开立,是由客户号___开立的。
A. 666666666
B. 777777777
C. 888888888
D. 999999999
【多选题】
我行活期产品的顺序号段为___
A. 00001~39999
B. 40000~69999
C. 70000~99999
【多选题】
我行核心系统客户号长度( )位,客户账号长度___位。
A. 10,15
B. 9,15
C. 10,16
D. 9,16
【多选题】
我行核心系统产品号的长度统一设置为___位,第1位代表(),第5位代表( )。
A. 5 业务大类 产品序号
B. 5 业务大类 币种
C. 5 业务细类 产品序号
D. 6 业务细类 币种
【多选题】
我行客户号的长度统一设置为___位,其中首位1代表()。
A. 9 老客户
B. 9 新客户
C. 10 老客户
D. 10 新客户
【多选题】
我行账号的长度统一设置为___位,其中第10位代表()。
A. 15 业务类型
B. 15 顺序号
C. 16 业务类型
D. 16 顺序号
【多选题】
以下哪个产品号表示的是对公活期业务?___
A. 12010
B. 21120
C. 40140
D. 50160
【多选题】
第1位是2,代表业务大类为___
A. 对私活期
B. 对公活期
C. 内部活期
D. 对私定期
【多选题】
我行定期产品的顺序号段为___
A. 00001~39999
B. 40000~69999
C. 70000~99999
【多选题】
我行核心系统产品分类正确的是 ___
A. 1对私活期
B. 2对公活期
C. 3对私定期;
D. 4对公定期
【多选题】
我行客户账号第10位代表业务类型,包括___
A. 个人活期
B. 对公活期
C. 个人定期
D. 对公定期
E. 个人贷款
F. 对公贷款
【多选题】
个人现金柜台跨行转账5万元以上,手续费按___收取,最高收费()元。
A. 0.03% 50
B. 0.3% 30
C. 0.05% 50
D. 0.5% 30
【多选题】
客户丢失两张支票,金额分别为3000元和20000元,前来我行办理支票挂失手续,柜员共需收取手续费___元
A. 50元
B. 46元
C. 25元
D. 23元
【多选题】
下列哪笔手续费收取有误___
A. 个人跨行柜台转账汇款,8万元收取10元手续费。
B. 个人跨行柜台转账汇款,28万元收取50元手续费。
C. 对公跨行柜台转账汇款,18万元收取15元手续费。
D. 对公跨行柜台转账汇款,150万元收取30元手续费。
【多选题】
印鉴挂失为客户预留银行印鉴章遗失办理挂失,收费多少? ___
A. 10元
B. 20元
C. 30元
D. 50元
【多选题】
根据服务的性质、特点和市场竞争状况,我行服务价格分别实行,以下哪项不是___
A. 政府指导价
B. 政府定价
C. 市场调节价
D. 我行自主定价
【多选题】
个人跨行柜台转账汇款手续费,每笔0.2万元以下(含0.2万元),收费为___元。
【多选题】
对公跨行柜台转账汇款手续费,每笔10万到50万(含50万元),收费___元。
【多选题】
个人客户签发一份银行汇票手续费需收取___元:
A. 0
B. 1.2
C. 1.4
D. 1.8
【多选题】
某个人客户未在我行开立结算账户,到我行柜台办理汇款业务,要求一次性汇款人民币23000元,按照规定,柜员需收取___元手续费。
A. 15
B. 50
C. 115
D. 200
【多选题】
绍兴银行服务收费支付结算类为客户(个人或对公客户)预留银行印鉴章办理变更,我行服务价收费标准 ___
A. 10元/次
B. 20元/次
C. 30元/次
D. 40 元/次
【多选题】
我行受客户委托,通过转账方式,将其员工的薪金收入在约定的时间划转到员工在我行开立的银行卡或活期储蓄存折账户我行服务价收费标准___
A. 暂免
B. 0.2元/笔
C. 0.5元/笔
D. 0.8元/笔
【多选题】
兰花公务卡违约金为最低还款额未还清部分的___,最低收()元,最高收()元?
A. 0.5‰;5 ; 500
B. 1‰;10;100
C. 5%;5; 500
D. 10%;10 ; 100
【多选题】
保管箱凿箱手续费为___
A. 200元/次
B. 500元/次
C. 800元/次
D. 1000元/次
【多选题】
兰花公务卡、兰花借记IC卡挂失手续费分别为___
A. 10元 10元
B. 10元 15元
C. 20元 10元
D. 20元 5元
【多选题】
发出委托收款邮电费___
A. 1元
B. 21.5元
C. 22.5元
D. 暂免
【多选题】
客户签发一份银行本票手续费需收取___元
A. 0
B. 0.8
C. 1.4
D. 1.8
【多选题】
客户购买一张银行支票的工本费和手续费共需收取___元
A. 0
B. 0.8
C. 1.4
D. 1.8
【多选题】
下列说法正确的有___
A. 对公印鉴变更 10元/次
B. 补制对账单 跨年10元/次
C. 对公印鉴挂失 50元/次
D. 企业存款证明书 100元/笔
【多选题】
利率管理应当遵循的原则,不符的是___
A. 合规性
B. 效益性
C. 竞争性
D. 公开性
【多选题】
以下不属于全行利率工作实行的管理体制___
A. 统一指导
B. 分级管理
C. 差别授权
D. 集中管理
推荐试题
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别