【判断题】
个人客户信息是我行在为客户提供金融服务过程中采集、创建的个人客户资料。个人客户信息主要包括个人客户户名、有效证件类型、有效证件号码、联系地址、联系方式等基本信息。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
个人客户在开立实名制帐户时,会产生客户号,该客户号有且只有一个。
【判断题】
原则上“验证方式” 均应选择“短信验证码验证”,如遇到特殊情况,选择“柜员拔打电话验证”的,需会计主管复核,并由会计主管签字,节假日可由其他柜员复核签字。
【判断题】
居住在中国境内16岁以下的中国公民,应由监护人代理开立个人银行账户,除出具监护人的有效身份证件外,还应同时出具账户使用人的居民身份证或户口簿。
【判断题】
办理个人信息建立时,香港、澳门特别行政区居民,应出具港澳居民往来内地通行证;台湾居民,应出具台湾居民往来大陆通行证或其他有效旅行证件。
【判断题】
柜员在进行联网核查时,核查结果有一项或多项核对不一致,应立即拒绝为客户办理相关业务。
【判断题】
分支行所在市(县)区域外客户的身份证件如不能确切辨认的。不得继续办理业务,并将核查结果明确告知客户,待进一步核查确认后方可继续办理相关业务。
【判断题】
持票人现金支票办理取款业务无需出示身份证件,身份识别仪鉴别(非居民身份证的,视角核对),并摘录身份证件号码
【判断题】
在联网核查中有一项或多项核查结果不一致的,可通过身份识别仪作为辅助进一步验证个人居民身份证的真实性。
【判断题】
同一支行在办理需联网核查业务时,如以前已对其居民身份证进行联网核查且能确认其身份信息尚未发生变化的,可不再对其进行联网核查。
【判断题】
确切判断客户出示的居民身份证为虚假证件的,我行应拒绝为该客户办理相关业务。
【判断题】
水、电、气、煤等公共事业的代缴代扣关系建立以及撤销需要出示身份证件,进行联网核查,并留存身份证件复印件或影印件。
【判断题】
临柜人员发现客户以虚假居民身份证骗取开立银行账户或办理其他银行业务的,应当及时向总行相关部门报告,并及时向公安机关报案.
【判断题】
在办理规定业务时,因网络故障等原因不能正常进行联网核查的,可使用身份证识别仪验证,但应详细登记故障期间办理规定业务的情况,并在排除故障后及时核查。
【判断题】
临柜人员在履行客户身份识别时,发现可疑行为的,应当及时向反洗钱主管部门报告,由反洗钱有关部门汇总后根据相关规定向中国反洗钱监测分析中心、中国人民银行当地分支机构报告。
【判断题】
办理外汇业务、理财业务、基金业务、第三方存管签约、贵金属业务、挂失解挂、账户信息变更、保管箱业务、支付宝卡通、手机银行及网上银行等电子银行业务时需出示身份证件,进行联网核查(非居民身份证的,视角核对),并留存身份证件复印件或影印件的业务。
【判断题】
身份审核是通过通过公安部和人民银行系统平台建立的联网核查公民身份信息系统及身份识别仪核对或查询相关个人的公民身份信息,以验证相关个人的居民身份证所记载的姓名、身份证件号码、照片及签发机关等信息真实的行为。
【判断题】
对于代理现金存款业务,如果代理人因合理理由无法提供被代理人有效身份证件且单笔存款金额达到或超过人民币1万元或外币等值1000美元时要联网核查无需要留复印件。
【判断题】
若个人姓名、公民身份证号码、照片和签发机关中一项或多项核对不一致的,须将核查结果明确告知客户,并通过身份识别仪对客户出示的居民身份证作进一步验证。
【判断题】
工作人员应对联网核查获得的公民身份信息进行保密,非依法律规定,不得向任何单位和个人提供。不得将联网核查获得的公民身份信息用于办理银行业务外的其他目的。
【判断题】
持票人现金支票办理取款业务5万以上需留存身份证件复印件或影印件。
【判断题】
本人及代理自然人客户办理人民币单笔5万元(含)以上或外币等值1万美元(含)以上现金存取款业务的需出示身份证件,进行联网核查,交易中需录入身份证号码。
【判断题】
客户对联网核查结果提出疑问的,应向其出具联网核查后相关居民身份证信息核对不一致的证明,并告知客户可自行到被核查人常住户口所在地公安机关进行核实。
【判断题】
在无法确切判断客户身份证件的真伪情况下给客户办理的业务,之后作了进一步核实,如公安部门反馈结果确认该身份证件属虚假证件,不需要联系客户采取补救措施,但需将有关情况报告人民银行当地分支机构及总行相关部门。
【判断题】
办理其他业务而进行联网核查时,应区别相关业务的业务性质、客户类型、金额大小和风险程度等因素决定是否继续办理,如挂失业务,可继续为该客户办理,再作进一步核实和确认身份。
【判断题】
开户许可证(基本存款账户信息)核准日期不能大于当前日期。
【判断题】
存款人办理异地借款需要可以在异地开立基本存款账户。
【判断题】
客户办理开户时,所提供的相关开户资料复印件均须加盖企业公章。
【判断题】
公司客户新开立账户之前,应建立或完善公司客户信息。
【判断题】
《开立单位银行结算账户申请书》需主管授权并在申请书上签章确认。
【判断题】
目前,我行对公账户开户免收手续费和账户管理费。
【判断题】
已在我行其他网点开立过账户的企业可以不用新建客户号。
【判断题】
开立一般账户必须将开户资料送人民银行待核准。
【判断题】
根据人民银行的规定,营业机构对已领取统一社会信用代码营业执照的组织办理银行账户业务,不再要求其提供税务登记证及组织机构代码证。
【判断题】
开立单位银行人民币结算账户,必须法定代表人或单位负责人直接办理,不可以授权他人办理。
【判断题】
建立公司客户信息、公司客户信息维护和查询交易都需会计主管授权。
【判断题】
公司客户信息维护需要填《变更银行结算账户申请书》
【判断题】
《开立银行结算账户申请书》上需由会计主管签章确认,《变更银行结算账户申请书》不需要。
【判断题】
对公客户信息若在我行其他支行已有建立,开立账户时则延用已建立的客户号开立账户。
【判断题】
经办柜员对存款人的开户申请书填写的事项和提供资料的真实性、完整性、合法性进行认真审查(对非开户企业人员代理开户的,要保持高度警惕,及时与开户单位联系核实。)
【判断题】
账户变更时,《变更银行结算账户申请书》前四行内容为变更前信息,开户许可证核准号为旧的核准号
推荐试题
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1