刷题
导入试题
【判断题】
申请办理国内信用证开证业务时,对开证金额保证金以外部分,还需提供本行认可的质押、抵押或第三方保证等担保。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
对经常办理国内信用证业务的申请人,可根据需要核定其在一定期限内的最高开证限额,并办理最高额担保。在限额内办理国内信用证开证可不再逐笔办理担保,保证金可按规定比例一次性收取,也可逐笔收取。
A. 对
B. 错
【判断题】
国内信用证是指开证行依照开证申请人的申请开出的,凭符合信用证条款的单据进行支付的付款承诺。
A. 对
B. 错
【判断题】
国内信用证可以支取现金。
A. 对
B. 错
【判断题】
国内信用证的开立、修改、通知、委托收款、议付、付款等流程以中文或外文办理。
A. 对
B. 错
【判断题】
国内信用证的开证保证金应在正式开证前存入本行指定的保证金账户专户管理、专款专用。
A. 对
B. 错
【判断题】
远期国内证无需承兑后就能付款闭卷。
A. 对
B. 错
【判断题】
国内信用证以人民币或外币计价。
A. 对
B. 错
【判断题】
电子同城业务收取手续费
A. 对
B. 错
【判断题】
提出同城实时贷记转账支票及进账单做录入柜员传票
A. 对
B. 错
【判断题】
提出同城普通贷记转账支票及进账单做录入柜员传票
A. 对
B. 错
【判断题】
省同城普通借记申请可操作城商行汇票付款
A. 对
B. 错
【判断题】
电子同城业务50万金额以上使用大额支付系统
A. 对
B. 错
【判断题】
电子同城行名行号查询必须通过5310,其他方式查询有可能出错
A. 对
B. 错
【判断题】
电子同城业务冲账需要授权中心授权
A. 对
B. 错
【判断题】
电子同城业务轧账时间为20:00
A. 对
B. 错
【判断题】
同城支票提示付款有效期为自出票之日15日。
A. 对
B. 错
【判断题】
提出同城实时贷记,≥1万需主办会计临柜授权。
A. 对
B. 错
【判断题】
票据背面无“委托收款”提示字样也可受理。超过提示付款期限提示付款的,持票人开户行不予受理,付款人不予付款。
A. 对
B. 错
【判断题】
提出同城普通贷记冲账,无需填写特殊业务审批单。
A. 对
B. 错
【判断题】
提出同城普通借记冲账,无需填写特殊业务审批单。
A. 对
B. 错
【判断题】
网点每天下午下班前(16点以后),用A4纸可打印同城普通借记回执清单与网点柜员专夹保管的待收妥凭证进行核对。
A. 对
B. 错
【判断题】
为了确保提入同城普通借记业务能在人行规定时间内进行回执,系统后台开启定时任务,次日15点50分会将应回执未回执的借记业务一律作退票处理,退票原因统一为其他。
A. 对
B. 错
【判断题】
只有提出同城普通借记业务且对方行尚未回执前可以发起止付申请。
A. 对
B. 错
【判断题】
根据人行文件规定,自2018年8月1日起,付款银行收到同城普通借记业务时,法定工作日11:00前收到的,回执信息最迟返回时间为当日16:00之前;法定工作日11:00后收到的,回执信息最迟返回时间为下一个法定工作日11:00之前。
A. 对
B. 错
【判断题】
小额普通借记业务回执是指出票人开户银行通过大额支付系统返还给持票人开户银行。
A. 对
B. 错
【判断题】
小额普通借记业务处理支票业务的金额上限由中国人民银行规定,并可根据管理需要进行调整,超过金额上限的支票,影像交换系统拒绝受理。目前最高受理金额为100万。
A. 对
B. 错
【判断题】
通过小额普通借记业务处理的支票影像信息具有与原实物支票同等的支付效力,出票人开户银行收到影像交换系统提交的支票影像信息,应视同实物支票提示付款。
A. 对
B. 错
【判断题】
支票业务回执是指出票人开户银行通过大额支付系统返还给持票人开户银行,对支票影像信息提示付款表明同意付款或拒绝付款的确认结果。
A. 对
B. 错
【判断题】
小额普通借记业务处理中凭证审查无误的,在第一联进账单上加盖业务公章后作为回单退还给持票人。
A. 对
B. 错
【判断题】
小额普通借记业务录入时,交易要素输完后,需采集支票正面图像和进账单图像,采集上传成功后可通过图像预览进行查看。
A. 对
B. 错
【判断题】
小额普通借记业务录入时,票据号码要求输入16位号码,不足会自动以0补齐。
A. 对
B. 错
【判断题】
小额普通借记业务交易金额上限为50万元,超过会报错误提示“金额不允许超过50万”。
A. 对
B. 错
【判断题】
小额普通借记业务对应的录入待处理任务,操作方式可以选择修改、重新提交、删除。允许修改字段有付款人账号、付款人名称、金额、接收行行号、出票日期、票据号码。
A. 对
B. 错
【判断题】
系统受到普通借记来账业务时会自动验印,若验印结果自动通过且客户账户余额足够,则自动付款结束任务。
A. 对
B. 错
【判断题】
小额普通借记业务在回执处理选择同意时,输入的付款人账号需和原票据要素一致,不一致无法提交。
A. 对
B. 错
【判断题】
小额普通借记业务在回执处理选择同意时,输入票据号码必须和原票据要素一致,不一致无法提交。
A. 对
B. 错
【判断题】
小额普通借记业务录入被背书人数系统默认显示。
A. 对
B. 错
【判断题】
普通借记业务回执处理选择同意时,必须验印,可以是自动通过或人工通过,都能提交成功。
A. 对
B. 错
【判断题】
通过5703小额普通借记录入交易发起提出业务时,应严把支票受理审核关,对要素不全或有瑕疵的支票应及时退还持票人补全或纠正。没有银行机构代码、超过提示付款期以及其他不符合要求的支票不得受理。
A. 对
B. 错
【判断题】
小额支票影像截留业务中,对于支付密码等非强制要素,如果支票上有记载,务必按照支票上的实际记载信息正确录入并换人复核,确保电子清算信息与支票信息完全相符。
A. 对
B. 错
推荐试题
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用