相关试题
【多选题】
主要体现在国际储备政策之上的国际收支调节政策是___
A. 货币政策
B. 财政政策
C. 汇率政策
D. 融资政策
【多选题】
“丁伯根原则”表明要想实现n个目标,至少需要的工具数量是___
A. 一个
B. n个
C. n+1个
D. n-1个
【多选题】
根据财政政策和货币政策搭配理论,当经济处于通胀和逆差并存时,应当采用___
A. 紧缩的财政政策和紧缩的货币政策
B. 宽松的财政政策和紧缩的货币政策
C. 紧缩的财政政策和宽松的货币政策
D. 宽松的财政政策和宽松的货币政策
【多选题】
根据支出增减政策和支出转换政策的搭配理论,当经济处于失业增加和国际收支逆差并存时,应当采取___
A. 紧缩的财政政策或货币政策与本币升值
B. 紧缩的财政政策或货币政策与本币贬值
C. 宽松的财政政策或货币政策与本币升值
D. 宽松的财政政策或货币政策与本币贬值
【多选题】
蒙代尔—弗莱明模型的前提假设不包括___
A. 弹性价格
B. 供给弹性无穷大
C. 汇率由国际收支决定
D. 风险中性
【多选题】
蒙代尔—弗莱明模型中假设的资本流动情况是___
A. 资本完全流动
B. 资本不完全流动
C. 资本完全不流动
D. 不确定
【多选题】
关于费雪方程式,下列正确的是___
A. 物价与货币流通数量成正比
B. 物价与货币流通数量成反比
C. 物价与货币流通成反比
D. 物价与货向流通数量成正比
E. 物价与商品量成反比
【多选题】
以下引起社会的基础货币增加的是___
A. 中央银行对国外的资产增加
B. 中央银行对国外的资产减少
C. 中央银行对财政的资产增加
D. 中央银行对财政的资产减少
E. 中央银行对商业银行的债权增加
【多选题】
在弗里德曼的货币需求函数中,与货币需求成正比的有___
A. 流动性效用的大小
B. 恒久收入
C. 债券利率
D. 预期的非固定收益的报酬率
E. 非人力财富占总财富的比率
【多选题】
凯恩斯认为,人们持有货币的动机有___
A. 交易性动机
B. 储藏性动机
C. 预防性动机
D. 投机性动机
E. 投资性动机
【多选题】
商业银行创造存款货币要受___因素制约
A. 法定存款准备金率
B. 超额存款准备金率
C. 现金漏损率
D. 定期存款准备金率
E. 存款准备金
【多选题】
目前,我国货币层次划分中,M2包括___
A. 居民储蓄存款
B. 证券公司客户保证金
C. 同业存放
D. 短期国库券
E. 大额可转让存单
【多选题】
以下关于基础货币的论述,正确的是___
A. 基础货币是存款货币得以数倍扩张的源泉所在
B. 基础货币是由中央银行、金融机构和社会公众的行为共同决定的
C. 基础货币指的是流通在银行体系内的资金,因此不包括现金漏损的数量
D. 派生倍数是货币供给和基础货币之比
E. 基础货币指的是参加存款创造的货币
【多选题】
在决定货币供应量及其增减变化的因素中,可由中央银行操纵的有___
A. 公众持有现金对活期存款的比例
B. 基础货币
C. 法定活期存款准备金率
D. 超额存款准备金率
E. 法定定期存款准备金率
【多选题】
凯恩斯的货币需求理论认为___
A. 货币具有交换媒介与价值储藏的功能
B. 在有效需求不足的情况下,扩大货币供应量,可以降低利率,增加就业和产出
C. 在流动性陷阱出现时,增加货币供给,不能降低利率,货币政策失效
D. 货币供给可以通过利率的变化调节货币需求
E. 人们的心理因素是影响货币需求的重要原因
【多选题】
下列经济因素中,使商业银行持有较高超额准备金的是___
A. 市场利率上升
B. 经济处于上升周期
C. 央行贷款条件苛刻
D. 同业拆借不便
【多选题】
目前各国中央银行经常采用的操作目标主要有___
A. 利率
B. 汇率
C. 基础货币
D. 货币供应量
E. 存款准备金
【多选题】
下列选项属于公开市场业务优点的是___
A. 中央银行处于主动地位
B. 中央银行可以连续性地买卖
C. 调控效果很大,对经济社会具有震动性影响
D. 调控效果比较温和
E. 不仅影响利率水平,还能影响利率结构
【多选题】
在下列货币政策操作中,引起货币供应量减少的是___
A. 提高法定存款准备金率
B. 提高再贴现率
C. 降低再贴现率
D. 中央银行卖出证券
E. 中央银行买入证券
【多选题】
货币政策时滞可以分为___三个部分
A. 内部时滞
B. 其他时滞
C. 中间时滞
D. 外生时滞
E. 外部时滞
【多选题】
宏观调控中必须要注意___等各项政策的搭配
A. 货币政策
B. 财政政策
C. 产业政策
D. 外贸政策
E. 收入分配政策
【多选题】
“紧”的货币政策是指___
A. 提高利率
B. 降低利率
C. 放松信贷
D. 收紧信贷
【多选题】
货币政策的基本特征包括___
A. 货币政策是宏观经济政策
B. 货币政策是调节社会总需求的政策
C. 货币政策是直接调控政策
D. 货币政策主要是间接调控政策
E. 货币政策是长期连续的经济政策
【多选题】
货币政策的最终目标一般包括___
A. 稳定物价的目标
B. 充分就业的目标
C. 经济增长的目标
D. 提高收入的目标
E. 平衡国际收支的目标
【多选题】
衡量物价变化的指标主要有___
A. 批发物价指数
B. 消费者物价指数
C. 国民生产总值平减指数
D. 零售价格指数
E. 生产费用指数
【多选题】
通常认为操作目标和中间目标的选取要符合三个标准,这三个标准是___
A. 可控性
B. 可测性
C. 无关性
D. 操作性
E. 相关性
【判断题】
在价值形式的变迁过程中,扩大的价值形式的出现是质的飞跃
【判断题】
在货币层次控制重点确定原则中,可控性是可测性的前提
【判断题】
在现代信用货币制度中,币材的因素最为重要
【判断题】
在不同的货币形态中,只有流通性最强的货币才能成为流通的中介
【判断题】
作为价值尺度,货币解决了在商品和劳务之间进行价值比价比较的难题。
【判断题】
信用货币价值稳定的基础是中央银行提供给社会公众的信用。
【判断题】
信用货币发挥价值储藏手段的职能可以提高储蓄的效率。
【判断题】
信用货币自身没有价值,所以不是财富的组成部分。
【判断题】
我国货币的发行量决定于央行拥有的黄金外汇储备量。
【判断题】
某企业将自己的产品赊销给消费者,则该企业与消费者之间产生了商业信用关系。
【判断题】
商业汇票是由出票人委托付款人于指定的日期无条件支付一定金额给持票人的票据。
【判断题】
由于我国规定企业发行有价证券时必须由专业的投资管理机构进行发行辅导,并最终由其进行承销,也即是中介是必须 的和重要的,所以,证券信用是间接信用。
推荐试题
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware