【判断题】
银监会对于银行业金融机构违反规定从事未经批准或者未备案的业务活动的追究方式与对银行业金融机构未经批准设立分支机构的处罚追究的方式相同。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
撤销是银监会依法保护银行业金融机构经营安全、合法的一项预防性拯救措施。
【判断题】
监管部门有权根据监管需要和银行业金融机构经营状况,随时向银行业金融机构提出谈话要求,进行监管谈话意味着银行业金融机构存在经营问题。
【判断题】
商业银行破产清算时,在支付清算费用、所欠职工工资和劳动保险费用后,应当优先支付个人储蓄存款的本金和利息。
【判断题】
设立城市商业银行的注册资本最低限额为十亿元人民币。
【判断题】
在宣传品、出版物或者其他商品上非法使用人民币图样的,由公安机关处十五日以下拘留、一万元以下罚款。
【判断题】
洗钱的处置阶段是指通过复杂的多种、多层的金融交易,将犯罪收益与来源分开,并进行最大程度的分散,以掩饰线索和隐藏身份。
【判断题】
《银行业监督管理法》主要针对银行的监督管理,因此信托投资公司、财务公司等不适用本法的规定。
【判断题】
银行业金融机构拒绝或者阻碍非现场监管,提供虚假的或者隐瞒重要事实的报表、报告等文件、资料的,由银监会责令改正,并处二十万元以上五十万元以下罚款。
【判断题】
接管期限届满前,被接管的商业银行已恢复正常经营能力的接管终止。
【判断题】
审慎经营规则是银监会对银行业金融机构提出的核心经营目标。
【判断题】
印制、发售代币票券,以代替人民币在市场上流通的,中国人民银行应当责令停止违法行为,并处十万元以下罚款。
【判断题】
1984年1月1日起,中国人民银行所承担的工商信贷和储蓄业务职能移交至中国工商银行,中国人民银行开始专门行使中央银行的职能,标志着我国开始实行与商品经济发展相适应的中央银行体系。
【判断题】
银监会及其派出机构遵循公平、公开、公正和效率的原则对银行业实施监督管理。
【判断题】
商业银行在中华人民共和国境内不得从事信托投资和证券经营业务,不得向非银行金融机构和企业投资,但国家另有规定的除外。
【判断题】
某银行为达到一个月吸收存款过亿元的指标,可以采取"一万送床单"的吸收存款方式。
【判断题】
《商业银行法》规定商业银行的资本充足率不得低于8%。
【判断题】
商业银行向关系人发放担保贷款的条件可以优于其他贷款人同类贷款的条件。
【单选题】
在电化区段,职工不准登上机车车辆_____通过线路。___
A. 车辆顶部、翻越车顶
B. 尾部、车辆顶部
C. 前部、翻越车顶
【单选题】
绕行停留车辆时,其距离应不少于____米,并注意车辆动态和邻线开来的列车。___
【单选题】
除调车人员以外严禁______运行中的机车、车辆,以车代步。___
【单选题】
用号角通知作业人员列车已经接近为。___
A. 一长一短声
B. 一长两短声
C. 一长三短声
【单选题】
现场作业,防护员应站立在距作业人群。___
A. 10—20米
B. 5—10米
C. 5—20米
【单选题】
作业场所要保证平坦、整洁,及时清除积水、杂草、冰、雪,抓好______措施的落实。___
【单选题】
发现牵引供电设备故障、断线及其部件损坏,或发现牵引供电设备上挂有线头、绳索、塑料布或脱落搭接等异物,均不得与之接触。接触网导线折断下垂搭在车辆上或其它物品与接触网接触时,作业人员不要进行处理,应保持____米以上距离,同时对现场进行防护,并及时通知有关人员查处。___
【判断题】
禁止在茶炉、锅炉室内放置可燃物品,人离必须加锁。
【判断题】
严禁摸黑、湿手开关电器设备,防止触电。
【判断题】
电气化区段停站不冲洗车皮,严禁攀登车顶作业。
【判断题】
不准飞乘飞降,抢上抢下,不准从翻板上直接上下。
【判断题】
行车指挥人员要以身作则,正确指挥,善于管理,对职工违章违纪行为要敢于批评,坚决制止。
【判断题】
用沙土灭火时,在距接触网2米以上时,可不停电。
【判断题】
为有效预防和控制车辆伤害事故,确保在站场、区间作业人员的人身安全,设置现场防护人员。
【判断题】
上、下机车车辆时,应选好车梯子,紧握扶手,禁止背对机车车辆上、下。
【填空题】
1.现场防护员必须与作业人员必须执行___制度。
【填空题】
2.禁止在线路上或侵入机车、车辆限界内接打___。
【填空题】
3.除调车人员以外严禁___运行中的机车、车辆,严禁___。
【填空题】
5.横越停有机车、车辆的线路,必须按规定___米以外___通过,注意邻线来车。
推荐试题
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程
【单选题】
“互联网十制造”是实施《中国制造2025》的重要措施。以下对“互联网十制造”主要特征的叙述中,不正确的是___。
A. :数字技术得到普遍应用,设计和研发实现协同与共享
B. :通过系统集成,打通整个制造系统的数据流、信息流
C. :企业生产将从以用户为中心向以产品为中心转型
D. :企业、产品和用户通过网络平台实现联接和交互