刷题
导入试题
【单选题】
2021年末全省农信社不良贷款占比整体控制在___以内。
A. 3%
B. 5%
C. 7%
D. 10%
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
新增贷款重点投向“三农”、脱贫攻坚、___领域。
A. 民营和小微企业
B. 大型企业
C. 中型企业
D. 中大型企业
【单选题】
新增贷款重点关注___,做到实质不合规的贷款坚决不放,没有把握收回的贷款坚决不放。
A. 借款人主体资格
B. 担保人主体资格
C. 第一还款来源
D. 第二还款来源
【单选题】
问题大查摆中,信贷从业人员要结合自身岗位查摆制度执行不到位、___等问题
A. 落实监管要求不到位
B. 职责落实不到位
C. 信贷管理漏洞与缺位
D. 信贷质量管控不到位
【单选题】
关联贷款中,对于实际用款人积极配合的,追加___有效资产作为贷款抵质押担保,并按照集中度监管规定,制定贷款逐步压降计划。
A. 名义用款人
B. 第三人
C. 实际用款人
D. 名义用款人和实际用款人
【单选题】
虚假贷款能够还原借款主体的,按照___进行整改;
A. 还原主体
B. 逐步压缩
C. 法律途径
D. 协商
【单选题】
对于房地产行业贷款,已经超过监管规定的行社___发放新增房地产行业贷款,并逐步压降存量余额达到监管规定。
A. 不得
B. 备案通过后
C. 可以
D. 按5%的增幅
【单选题】
对于过度集中发放的贷款,要采取___、补充贷款第二还款来源等方式缓释贷款风险。
A. 提前收回
B. 分期还款
C. 补充抵质押物
D. 起诉
【单选题】
对于担保圈(链)贷款,要建立监测台账,确定担保圈(链)___和关键节点,综合运用多种措施拆圈解链。
A. 所有客户
B. 少数客户
C. 核心客户
D. 非核心客户
【单选题】
问题尚未暴露的贷款,对于风险当前可控的贷款,办理续贷___,进一步降低贷款风险,并逐步压缩存量余额,降低风险敞口,适时退出。
A. 按10%压缩存量
B. 按20%压缩存量
C. 按5%压缩存量
D. 应补充第二还款来源
【单选题】
各省辖市农信办(农商银行)对本市农信社系统信贷资产质量集中攻坚负(),各市县行社对本行社信贷资产质量集中攻坚负___责任。
A. 主体责任、总责
B. 主体责任、主体责任
C. 总责、总责
D. 总责、主体责任
【单选题】
坚持回归本源、专注主业、服务实体经济不动摇,坚持支农支小不动摇,坚持服务县域、___不动摇,确保各项信贷政策、业务规划高度契合落实中央重大决策部署和省委省政府工作要求
A. 服务社区
B. 服务乡村
C. 服务农村
D. 服务三农
【单选题】
建立信贷制度___,对出台的信贷制度进行合规性、可行性审查和评价,对制度存在的缺陷和不足,及时修订完善。
A. 备案机制
B. 评价机制
C. 审查机制
D. 评议机制
【单选题】
展期贷款最高分为___
A. 不良类
B. 次级类
C. 关注类
D. 可疑类
【单选题】
贷款逾期后要立即采取催收措施,对催收无效继续劣变形成不良的贷款要提起诉讼,对未履行生效法律文书的被执行人要纳入___
A. 申请强制执行名单
B. 本行黑名单
C. 省联社黑名单
D. 失信被执行人名单。
【单选题】
严禁利用空壳公司承接不良贷款,严禁将正常和___贷款与不良贷款一起打包处置或附带回购协议打包处置不良贷款
A. 关注类
B. 利息逾期
C. 本金逾期
D. 展期
【单选题】
严禁个人消费贷款用于生产经营、投资以及用于___或偿还购房借款。
A. 购房
B. 购车
C. 大宗消费品
D. 旅游
【单选题】
新增单户100万元以上个人贷款或单户1000万元以上对公贷款在切实落实第一还款来源基础上,应有能够覆盖___且易变现抵质押物作为担保。
A. 贷款本金
B. 贷款利息
C. 贷款本息
D. 贷款罚息
【单选题】
凡发现客户提供虚假资料的,不得接受客户新的融资申请,要下调客户信用等级,___授信,收回存量贷款。
A. 增加
B. 减少
C. 终止
D. 冻结
【单选题】
把党的领导贯穿于业务经营全过程,将党委研究讨论作为董(理)事会决策重大信贷事项的___
A. 必经程序
B. 决定程序
C. 前置程序
D. 后置程序
【单选题】
全面实施客户经理___,按照“择优汰劣”原则,严格客户经理准入条件,
A. 持证上岗制度
B. 考试准入制度
C. 备案登记制度
D. 试用转正制度
【单选题】
党委会的研究讨论作为大额贷款管理和重大信贷审议事项的___,切实加强对信贷资产质量的管理,防控化解信贷风险。
A. 前置程序
B. 后置程序
C. 必经程序
D. 选择程序
【单选题】
个人单户100万元以下新增贷款到期未收回且逾期超过3个月的,由___负责对有关责任人员进行责任追究。
A. 省联社
B. 省辖市农信办
C. 市县行社
D. 各支行
【单选题】
各类信贷业务严格按照流程从___的渠道进行办理,杜绝暗箱操作,杜绝关系贷款、人情贷款,确保信贷业务的办理能够得到内外部的有效监督。
A. 公开统一
B. 公开透明
C. 公正公平
D. 公正透明
【单选题】
经营机制转换中,中端审查审批环节的操作要求是___
A. 加强前端和后端客户服务
B. 推动标准化建设
C. 缩短链条,做简做优。
D. 线上化操作
【多选题】
贷款人应建立借款人合理的收入偿债比例控制机制,结合借款人收入、___、()、()、()等因素,合理确定贷款金额和期限,控制借款人每期还款额不超过其还款能力。
A. 负债
B. 支出
C. 贷款用途
D. 担保情况
【多选题】
贷款审查应对贷款调查内容的合法性、合理性、准确性进行全面审查,重点关注___等。
A. 调查人的尽职情况
B. 借款人的偿还能力、诚信状况
C. 担保情况、抵(质)押比率、风险程度
D. 审查人的尽职情况
【多选题】
下列哪项属于可以采取借款人自主支付方式的内容___
A. 借款人无法事先确定具体交易对象且金额不超过三十万元人民币的;
B. 贷款资金用于消费且金额不超过五十万元人民币的
C. 借款人交易对象不具备条件有效使用非现金结算方式的;
D. 贷款资金用于生产经营且金额不超过五十万元人民币的;
【多选题】
贷款人受理的固定资产贷款申请应具备以下条件___
A. 借款人依法经工商行政管理机关或主管机关核准登记;
B. 借款人信用状况良好,无重大不良记录;
C. 借款人为新设项目法人的,其控股股东应有良好的信用状况,无重大不良记录;
D. 国家对拟投资项目有投资主体资格和经营资质要求的,符合其要求;符合国家有关投资项目资本金制度的规定;
E. 借款用途及还款来源明确、合法;项目符合国家的产业、土地、环保等相关政策,并按规定履行了固定资产投资项目的合法管理程序;
【多选题】
贷款人应落实具体的责任部门和岗位,履行尽职调查并形成书面报告。尽职调查的主要内容包括___
A. 借款人及项目发起人等相关关系人的情况;
B. 贷款项目的情况;
C. 贷款担保情况;
【多选题】
固定资产贷款的贷后管理应包括以下内容___
A. 固定资产贷款的支付方式是否符合规定
B. 借款人和项目发起人的履约情况及信用状况
C. 项目的建设和运营情况
D. 宏观经济变化和市场波动情况
E. 贷款担保的变动情况
【多选题】
项目融资贷款需具备哪些特征___
A. 贷款用途通常是用于建造一个或一组大型生产装置、基础设施、房地产项目或其他项目,包括对在建或已建项目的再融资;
B. 借款人通常是为建设、经营该项目或为该项目融资而专门组建的企事业法人,包括主要从事该项目建设、经营或融资的既有企事业法人;
C. 还款资金来源主要依赖该项目产生的销售收入、补贴收入或其他收入,一般不具备其他还款来源。
D. 借款人应当具备对所从事项目的风险识别和管理能力,配备业务开展所需要的专业人员,建立完善的操作流程和风险管理机制。
【多选题】
全力整治信贷重点领域风险。重点对___等存在的问题进行全面梳理,建立整改台账,明确整改责任人,开展集中整治。
A. 关联贷款
B. 虚假贷款
C. 限控行业贷款
D. 扶贫贷款
【多选题】
开展信贷资产质量集中攻坚包括哪些措施?___
A. 开展信贷制度大学习
B. 开展从严治贷大讨论
C. 开展信贷问题大查摆
D. 开展信贷工作大整顿
【多选题】
信贷制度大学习主要学习哪些内容___
A. 各项法律法规、监管规定
B. 保险政策
C. 省联社各项信贷制度、操作流程、信贷违规处罚办法。
D. 信贷政策
【多选题】
信贷工作大整顿,包括___
A. 整顿学习
B. 整顿队伍
C. 整顿纪律
D. 整顿业务
【多选题】
关联贷款主要包括___
A. 垒大户贷款、化整为零贷款、集合使用借名贷款
B. 大股东贷款
C. “公司+农户”贷款
D. 多头贷款等。
【多选题】
虚假贷款主要包括___
A. 空壳企业贷款
B. 假冒名贷款、虚假担保贷款、虚假用途贷款、虚假按揭贷款、虚假资料贷款、
C. 垒大户贷款
D. 虚假盘活贷款、虚假置换贷款等。
【多选题】
限控行业贷款主要包括___
A. 产能过剩行业贷款
B. 空壳企业贷款
C. 房地产行业贷款等
D. 多头贷款
【多选题】
推进从严治贷要做到三个坚决不办是指___
A. 触犯政策和监管红线的业务坚决不办
B. 违规违法的业务坚决不办
C. 实质性风险无法把控的业务坚决不办
D. 有重大不良信用的坚决不办
【多选题】
从严治贷要求严格审查审批。围绕___四个核心问题开展审查,对授信合理性、业务合规性、担保可靠性、资料完备性进行严格审查,
A. 借款干什么
B. 用多少合理
C. 拿什么来还
D. 还不了怎么办
推荐试题
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别
【单选题】
2.刀开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
3.行程开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用