刷题
导入试题
【单选题】
金融机构收缴假币时,发现假人民币20张(枚)以上,应当立即报告___,并提供有关线索。
A. 中国人民银行   
B. 当地工商管理部门  
C. 当地公安机关
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
下列哪些开支不能计入成本___:
A. 被没收的财物所支付的滞纳金、罚款等;
B. 国家法律.法规规定的各种费用;
C. 购买固定资产所交纳的税金
【单选题】
定期储蓄在存期内遇利率调整按___利率计算。
A. 开户日   
B. 支取日 
C. 调整日
【单选题】
每次查库完毕,应将查库情况详细登记查库登记簿,并由检查人员和___共同签章,以备查考。
A. 内勤主任         
B. 出纳主管人员
C. 本单位负责人   
D. 管库员
【单选题】
村镇银行综合柜员交接,由___监交。
A. 主管柜员  
B. 事后监督人员;
C. 柜员         
D. 本社主任
【单选题】
办理带磁条的一本(卡)通存折支取业务,账(卡)号必须由___读入。
A. 读卡器   
B. 密码器   
C. 手工录入
【单选题】
各种储蓄存款利率由人民银行制订,按___利率挂牌公告。
A. 日
B. 月
C. 年   
D. 根据需要而定
【单选题】
定活两便储蓄存款存期满一年或超过一年时,计息应按一年期整存整取利率___计算。
A. 打六折         
B. 打七折         
C. 打七五折         
D. 全额
【单选题】
口头挂失有效天数为___
A. 5天      
B. 7天        
C. 10天      
D. 半天
【单选题】
下列证件可作为储蓄存款实名证件使用的是___
A. 学生证   
B. 机动车驾驶证   
C. 身份证复印件  
D. 护照
【单选题】
可作为质押物的凭证有___
A. 整存整取定期储蓄存单              
B. 活期储蓄存折
C. 零存整取定期储蓄存折                
D. 股金证
【单选题】
活期储蓄存款结息日为___
A. 每季末月20日
B. 6月30日
C. 7月1日
D. 每季末月月底
【单选题】
一日一次性超过(  )元以上的现金支付或一日数次累计超过(  )元以上的现金支付,金融机构内部要逐笔登记。___
A. 3万   5万      
B. 5万  5万      
C. 3万   5万      
D. 5万  10万
【单选题】
村镇银行会计科目划分为___科目。
A. 现金和转账   
B. 表内和表外   
C. 基本和特定   
D. 原始和记账
【单选题】
‰是以下___利率的简写形式。
A. 年     
B. 季   
C. 月   
D. 日
【单选题】
5万元(含)以上的销户,若代理人代理销户时,必须提供___的身份证件。
A. 存款人  
B. 代理人   
C. 存款人和代理人            
D. 均不需要
【单选题】
储户凭未到期的定期储蓄存款存单到___办理部分提前支取手续。
A. 本网点     
B. 任一联网网点            
C. 辖属内网点            
D. 玉川村镇银行所属网点
【单选题】
我国支付结算制度是以___为主体的。
A. “三票一卡”     
B. 汇兑方式      
C. 托收承付方式      
D. 委托收款方式
【单选题】
会计凭证的处理指从___开始,经过审查和传递,到()为止的全过程。
A. 申领凭证、使用凭证               
B. 填制凭证、保管凭证
C. 受理或填制凭证、装订保管       
D. 装订保管、受理凭证
【单选题】
村镇银行的支行是___。
A. 法人机构      
B. 非法人机构      
C. 独立核算机构      
D. 综合机构
【单选题】
存折存款是指 ___ 。
A. 活期存款      
B. 储蓄存款      
C. 定期存款      
D. 担保存款
【单选题】
甲某2012年3月1日存入1000元,原定存期1年,假设存入时该档次存款月利率为千分之9,甲于2012年12月1日支取该笔存款,如果支取日挂牌公告的活期储蓄存款利率为千分之3,应付利息为___。
A. 81元         
B. 54元         
C. 27元           
D. 17元
【单选题】
存款实名制自什么时间施行___
A. 2000年4月1日               
B. 2000年5月1日      
C. 2001年4月1日               
D. 2000年7月1日
【单选题】
关于支付结算应遵循的原则中不含___
A. 诚实               
B. 谁的钱进谁的帐,归谁支配      
C. 银行不垫款         
D. 银行负责强制扣款
【单选题】
会计档案保管期限分为___ 和()两种。
A. 永久、长期        
B. 永久、定期  
C. 短期、永久        
D. 短期、长期
【单选题】
假币收缴单位应当自收到鉴定单位通知之日起___个工作日内,将需要鉴定的货币送达鉴定单位。
A. 7     
B. 5     
C. 1     
D. 2
【单选题】
存款人的工资、奖金等现金的支取只能通过哪个账户___支取。
A. 一般存款账户         
B. 临时存款账户
C. 专用存款账户         
D. 基本存款账户
【单选题】
国家纸币从性质上讲是一种凭___流通的货币。
A. 国家信用        
B. 国家强制力        
C. 国家法律      
D. 国家财物抵押
【单选题】
自公历1月1日至12月31日为一个___ 。
A. 记账年度        
B. 业务年度         
C. 会计年度        
D. 检查年度
【单选题】
___存款的风险较大,流动性强,利率低。
A. 定期              
B. 活期              
C. 定活两便         
D. 储蓄
【单选题】
支付结算的一个任务是合理组织支付结算和___办理支付结算。
A. 灵活、迅速、方便           
B. 准确、及时、安全
C. 快速、大量、便捷           
D. 合法、灵活、安全
【单选题】
银行的会计凭证分为___  和 () 两大类。
A. 基本凭证、专业凭证         
B. 基本凭证、特定凭证
C. 专业凭证、普通凭证         
D. 普通凭证、特殊凭证
【单选题】
残缺币全额兑换是指票面残缺不超过___ ,其余部分的图案、文字能照原样连接。
A. 四分之一         
B. 五分之一        
C. 六分之一         
D. 三分之一
【单选题】
下列___不属于会计核算质量“五无”。
A. 帐务无积压      
B. 结算无事故      
C. 贷款无遗失        
D. 计息无差错
【单选题】
下列资金中,存款人不能申请开立专用存款账户的是___。
A. 基本建设的资金        
B. 日常开支
C. 更新改载的资金        
D. 特定用途,需要专户管理的资金
【单选题】
基础货币是指___ 。
A. 现金           
B. 商业银行在中央银行的准备金存款
C. 发行基金        
D. 现金及商业银行在中央银行的准备金存款
【单选题】
按照“为存款人保密”的原则,下列说法不正确的是___ 。
A. 银行一般不得向任何单位和个人泄露存款人的姓名、地址等
B. 司法部门或公安部门若因审理案件的需要,可以翻阅银行账簿
C. 若为审理案件需要,县(地区)以上银行可通知开户银行为司法部门或公安部门提供有关资料
D. 商业银行有权拒绝任何单位或个人对个人储蓄存款的查询、冻结
【单选题】
下面不属永久保管的会计档案有___
A. 决算报表   
B. 挂失申请书     
C. 股金帐      
D. 分户帐     
E. 开销户登记簿   
【单选题】
会计账簿是以___为依据,系统地记录一切交易、事项、业务活动及资金、财产变化情况的重要簿籍。
A. 账户      
B. 会计凭证      
C. 会计报表      
D. 会计主体
【单选题】
汇票上未记载付款日期的___。
A. 见票即付         
B. 票据无效
C. 付款人可以决定任意时间付款          
D. 见票后1 个月内必须付款
【单选题】
下列有关票据金额的说法,不正确的是___。
A. 票据金额不得更改                           
B. 票据金额以中文大写和数码同时记载
C. 票据金额大、小写不一致时,以大写为准        
D. 票据金额大、小写不一致的,票据无效
推荐试题
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用