【判断题】
为保证假币实物安全,查询人或查询代理人持假币实物申请查询的,应予以封存,并在纸币实物上加盖印章
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
要识别真假人民币,首先要知道各种假币的特征
【判断题】
银行业机构柜台如使用通过两次进钞分别完成鉴伪和清分操作的现金处理设备(业内称作“一口半清分机”),需严格采用两种模式进钞的操作流程
【判断题】
银行业机构应规范使用钞票处理设备,确保设备各项功能正常运行保设备各项功能正常运行
【判断题】
银行业机构支付的10元及以上面额必须经过机械清分
【判断题】
银行业金融机构反假货币联络会议召集人由国务院反假货币联席会议办公室主任担任
【判断题】
银行业金融机构临柜人员对收入现金进行手工挑剔、鉴伪后付出的行为是办理业务的必要步骤,属于手工清分范围
【判断题】
中国人民银行授权的鉴定机构拒绝受理持有人、金融机构提出的人民币真伪鉴定申请的,中国人民银行可对该授权的鉴定机构处以1千元以上5万元以下罚款
【判断题】
中国人民银行应当将纪念币的主题、面额、图案、材质、式样、规格、发行数量、发行时等予以公告
【判断题】
中国人民银行应该在纪念币发行公告发布前将纪念币支付给金融机构
【判断题】
自2005版第五套人民币开始,我国对印制人民币使用的印版、油墨、工艺、原材料进行了统一
【判断题】
2005版第五套人民币100元的个别假币的安全线是抄造在纸张中的
【判断题】
按照《银行业金融机构存取现金业务管理办法》的规定,开办行迁址的,申请行无需重新向人民银行分支机构提出开办存取现金业务申请
【判断题】
变造的货币是指仿照真币的图案、形状、色彩等,采用各种手段制作的假币
【判断题】
《中国人民银行办公厅关于做好2014年下阶段反假货币工作的通知》(银办发[2014]113号)要求,各银行业金融机构应提高对假币敏感信息重要性的认识,建立健全敏感信息内部反应机制和外部报送机制
【判断题】
《假币收缴凭证》一式二联,第一联由收缴单位留存,第二联交被收缴人
【判断题】
能辨别面额,票面剩余四分之三(含四分之三),其图案、文字能按原样连接的残缺、污损人民币,金融机构应向持有人按原面额的一半兑换
【判断题】
迄今为止流通时间最长的一套人民币是第三套人民币
【判断题】
在冠字号码查询业务中,查询受理单位接受查询人或查询代理人的申请后,应通过冠字号码管理信息系统或后台追溯现金来源查询,在规定的截止日前,向查询人或查询代理人反馈查询结果
【判断题】
“假币”印章为长方型印章,印章上半部分刻“假币”字样
【判断题】
金融机构现金管理部门应将清分中心发现的假币随同《银行金融机构现金清分中心发现假币收缴单》的电子和纸质文档,一并解缴到当地人民银行分支机构
【判断题】
金融机构必须确保2014年内全面实现在用存取款一体机付出现钞的冠字号码可查询
【判断题】
根据《人民币鉴别仪通用技术条件》(GB_16999--2010),B级点验钞机纸币任意一面鉴别一次定为鉴别一次
【判断题】
流通钞票受到磨损后,凹印触感会有所降低
【判断题】
银行业金融机构在反假货币工作中发现新的造假手段,应迅速将该信息按照一定格式上报
【判断题】
金融机构按照《银行业金融机构现金清分中心发现假币处置工作规程》的要求,建立长效工作机制,制定实施细则
【判断题】
商业银行应将残缺污损人民币上缴中国人民银行
【判断题】
“假币”印章应盖在假外币正面水印窗位置
【判断题】
存取款一体机未加装冠字号码记录模块的,不得开启循环功能
【判断题】
金融机构有发现假币而不收缴的,由中国人民银行给予警告、罚款
【判断题】
假币鉴定专用章采用蓝色油墨,加盖在货币真伪鉴定书中“鉴定结果”栏的右下方
【判断题】
《中国人民银行办公厅关于做好2014年下阶段反假货币工作的通知》(银办发[2014]113号)要求,各银行业金融机构应及时向人民银行当地分支机构报告相关敏感信息
【判断题】
所有商业银行营业网点和人民银行及其分支机构与可以向“假币”持有人开具假币没收收据
【判断题】
金融机构现金清分中心假币实物的保管人员与《假币代保管登记簿》保管人员可以互相兼任
【判断题】
《中国人民银行假币收缴、鉴定管理办法》自2004年7月1日起施行
【判断题】
金融机构现金清分中心解缴到人民银行的假币需要将伪造和变造分开封装
【判断题】
中国人民银行各分支机构在复点清分金融机构解缴的回笼款时发现假人民币,应经鉴定后予以没收,向解缴单位开具《假币没收收据》,并要求其补足等额人民币回笼款
【判断题】
持有人对金融机构作出的有关收缴或鉴定假币的具体行政内容有异议,可在收到《假币收缴凭证》或《货币真伪鉴定书》之日起90个工作日内向直接监管该金融机构的中国人民银行分支机构申倩行政复议,或依法提起行政诉讼
【判断题】
第四套人民币50元券使用的是毛泽东头像水印
【判断题】
已建成冠字号码查询系统的金融机构应于每个工作日营业结束后,将辖区内各分支机构当日记录储存的冠字号码信息集中到当地市分行或省行统一管理
推荐试题
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule