【判断题】
当出现基金投资人坚持要购买产品风险超越其风险承受能力的基金产品的情况,我行不能给予购买。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
若基金存在冻结情况,则基金份额冻结的部分不接受赎回申请,若投资人赎回数量大于该投资人账户中可赎回的基金数量,该赎回无效。
【判断题】
投资者赎回基金须于基金管理公司开放日的交易时间办理申请手续。投资人在开放日交易时间之外的申请,作为赎回申请的预受理,其基金份额申购价格按照下个开放日价格。
【判断题】
机构投资者要求被授权人持企业法人代码证、单位营业执照副本、机构法人对基金业务经办人员的授权书原件、法人代表身份证、被授权人身份证等原件到我行任一网点网点办理签约。
【判断题】
当出现基金投资人坚持要购买产品风险超越其风险承受能力的基金产品的情况,我行要求基金投资人填写《绍兴银行客户风险声明书》进行书面确认,基金销售系统提示基金投资人再次输入密码予以确认。
【判断题】
个人基金业务均需投资人本人凭有效身份证件和凭证办理。
【判断题】
系统自动对机构客户默认的风险评级为高,因此机构客户不必进行风险承受能力测试和风险承受能力评估卷的填写。
【判断题】
如果客户不想进行定期定额的投资,不可以手动的关闭该定投类协议实现。
【判断题】
基金销售业务包括两类:账户类业务与交易类业务。
【判断题】
保管箱内所存物品如因自然原因变质或损坏,或遇不可抗力灾害而导致损失的,本行概不负责。
【判断题】
保管箱业务是租箱人为安全保存贵重物品和重要凭证,向我行租用保管箱进行保管的一项业务。
【判断题】
符合本操作规程的单位和个人均可向本行申请租用保管箱,申请租用保管箱须办理书面申请手续,并遵守相关租约。
【判断题】
目前暂未专门设置保险箱押金科目,故押金金额收取在26200601手机银行卡押金科目下。
【判断题】
目前只有个人客户可向本行申请租用保管箱,申请租用保管箱须办理书面申请手续,并遵守相关租约、说明。
【判断题】
外国人及港、澳、台同胞租用保管箱的,需由大陆居民提供担保。
【判断题】
保管箱到租赁期限届满日为止,如租户既未办理续租手续,又未办理退租手续的,租赁期限届满次日开始自动转为续租一期。
【判断题】
本行保护租用人的合法正当权益,遵循“存取自由,方便快捷,安全保密”的原则。
【判断题】
凡具有完全民事行为能力的中国公民、港澳台同胞和外国人,依法成立并可在中国境内从事经营活动的国内外公司、企业、其他经济组织、社会团体、外国或国际组织驻华机构,均可在本行办理保管箱租赁业务
【判断题】
保管箱内可存放金饰珠宝、字画古董等贵重物品以及存单、存折、屋契、债权、股票等有价证券、党和国家秘密文件和资料
【判断题】
A.保管箱租用人可带其随同人员一起进入保管箱库内
【判断题】
B.保管箱业务租金收取,可不复印客户身份证件
【判断题】
必要时银行可要求保险箱租用人开箱检查。
【判断题】
保管箱的租用时间按期计算,分为一年期、二年期、三年期、五年期共四个租期,不足一个租期按一期计。
【判断题】
保管箱业务中凿箱手续费为500元/次。
【判断题】
挂失费(印鉴、密码、钥匙)手续费为每项10元。
【判断题】
已经具有小额信用循环贷款的兰花卡不能进行银银关系的建立。
【判断题】
B、成功建立银银关系操作顺序为“4501代开兴业结算账户”-“4502建立对应关关系”-“4503客户签约”。
【判断题】
C、银银转出是将客户银行账户资金转入证券资金账户的业务。
【判断题】
签约客户所持有的证券资金账号户名必须与我行开立的个人银行活期结算账户的户名一致,且该业务必须由本人至柜台办理。
【判断题】
对于在我行建立签约关系的客户,银银转账的服务时间为周一至周五(股市交易日)9:00分至15:00分。
【判断题】
客户若申请办理银银销户业务,柜员需告知客户先去证券公司,由证券公司发起销户,银行无法发起相关业务。
【判断题】
一个身份证号可以在兴业银行开多个结算账号。
【判断题】
“银银转入”、“银银转出”中“出”和“入”都是针对银行而言的。
【判断题】
理财产品质押贷款承办行向个金部报备资料包括:质押贷款合同、放款通知书、开具理财产品权利凭证委托书、理财权利凭证确认书、理财产品止付联系函。
【判断题】
保管箱到租期期满日为止,如租用既未办理续租手续,又未办理退租手续的,租期期满次日开始自动转为续租一期。
【判断题】
当潜在理财客户出现购买信号,却又犹豫不决或者成交意图不是十分强烈的时候,客户经理不可假定准客户已经同意购买。
【判断题】
一般来说,浮动收益证券与固定收益证券相比,风险更高,期望收益也更高。
【判断题】
理财客户经理在与客户沟通时,需了解的信息包括事实性信息、判断性信息和推理性信息。
推荐试题
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.