【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行应合理提高信用贷款在小微企业贷款中的占比,研发小微企业中长期固定资产贷款产品,开发以信用信息共享为基础的“信易贷”等金融产品,满足多样化金融需求。___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行适当延长建档立卡贫困户贷款期限,综合确定贷款额度,妥善办理无还本续贷。___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行应完善知识产权等无形资产质押融资制度。依法合规对“双创”类企业提供投融资支持。___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行应加强与全国农业信贷担保体系合作,推广“银担通”等合作模式。___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行要按月生成普惠金融事业部核算报表,精确核算普惠金融有贷户的成本收益。___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行要形成有效的普惠金融贷款尽职免责制度,细化专门的尽职免责办法,在普惠金融业务出现风险后,经过有关工作流程,有充分证据表明授信部门及工作人员根据有关法律法规、规章和规范性文件以及银行内部管理制度勤勉尽职地履行了职责的,应免除其全部或部分责任。 ___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行要进一步加强普惠金融服务内部激励,安排专项激励费用,与普惠金融客户质量、业务量、专营机构建设情况等挂钩。___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行强化通过互联网发放普惠金融贷款的风险管理,采取有效手段,对贷款资金使用、借款人信用情况、生产经营变化等进行跟踪检查和监控分析,确保资金用途合法合规,信贷资产风险可控。 ___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行要充分运用大数据、云计算等手段,提高客户信息获取和分析能力。 ___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行要增强对接外部信息的主动性,运用全国信用信息共享平台、金融信用信息基础数据库以及信用服务机构提供的相关信息,缓解银企信息不对称问题。___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行要拓展线上服务渠道。要强化线上、线下渠道融合,弥补物理网点覆盖不足,拓展服务功能和服务半径。 ___
【单选题】
根据《中国银保监会关于进一步提高大型银行普惠金融事业部服务能力的通知》的规定,大型银行要进一步完善普惠金融组织体系。要在总行和一级分行层面进一步明确普惠金融事业部的职责,厘清与其他部门之间的责任分工,并在全部一级支行设立垂直机构。 ___
【单选题】
根据《中国银保监会、财政部、中国人民银行、国务院扶贫办关于进一步规范和完善扶贫小额信贷管理的通知》的规定,扶贫小额信贷及续贷、展期在脱贫攻坚期内各项政策保持不变。___
【单选题】
根据《中国银保监会、财政部、中国人民银行、国务院扶贫办关于进一步规范和完善扶贫小额信贷管理的通知》的规定,扶贫小额信贷主要支持建档立卡贫困户(不含已脱贫的贫困户)。___
【单选题】
根据《中国银保监会、财政部、中国人民银行、国务院扶贫办关于进一步规范和完善扶贫小额信贷管理的通知》的规定,扶贫小额信贷可以集中用于政府融资性平台、生产经营企业等。___
【单选题】
根据《中国银保监会、财政部、中国人民银行、国务院扶贫办关于进一步规范和完善扶贫小额信贷管理的通知》的规定,对贫困户不知情、不享受扶贫小额信贷优惠政策或贫困户只享受利息、分红而不参与生产劳动的情况,经办银行要切实加强贷后管理,密切跟踪,科学评估,到期收回贷款或转为产业扶贫贷款。___
【单选题】
根据《关于创新发展扶贫小额信贷的指导意见》的规定,采取“以社带户、以企带村”的方式,组织贫困农户参与扶贫特色优势产业建设,拓宽建档立卡贫困户获得贷款的途径。___
【单选题】
根据《关于创新发展扶贫小额信贷的指导意见》的规定,扶贫部门要做好组织动员、政策协调工作,发挥村两委、驻村工作队、妇联等组织的作用,做好建立信用档案、项目咨询、项目指导、宣传培训等方面的工作。___
【单选题】
根据《关于创新发展扶贫小额信贷的指导意见》的规定,各地可统筹安排财政扶贫资金,对符合条件的贷款户给予贴息支持,贴息利率不超过贷款基础利率(上一年度贷款基础利率报价平均利率平均值)___
【单选题】
根据《关于创新发展扶贫小额信贷的指导意见》的规定,探索建立县、乡(镇)、村三级联动的扶贫小额信贷服务平台,为建档立卡贫困户提供信用评级、建立信用档案、贷款发放等信贷服务。___
【单选题】
根据《关于促进扶贫小额信贷健康发展的通知》的规定,对已脱贫的建档立卡贫困户,在脱贫攻坚期内保持扶贫小额信贷支持政策不变,力度不减。___
【单选题】
根据《关于促进扶贫小额信贷健康发展的通知》的规定,对贷款到期仍有用款需求的贫困户,脱贫攻坚期内,均须偿还本金后方可办理续贷业务。___
【单选题】
根据《关于促进扶贫小额信贷健康发展的通知》的规定,对于贫困户参与的产业扶贫项目,要做到对建档立卡贫困户和产业项目双调查。___
【单选题】
根据《关于促进扶贫小额信贷健康发展的通知》的规定,对确因非主观因素不能到期偿还贷款的贫困户,帮助贫困户协调办理续贷。___
【单选题】
根据《中国银监会关于银行业金融机构大力发展农村小额贷款业务的指导意见》的规定,尽量缩短贷款办理时间,原则上农户老客户小额贷款应在三天内办结,新客户小额贷款应在一周内办结,农村小企业贷款应在一周内办结,个别新企业也应在二周内告具结果。___
【单选题】
根据《中国银监会关于银行业金融机构大力发展农村小额贷款业务的指导意见》的规定,根据信用贷款和联保贷款的特点,根据“先申请—后授信—再用信”的程序,建立农村小额贷款授信管理制度以及操作流程。___
【单选题】
根据《中国人民银行 国务院扶贫办 银监会 证监会 保监会关于加强金融精准扶贫信息对接共享工作的指导意见》规定,各单位应承担对接信息的安全保密责任,严格遵守国家法律法规及信息保密规章制度,遵循“谁编制数据,谁负责信息披露”的原则。___
【单选题】
根据《中国银监会关于银行业金融机构积极投入脱贫攻坚战的指导意见》的规定,力争实现贫困地区各项贷款增速高于所在省(区、市)当年农户贷款平均增速。___
【单选题】
根据《中国银监会关于银行业金融机构积极投入脱贫攻坚战的指导意见》的规定,对贫困户开展逐户走访和信用评定,采取“多次核定、随用随贷、余额控制、周转使用”的管理办法。___
【单选题】
根据《中国银监会关于银行业金融机构积极投入脱贫攻坚战的指导意见》的规定,支持在贫困地区规模化集约化发起设立村镇银行,因地制宜采取“一行多县”等方式,在攻坚期内基本覆盖贫困县___
【单选题】
根据《中国银监会关于银行业金融机构积极投入脱贫攻坚战的指导意见》的规定,合理运用财政扶贫专项资金的补贴、贴息、担保和补偿功能,完善风险缓释机制。___
【单选题】
根据《中国银监会办公厅关于推进基础金融服务“村村通”的指导意见》的规定,根据“业务简易、组织简化、成本不限”原则,在行政村内设立简易便民服务点,灵活安排和设定营业时间。___
【单选题】
根据《中国银监会办公厅关于推进基础金融服务“村村通”的指导意见》的规定,根据行政村金融服务需求,银行业金融机构要主动送服务、送资金、送产品、送知识进村屯入社区。___
【单选题】
根据《法人金融机构洗钱和恐怖融资风险管理指引(试行)规定,反洗钱岗位专职人员应当具有_______年以上金融行业从业经历。___
【单选题】
根据《法人金融机构洗钱和恐怖融资风险管理指引(试行)》规定,法人金融机构高级管理层承担洗钱风险管理的_______责任。___
【单选题】
根据《法人金融机构洗钱和恐怖融资风险管理指引(试行)》规定,牵头负责洗钱风险管理工作的高级管理人员应当具备较强的履职能力和职业操守,同时具有_____年以上合规或风险管理工作经历,或者具有所在行业_____年以上工作经历。___
A. 五;十
B. 三; 十
C. 五; 八
D. 一; 五
【单选题】
根据《法人金融机构洗钱和恐怖融资风险管理指引(试行)》规定,法人金融机构监事会承担洗钱风险管理的_______责任。___
【单选题】
根据《法人金融机构洗钱和恐怖融资风险管理指引(试行)》规定,在监控名单调整时,法人金融机构应当立即对存量客户以及上溯_______年内的交易开展回溯调查,并按规定提交可疑交易报告。___
【单选题】
根据《法人金融机构洗钱和恐怖融资风险管理指引(试行)》规定,下列______等情形下,法人金融机构应详细审查保存客户资料和交易,及时更新客户身份信息,确保当前进行的交易与客户身份背景相匹配。___
A. 业务关系建立前
B. 业务关系建立时
C. 业务关系存续期间
D. 业务关系终止后
【单选题】
根据《互联网金融从业机构反洗钱和反恐怖融资管理办法(试行)》规定,从业机构应当建立_______的反洗钱和反恐怖融资合规管理政策,对其境内外附属机构、分支机构、事业部的反洗钱和反恐怖融资工作实施_______管理。___
A. 统一 统一
B. 统一 差异
C. 差异 统一
D. 差异 差异
【单选题】
根据《金融机构大额交易和可疑交易报告管理办法》规定,非自然人客户银行账户与其他的银行账户发生当曰单笔或者累计交易人民币_____万元以上(含)、外币等值_____万美元以上(含)的款项划转,金融机构应当向中国反洗钱监测分析中心报送大额交易报告。___
A. 5 1
B. 50 10
C. 100 10
D. 200 20
推荐试题
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.