【单选题】
根据《中国银监会 国家发展和改革委员会关于印发能效信贷指引的通知》规定,银行业金融机构对达不到国家能效标准的固定资产和项目融资需求,在有利于当地相关产业发展的前提下,可进行适当放宽,予以支持。___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
根据《中国银监会 国家发展和改革委员会关于印发能效信贷指引的通知》规定,银行业金融机构应根据国家有关规定,综合考虑项目风险水平、借款人财务状况以及自身风险承受能力等因素,合理测算项目投资、融资需求,根据预测现金流和投资回收期合理确定贷款金额、贷款期限和还款计划。___
【单选题】
根据《中国银监会 国家发展和改革委员会关于印发能效信贷指引的通知》规定,对于合同能源管理贷款要素的确定,还应合理评估合同能源管理项目的节能收益,充分考虑节能效果的季节性差异等,而合同能源管理合同中规定的借款人节能收益分享比例、期限和支付方式等因素并不在要素范围。___
【单选题】
根据《中国银监会 国家发展和改革委员会关于印发能效信贷指引的通知》规定,合同能源管理信贷以借款人在节能服务合同项下的收款权利进行质押的,银行业金融机构应严格、规范办理应收账款质押登记手续。___
【单选题】
根据《中国银监会 国家发展和改革委员会关于印发能效信贷指引的通知》规定,银行业金融机构应将能效信贷理念贯穿于其他信贷业务之中,积极开展贷前能效筛查,主动向客户提供与改善能效有关的增值服务。___
【单选题】
根据《中国银监会 发展改革委 工业和信息化部关于钢铁煤炭行业化解过剩产能金融债权债务问题的若干意见》规定,对违规新增钢铁煤炭产能项目,银行业金融机构一律不得提供信贷支持;对违规新增产能的企业,停止贷款。___
【单选题】
根据《中国银监会 发展改革委 工业和信息化部关于钢铁煤炭行业化解过剩产能金融债权债务问题的若干意见》规定,银行业金融机构在落实政策过程中,应加强与发展改革部门、工业和信息化部门等主管部门、行业协会和钢铁煤炭企业的沟通与交流,解决银政、银企信息不对称问题。___
【单选题】
根据《中国银监会 发展改革委 工业和信息化部关于钢铁煤炭行业化解过剩产能金融债权债务问题的若干意见》规定,对技术设备先进、产品有竞争力、有市场的钢铁煤炭企业,银行业金融机构应当根据风险可控、商业可持续原则,继续给予信贷支持,不得抽贷、压贷、断贷。___
【单选题】
根据《中国银监会办公厅关于支持产业结构调整和化解产能过剩的指导意见》规定,对于产能过剩行业的企业,严禁银行业金融机构提供任何形式的新增授信支持。 ___
【单选题】
根据《中国银监会办公厅关于支持产业结构调整和化解产能过剩的指导意见》规定,支持企业兼并重组,根据商业可持续原则开展并购贷款业务,合理确定并购贷款利率,并购贷款期限可延长至10年。___
【单选题】
根据《中国银监会办公厅关于做好银行业金融机构债权人委员会有关工作的通知》规定,债委会不能由债权银行业金融机构自行发起成立,必须通过监管部门审批同意才能成立。___
【单选题】
根据《中国银监会办公厅关于做好银行业金融机构债权人委员会有关工作的通知》规定,债务企业的所有债权银行业金融机构和银监会批准设立的其他金融机构原则上应当参加债委会;非银监会批准设立的金融机构债权人,也可以加入债委会。___
【单选题】
根据《中国银监会办公厅关于做好银行业金融机构债权人委员会有关工作的通知》,债委会重大事项的确定,原则上应当符合以下条件之一即可:一是经占金融债权总金额的三分之二以上比例债委会成员同意;二是经全体债委会成员过半数同意。___
【单选题】
根据《中国银监会办公厅关于做好银行业金融机构债权人委员会有关工作的通知》规定,银行业监督管理机构依法对债权人委员会和金融债务重组等工作进行指导、协调和监督。___
【单选题】
根据《关于进一步做好“僵尸企业”和去产能企业债务处置工作的通知》规定,允许相关企业和债权人根据借款合同约定、“僵尸企业”和去产能企业资产或营业收入在企业集团中的占比、所去产能在企业集团总产能中的占比等情况自主协商一致后从企业集团的统借债务中清分出实际用于“僵尸企业”及去产能企业的债务,清分后的统借债务可纳入“僵尸企业”和去产能企业的直接债务中一同处置。___
【单选题】
根据《关于进一步做好“僵尸企业”和去产能企业债务处置工作的通知》规定,企业和债权人可自主协商一致后解除或部分解除企业集团或第三方的担保责任,其中为去产能企业担保形成的担保债务可根据所去产能在去产能企业集团总产能中的占比等因素予以部分解除。___
【单选题】
根据《关于进一步做好“僵尸企业”和去产能企业债务处置工作的通知》规定,仍有部分营业价值的“僵尸企业”、资产负债率高于合理水平且偿付到期债务有困难的去产能企业,鼓励通过金融债权人委员会机制与债权人自主协商开展资产、债务和业务重组。___
【单选题】
根据《关于构建绿色金融体系的指导意见》,绿色金融体系是指通过绿色信贷、绿色债券、绿色股票指数和相关产品、绿色发展基金、绿色保险、碳金融等金融工具和相关政策支持经济向绿色化转型的制度安排。___
【单选题】
根据《关于构建绿色金融体系的指导意见》规定,银行业金融机构在开展信贷资产质量压力测试时,可以将环境和社会风险作为重要的影响因素,并在资产配置和内部定价中予以充分考虑。___
【单选题】
根据《关于构建绿色金融体系的指导意见》规定,支持和引导银行等金融机构建立符合绿色企业和项目特点的信贷管理制度,优化授信审批流程,不论遇到任何问题和困难,均要坚定不移地加大对绿色企业和项目支持力度,坚决取消不合理收费,降低绿色信贷成本。___
【单选题】
根据《商业银行资本管理办法》的规定,商业银行的总资本包括核心一级资本、其他一级资本和二级资本。___
【单选题】
某银行通过增资扩股渠道持有基金公司30%的股权,并通过入股协议获得该基金公司董事会席位(共9席)中5位董事的任免权。根据《商业银行资本管理办法》的规定,在计算并表资本充足率时,该银行将基金公司纳入并表范围的做法是否正确?___
【单选题】
根据《商业银行股权管理暂行办法》规定,商业银行股东可以使用非自有资金入股。___
【单选题】
根据《商业银行股权管理暂行办法》规定,商业银行股东可以委托他人或接受他人委托持有商业银行股权。___
【单选题】
根据《商业银行股权管理暂行办法》规定,商业银行主要股东不得越过董事会和高级管理层直接干预或利用影响力干预商业银行经营管理。___
【单选题】
根据《商业银行股权管理暂行办法》规定,商业银行主要股东应当对其与商业银行和其他关联机构之间董事会成员、监事会成员和高级管理人员的交叉任职进行有效管理,防范利益冲突。___
【单选题】
根据《商业银行股权管理暂行办法》规定,商业银行主要股东可以以发行、管理或通过其他手段控制的金融产品持有该商业银行股份。___
【单选题】
根据《商业银行股权管理暂行办法》规定,商业银行董事长是处理商业银行股权事务的第一责任人,也是处理股权事务的直接责任人。___
【单选题】
根据《商业银行股权管理暂行办法》规定,商业银行董事会应当至少每年对主要股东资质情况、履行承诺事项情况、落实公司章程或协议条款情况以及遵守法律法规、监管规定情况进行评估,并及时将评估报告报送银监会或其派出机构。___
【单选题】
根据《商业银行股权管理暂行办法》规定,商业银行董事会成员在履职过程中未就股权管理方面的违法违规行为提出异议的,最近一次履职评价不得评为称职。___
【单选题】
根据《商业银行股权托管办法》规定,股权托管是指商业银行与托管机构签订服务协议,委托其管理商业银行股东名册,记载股权信息以及代为处理相关股权管理事务。___
【单选题】
根据《商业银行股权托管办法》规定,商业银行选择的股权托管机构应具备完善的信息系统,持续跟踪管理公司股权变动情况。___
【单选题】
根据《商业银行股权托管办法》规定,商业银行选择的托管机构应对处理商业银行股权事务过程中所获取的数据和资料予以保密。___
【单选题】
根据《商业银行股权托管办法》规定,商业银行应当在签订服务协议后,向监管机构及时提交股东名册及其他相关资料。商业银行选择的托管机构,应能够根据服务协议和本办法的要求办理商业银行股东名册的初始登记。___
【单选题】
根据《商业银行股权托管办法》规定,商业银行股权被质押、锁定、冻结的,托管机构应当在股东名册上加以标记。___
【单选题】
根据《商业银行股权托管办法》规定,托管机构在办理商业银行股权信息登记时未尽合理的审查义务,致使商业银行股权信息登记发生重大漏报、瞒报和错报,银保监会或其派出机构可责令商业银行更换托管机构。___
【单选题】
根据《商业银行公司治理指引》规定,股东大会年会应当由董事会在每一会计年度结束后六个月内召集和召开。因特殊情况需延期召开的,应当向银行业监督管理机构报告,并说明延期召开的事由。___
【单选题】
根据《商业银行公司治理指引》规定,商业银行应当在章程中规定,董事会提名委员会、单独或者合计持有商业银行发行的有表决权股份总数1%以上股东,可以向董事会提出独立董事候选人,已经提名董事的股东不得再提名独立董事。___
【单选题】
根据《商业银行公司治理指引》规定,监事的薪酬应当由董事会审议确定。___
【单选题】
根据《商业银行公司治理指引》规定,主要经营指标没有达到监管要求的商业银行,应当严格限定高级管理人员绩效考核结果及其薪酬。___
【单选题】
根据《商业银行公司治理指引》规定,股东获得本行授信的条件可适当优于其他客户同类授信的条件。___
推荐试题
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology