刷题
导入试题
【单选题】
根据《中国银行业监督管理委员会关于印发<商业银行小企业授信工作尽职指引(试行)>的通知》的规定,商业银行制定的小企业授信政策应体现小企业经营规律、小企业授信业务风险特点,并实行差别化授信管理。___
A. 正确
B. 错误
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
根据《中国银行业监督管理委员会关于印发<商业银行小企业授信工作尽职指引(试行)>的通知》的规定,小企业授信工作人员应在授信业务活动中声明是否为授信申请人的关系人。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于支持商业银行进一步改进小企业金融服务的通知》的规定,鼓励商业银行新设或改造部分分支行为专门从事小企业金融服务的专业分支行或特色分支行。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于支持商业银行进一步改进小企业金融服务的通知》,鼓励和支持商业银行积极通过制度、产品和服务创新支持科技型小型微型企业成长,探索建设符合我国国情的科技支行。___
A. 正确
B. 错误
【单选题】
根据《中国银监会办公厅关于印发提高小微企业信贷服务效率合理压缩获得信贷时间实施方案的通知》,鼓励商业银行对符合相关条件的小微企业客户,探索运用零售业务管理技术,在合理评估风险的前提下,优化小微企业贷款审批政策和流程。___
A. 正确
B. 错误
【单选题】
根据《中国银监会办公厅关于印发提高小微企业信贷服务效率合理压缩获得信贷时间实施方案的通知》的规定,鼓励商业银行为小微企业合理设置流动资金贷款期限,研发适合小微企业的中长期固定资产贷款产品。___
A. 正确
B. 错误
【单选题】
根据《中国银监会办公厅关于印发提高小微企业信贷服务效率合理压缩获得信贷时间实施方案的通知》的规定,商业银行可在风险可控的前提下自主确定小微企业贷款资金支付方式。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于进一步做好小微企业融资服务有关工作的通知》的规定,鼓励银行业金融机构结合自身情况探索建立贷款全流程限时制度,精简耗时环节,对小微企业贷款办理时限作出明确承诺。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于进一步做好小微企业融资服务有关工作的通知》的规定,进一步深化银行和保险公司合作机制,优化小微企业银保合作业务流程,更好发挥保险的增信分险功能。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于进一步做好小微企业融资服务有关工作的通知》的规定,银行业金融机构要认真贯彻落实有关规范经营和服务收费的监管政策法规,严禁在发放小微企业贷款时附加不合理条件。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于进一步做好小微企业融资服务有关工作的通知》的规定,银行业金融机构要在把控风险的前提下,细化小微企业贷款不良容忍度内部管理办法。可根据自身风险偏好、风险管理水平和当地经济金融环境,对各地分支机构设置差异化的不良容忍度目标。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于进一步做好小微企业融资服务有关工作的通知》,银行业金融机构应对符合条件的小微企业加大贷款自主支付和续贷支持力度___
A. 正确
B. 错误
【单选题】
根据人民银行、银保监会等五部门《关于进一步深化小微企业金融服务的意见》的规定,改进宏观审慎评估考核,增加小微企业贷款考核权重,引导金融机构加大对小微企业贷款投放,合理确定并有效降低融资成本。___
A. 正确
B. 错误
【单选题】
根据人民银行、银保监会等五部门《关于进一步深化小微企业金融服务的意见》的规定,在强化信息披露、提高透明度的前提下,支持银行业金融机构发行小微企业贷款资产支持证券。___
A. 正确
B. 错误
【单选题】
根据人民银行、银保监会等五部门《关于进一步深化小微企业金融服务的意见》的规定,鼓励银行业金融机构发行小微企业金融债券,放宽发行条件,加强后续督导,确保募集资金用于向小微企业发放贷款。___
A. 正确
B. 错误
【单选题】
根据人民银行、银保监会等五部门《关于进一步深化小微企业金融服务的意见》的规定,银行业金融机构通过发行小微企业贷款资产支持证券盘活的小微企业存量贷款,在考核小微企业贷款投放时可还原计算。___
A. 正确
B. 错误
【单选题】
根据人民银行、银保监会等五部门《关于进一步深化小微企业金融服务的意见》的规定,银行业金融机构要在分支行行长和领导班子考核中,结合实际充分考虑小微企业金融服务情况。___
A. 正确
B. 错误
【单选题】
根据人民银行、银保监会等五部门《关于进一步深化小微企业金融服务的意见》的规定,鼓励银行业金融机构等资金提供方完善应收账款融资产品制度,优化业务流程,帮助更多小微企业获得应收账款融资。___
A. 正确
B. 错误
【单选题】
根据人民银行、银保监会等五部门《关于进一步深化小微企业金融服务的意见》的规定,完善小微企业信用信息共享机制,鼓励银行等金融机构开发适合小微企业的信用融资产品___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于对银行业小微企业贷款利率实施监测的通知》的规定,各大中型商业银行应根据商业可持续、“保本微利”的原则,结合客户实际风险情况,进一步提升差别化利率定价能力。加强对普惠型小微企业贷款利率的实时监测。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于对银行业小微企业贷款利率实施监测的通知》的规定,成立普惠金融事业部的大中型商业银行要进一步完善成本分摊和收益共享机制,在精确核算的基础上动态调整内部资金转移价格,切实降低小微企业贷款的内部筹资成本。其它银行业金融机构要积极推行小微企业贷款内部资金转移价格优惠措施,提升业务条线和分支机构开展小微企业业务的积极性。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于对银行业小微企业贷款利率实施监测的通知》的规定,对使用政策性银行转贷资金、人民银行支小再贷款发放的普惠型小微企业贷款,以及对享受政府性融资担保公司担保服务的普惠型小微企业贷款,合理控制其利率定价。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于对银行业小微企业贷款利率实施监测的通知》的规定,在落实小微企业不良贷款容忍度监管要求的同时,坚持商业可持续原则,把握好收益和风险的平衡,进一步提升小微企业信贷资产质量水平,降低贷款风险覆盖成本。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会办公厅关于对银行业小微企业贷款利率实施监测的通知》的规定,严格落实相关收费减免政策。严格执行“七不准”“四公开”要求。强化落实“两禁两限”规定,禁止向小微企业贷款收取承诺费、资金管理费,严格限制收取财务顾问费、咨询费。___
A. 正确
B. 错误
【单选题】
根据《关于印发中小企业划型标准规定的通知》,从业人员1000人以下或营业收入40000万元以下的为中小微型工业企业。其中,从业人员300人及以上,且营业收入2000万元及以上的为中型企业;从业人员20人及以上,且营业收入300万元及以上的为小型企业;从业人员20人以下或营业收入300万元以下的为微型企业。___
A. 正确
B. 错误
【单选题】
根据财政部 工信部 税务总局 工商总局 银监会《关于贯彻落实<小企业会计准则>的指导意见》,银行业金融机构应加强对小企业的信贷风险管控,对会计核算健全、具有良好会计信用的小企业,应优先提供信贷支持。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会关于进一步加强金融服务民营企业有关工作的通知》的规定,地方法人银行要坚持回归本源,继续下沉经营管理和服务重心,充分发挥了解当地市场的优势,创新信贷产品,服务地方实体经济。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会关于进一步加强金融服务民营企业有关工作的通知》的规定,对服务民营企业的分支机构和相关人员,重点对其服务企业数量、信贷质量进行综合考核,提高不良贷款考核容忍度。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会关于进一步加强金融服务民营企业有关工作的通知》的规定,商业银行贷款审批中不得对民营企业设置歧视性要求,同等条件下民营企业与国有企业贷款利率和贷款条件保持一致,有效提高民营企业融资可获得性。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会关于进一步加强金融服务民营企业有关工作的通知》的规定,商业银行要坚持审核第一还款来源,减轻对抵押担保的过度依赖,合理提高信用贷款比重。把主业突出、财务稳健、大股东及实际控制人信用良好作为民营企业授信主要根据。___
A. 正确
B. 错误
【单选题】
根据《中国银保监会关于进一步加强金融服务民营企业有关工作的通知》的规定,商业银行在探索线上贷款审批操作的同时,结合自身实际,将一定额度民营企业信贷业务的发起权和审批权下放至分支机构,进一步下沉经营重心。___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》的规定,到2020年,基本建立多层次、广覆盖、可持续、适度竞争、有序创新、风险可控的现代农村金融体系,金融服务能力和水平显著提升,农业农村发展的金融需求得到有效满足。___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》的规定,到2035年,现代农村金融组织体系、政策体系、产品体系全面建立,城乡金融资源配置合理有序,城乡金融服务均等化全面实现。___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》的规定,鼓励发展农业供应链金融,将小农户纳入现代农业生产体系,强化利益联结机制,依托核心企业提高小农户和新型农业经营主体融资可得性。___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》的规定,各涉农银行业金融机构要单独制定涉农信贷年度目标任务,并在经济资本配置、内部资金转移定价、费用安排等方面给予一定倾斜。___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》的规定,要完善涉农业务部门和县域支行的差异化考核机制,落实涉农信贷业务的薪酬激励和尽职免责。___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》的规定,适当下放信贷审批权限,推动分支机构尤其是县域存贷比偏低的分支机构,加大涉农信贷投放。___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》的规定,在商业可持续的基础上简化贷款审批流程,合理确定贷款的额度、利率和期限,鼓励开展与农业生产经营周期相匹配的流动资金贷款和中长期贷款等业务。___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》,各金融机构要切实加强组织领导,由总行(总部)一把手直接抓乡村振兴,各级分支机构一把手切实承担起政策落实的第一责任___
A. 正确
B. 错误
【单选题】
根据《关于金融服务乡村振兴的指导意见》,适度提高涉农贷款不良容忍度,涉农贷款不良率高出自身各项贷款不良率年度目标3个百分点(含)以内的,可不作为银行业金融机构内部考核评价的扣分因素。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发<大中型商业银行设立普惠金融事业部实施方案>的通知》的规定,2017年《政府工作报告》提出,鼓励大中型商业银行设立普惠金融事业部,股份制银行要率先做到,实行差别化考核评价办法和支持政策,有效缓解中小微企业融资难、融资贵问题。 ___
A. 正确
B. 错误
推荐试题
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用