【单选题】
根据《中国人民银行关于商业银行跨行银行承兑汇票查询、查复业务处理问题的通知》规定,发起查询地未设有查复行分支机构,查复地设有查询行分支机构的,可采用“先直后横”的方式查询。___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
根据《中国人民银行关于商业银行跨行银行承兑汇票查询、查复业务处理问题的通知》规定,查询行、查复行均为单设机构的,可采用委托他行代理方式查询。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》规定,客户授信调查内容包括背书流转过程合理性。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》规定,要科学核定客户票据业务授信规模,防止签发超过企业授信限额的票据。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》规定,支行或一线经营单位可以保管已贴现票据、质押票据。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》规定,对于在票据承兑申请人开户行开立保证金账户的,应通过系统控制、定期对账等措施防范保证金挪用风险。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》规定,票据转贴现、买入返售、卖出回购资金可以转入票据转出行在他行开立的账户。___
【单选题】
根据《福建银监局关于加强票据业务风险管理的通知》,银行业金融机构可由业务相关部门直接管理转贴现、买入返售、卖出回购以及其他以投融资为核心的票据同业业务,无须纳入同业专营部门管理。___
【单选题】
根据《福建银监局关于加强票据业务风险管理的通知》,银行业金融机构要严格审查关联企业之间交易的真实性,防止关联企业利用票据业务套取银行资金。严禁关联企业“虚开”、“对开”票据并办理贴现。要从严管理、审慎办理异地企业开票业务。___
【单选题】
根据《福建银监局关于加强票据业务风险管理的通知》,银行业金融机构开展同业票据业务时,应由总行对交易对手进行集中统一的名单制管理,定期评估调整。在审慎评估交易对手的资产和资金实力以及经营管理能力基础上,对交易对手(包括买入返售交易对手)进行同业授信,并加强集中度限额指标管理。严禁将本行同业账户委托交易对手代为管理。___
【单选题】
根据《中国银行保险监督管理委员会办公厅关于规范银行业金融机构跨省票据业务的通知》(银保监办发〔2018〕21号)规定,银行业金融机构应持续加强员工行为管理,严禁员工参与各类票据中介和资金掮客活动。___
【单选题】
根据《中国银行保险监督管理委员会办公厅关于规范银行业金融机构跨省票据业务的通知》(银保监办发〔2018〕21号)规定,应不断提高电子票据在转贴现、买入返售(卖出回购)等票据交易业务中的占比。___
【单选题】
根据《中国银行保险监督管理委员会办公厅关于规范银行业金融机构跨省票据业务的通知》(银保监办发〔2018〕21号)规定,银行业金融机构应审慎开展跨省票据承兑、贴现业务,应建立分支机构之间的协同与控制机制,避免出现内部竞争。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》(银监办发〔2012〕286号)规定,银行业金融机构要推动银行承兑汇票业务的审慎发展。___
【单选题】
根据《中国银行保险监督管理委员会办公厅关于规范银行业金融机构跨省票据业务的通知》(银保监办发〔2018〕21号)规定,在客户所在地设有分支机构的,票据承兑、贴现原则上应由当地分支机构办理。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》(银监办发〔2012〕286号)规定,已贴现票据必须完成贴现企业向银行的背书,防止银行合法权利悬空。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》(银监办发〔2012〕286号)规定,遇法院冻结止付等影响票据权利的事件发生,票据承兑行应在收到法院通知两个工作日内依托中国人民银行大额支付系统或其他适当方式通知票据查询行。票据查询行若票据已转出,还应通过适当方式通知交易对手,确保持票行及时主张合法权利。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》(银监办发〔2012〕286号)规定,票据业务绩效考核办法中应提高票据业务合规性、操作风险防控、业务规模等指标权重。___
【单选题】
根据《中国银监会办公厅关于加强银行承兑汇票业务监管的通知》(银监办发〔2012〕286号)规定,银行应完善票据业务考核方式,加强员工管理和审计评价。___
【单选题】
根据《商业银行信用卡业务监督管理办法》规定,商业银行可以基于自愿和保密原则,对信用卡业务中出现不良行为的营销人员、持卡人、特约商户、服务机构等有关风险信息进行共享。___
【单选题】
小王今年17岁,申请办理某银行的信用卡。该银行要求其提供了第二还款来源方(父母、监护人等)愿意代为还款的书面担保材料,并确认第二还款来源方身份的真实性后,为小王核发了一张信用卡(非附属卡)。根据《商业银行信用卡业务监督管理办法》规定,该银行的发卡行为是正确的。___
【单选题】
根据《中国银监会办公厅关于加强银行卡发卡业务风险管理的通知》规定,各银行卡发卡银行应依法为申请人提供的个人信息保密,对申请人的资信审核工作制定严格的管理制度。___
【单选题】
根据《中国银监会办公厅关于加强银行卡发卡业务风险管理的通知》规定,对于代领卡、邮寄卡等非本人领卡的银行卡发放方式,银行卡一经发出,即可生效。___
【单选题】
根据《中国银监会办公厅关于加强银行卡发卡业务风险管理的通知》规定,银行机构应努力提升银行卡业务综合竞争力,在充分考虑成本因素的基础上进行公平竞争。___
【单选题】
根据《中国银监会关于加强银行卡安全管理有关问题的通知》规定,各商业银行应要求涉及银行卡业务的分支机构指定专人负责银行卡违法犯罪案件的上报和内部通报工作。___
【单选题】
根据《中国银监会关于加强银行卡安全管理有关问题的通知》规定,各商业银行总行在接到银行卡违法犯罪案件报告后,应以机密件的形式将有关案情、已采取和拟进一步采取的对策上报银监会。___
【单选题】
根据《中国银监会关于加强银行卡安全管理有关问题的通知》规定,在申请解除密码锁定时,如果持卡人仍然记得原来的密码,并且输入的密码是正确的,商业银行必须为持卡人立即开通账户,同时可以以密码挂失或者其他名义向持卡人收取任何费用。___
【单选题】
根据《中国银监会关于加强银行卡安全管理有关问题的通知》规定,持卡人在POS机上进行刷卡消费行为的,各商业银行不必要求商户核对持卡人的签名。___
【单选题】
根据《中国银监会关于加强银行卡安全管理有关问题的通知》规定,各商业银行必须在ATM机等自助设备旁,提供银行卡挂失、投诉服务的联系电话号码,方便持卡人。___
【单选题】
根据《中国银监会关于加强银行卡安全管理有关问题的通知》规定,对于已发行的磁条卡,各商业银行只能通过补写磁方式,使原有的银行卡具备卡片验证码校验功能并进行校验。___
【单选题】
一日小王持A银行的储蓄卡去自助取款机取款,由于小王很久没有使用该卡一时记不起来取款密码,连续三次输入交易密码都不正确,A银行立即对该卡实施了冻结。后小王持身份证来A银行柜面申请解冻,在填写申请资料时小王突然回忆起密码并输入正确的密码。根据《中国银行业监督管理委员会关于加强银行卡安全管理有关问题的通知》规定,此时A银行必须立即为小王开通该账户并且不得以密码挂失或其他名义收取任何费用。___
【单选题】
根据《关于加强银行卡安全管理预防和打击银行卡犯罪的通知》规定,银行卡发卡机构不得擅自对信用卡透支利率、计息方式、免息期计算方式等进行调整;将信用卡发卡营销业务外包,要严格做好与合作机构的风险防控工作。___
【单选题】
根据《关于加强银行卡安全管理预防和打击银行卡犯罪的通知》规定,收单机构可以委托收单外包服务机构为特约商户提供POS机布放、维修等一项或多项服务。但特约商户的资金清算责任和风险管理责任由收单机构承担。___
【单选题】
根据《关于加强银行卡安全管理预防和打击银行卡犯罪的通知》规定,收单机构应谨慎对待特约商户安装移动POS机的申请,除航空、交通罚款、上门收费、移动售货、物流配送等确有使用移动POS机需求的行业商户,其他类型商户原则上不得安装移动POS机。___
【单选题】
根据《关于加强银行卡安全管理预防和打击银行卡犯罪的通知》规定,收单机构要使用更为严格的技术手段,对移动POS机的使用进行有效跟踪和监控,原则上不允许移动POS机跨地区使用,要屏蔽移动POS商户SIM卡的漫游功能。___
【单选题】
根据《中国银监会办公厅关于加强信用卡预借现金业务风险管理的通知》规定,信用卡预借现金业务原则上不得享受免息还款期或最低还款额待遇。___
【单选题】
根据《中国银监会办公厅关于加强信用卡预借现金业务风险管理的通知》规定,银行业金融机构根据审慎原则确定授信额度时,在总授信额度内,预借现金业务授信额度原则上不得超过非预借现金业务授信额度。___
【单选题】
根据《商业银行信用卡业务监督管理办法》规定,商务差旅卡,是指商业银行与政府部门、法人机构或其他组织签订合同建立差旅费用报销还款关系,为其工作人员提供日常商务支出和财务报销服务的信用卡。___
【单选题】
根据《商业银行信用卡业务监督管理办法》规定,发卡银行应当公开、明确告知申请人需提交的申请材料和基本要求,申请材料可以由申请人或委托人签名,但不得在客户不知情或违背客户意愿的情况下发卡。___
【单选题】
根据《商业银行信用卡业务监督管理办法》规定,营销人员开展电话营销时,必须留存清晰的录音资料,录音资料应当至少保存2年备查。___
【单选题】
根据《商业银行信用卡业务监督管理办法》规定,发卡银行不得为信用卡转账(转出)和支取现金提供超授信额度用卡服务;信用卡透支转账(转出)和支取现金的金额两者合计可以超过信用卡的现金提取授信额度。___
推荐试题
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface