刷题
导入试题
【单选题】
根据《金融资产投资公司管理办法》(试行)(中国银监会令2018年第4号)的规定,金融资产投资公司重大关联交易应当经董事会批准,并进行充分披露。___
A. 正确
B. 错误
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
根据《中国银监会办公厅关于规范银行业金融机构信贷资产收益权转让业务的通知》规定,信贷资产收益权业务发生重大突发事件时,应及时向银登中心报告。___
A. 正确
B. 错误
【单选题】
根据《商业银行理财业务监督管理办法》规定,商业银行理财产品管理人、托管机构因依法解散、被依法撤销或者被依法宣告破产等原因进行清算的,银行理财产品财产属于其清算财产。___
A. 正确
B. 错误
【单选题】
商业银行开展理财业务,应当根据《关于规范金融机构资产管理业务的指导意见》第八条的相关规定,诚实守信、勤勉尽职地履行受人之托、代人理财职责,投资者自担投资风险并获得收益。___
A. 正确
B. 错误
【单选题】
根据《商业银行理财业务监督管理办法》的规定,商业银行发行理财产品,可以宣传理财产品预期收益率,但在理财产品宣传销售文本中只能登载该理财产品或者本行同类理财产品的过往平均业绩和最好、最差业绩,并以醒目文字提醒投资者“理财产品过往业绩不代表其未来表现,不等于理财产品实际收益,投资须谨慎”。___
A. 正确
B. 错误
【单选题】
根据《商业银行理财业务监督管理办法》的规定,理财产品销售文件应当载明产品类型、投资范围、投资资产种类及其投资比例,并确保在理财产品成立后至到期日前,投资比例根据销售文件约定合理浮动,不得擅自改变理财产品类型。___
A. 正确
B. 错误
【单选题】
根据《商业银行理财业务监督管理办法》的规定,商业银行全部理财产品投资于单一债务人及其关联企业的非标准化债权类资产余额,不得超过本行资本净额的5%。___
A. 正确
B. 错误
【单选题】
根据《商业银行理财业务监督管理办法》的规定,商业银行全部理财产品持有单一上市公司发行的股票,不得超过该上市公司可流通股票的30%。___
A. 正确
B. 错误
【单选题】
根据《商业银行理财子公司管理办法》的规定,银行理财子公司发行公募理财产品的,应当主要投资于标准化债权类资产以及上市交易的股票,不得投资于未上市企业股权,法律、行政法规和国务院银行业监督管理机构另有规定的除外。___
A. 正确
B. 错误
【单选题】
根据《商业银行理财子公司管理办法》的规定,银行理财子公司销售理财产品的,应当在非机构投资者首次购买理财产品前通过本公司渠道(含营业场所和电子渠道)进行风险承受能力评估。___
A. 正确
B. 错误
【单选题】
商业银行不得代销《中国银监会关于规范商业银行代理销售业务的通知》规定范围以外的机构发行的产品,政府债券、实物贵金属以及银监会另有规定的除外。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》的规定,商业银行对代销业务实施绩效考核,考核标准应当包括但不限于销售行为和程序的合规性、客户投诉情况和内外部检查结果等。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》的规定,商业银行的股东、由商业银行直接或者间接控制的金融机构或者商业银行所在集团其他金融机构等关联方为代销业务合作机构的,商业银行对其在合作机构管理和代销产品准入等方面的要求可以适当低于其他合作机构。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》的规定,商业银行应当对拟代销产品开展尽职调查,可以仅以合作机构的产品审批资料作为产品审批根据。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》的规定,商业银行应当在营业网点或官方网站提供查询代销产品信息的渠道,建立代销产品分类目录,明示代销产品的代销属性、发行机构、合格投资者范围等信息,不得将代销产品与存款或其自身发行的理财产品混淆销售。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》,商业银行不得代销未经合作机构确认合规或者未列入总行合作机构审批名单的机构发行的金融产品。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》的规定,商业银行原则上应当由其总行承担代销产品的审批职责,无需以书面形式对分支机构代销产品范围进行明确授权。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》,商业银行通过营业网点开展代销业务的,应当根据国务院金融监督管理机构的相关规定实施录音录像,完整客观地记录营销推介、风险和关键信息提示、客户确认和反馈等重点销售环节。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》的规定,商业银行应当依法履行客户信息保密义务,防止客户信息被不当使用。合作机构能履行客户信息保密义务,确保客户信息不被不当使用的,可直接与合作机构共享客户信息。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范商业银行代理销售业务的通知》的规定,代理销售业务是指商业银行接受金融机构委托,在本行渠道向客户推介、销售由合作机构依法发行的金融产品的代理业务活动。___
A. 正确
B. 错误
【单选题】
根据《商业银行代理保险业务管理办法》的规定,商业银行保险销售从业人员可以在多家网点开展保险代理业务。___
A. 正确
B. 错误
【单选题】
根据《商业银行代理保险业务管理办法》的规定,商业银行及其保险销售从业人员可以根据业务需求设计、印刷、编写或者变更相关保险产品的宣传册、宣传彩页、宣传展板或其他销售辅助品。___
A. 正确
B. 错误
【单选题】
《商业银行代理保险业务管理办法》所称保险销售从业人员,是指为商业银行及保险公司销售保险产品的人员。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发<银行业个人理财业务突发事件应急预案>的通知》的规定,根据理财业务突发事件的可控性、严重程度及影响范围,突发事件分为三类:特别重大(III级)、重大(II级)、较大(I级)。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发<银行业个人理财业务突发事件应急预案>的通知》的规定,较大突发事件是指涉及一家或多家银行业金融机构发行的同类型理财产品,且影响范围涉及两个或两个以上县(市辖区、县级市、旗)的银行业金融机构正常经营,进而有可能影响全地区(地级市、自治州、盟)范围的经济社会秩序稳定的突发事件。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发<银行业个人理财业务突发事件应急预案>的通知》的规定,重大突发事件是指涉及一家或多家银行业金融机构发行的同类型理财产品,且影响范围涉及两个或两个以上省(自治区、直辖市)的银行业金融机构正常经营,进而有可能影响全国范围经济社会秩序稳定的突发事件。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发<银行业个人理财业务突发事件应急预案>的通知》的规定,发生突发事件的银行业金融机构应当及时向银监会派出机构更新报送事件发展情况,并随时接受银监会派出机构的询问要求。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范银信理财合作业务有关事项的通知》的规定,银信理财合作业务是指商业银行将客户理财资金委托给信托公司,由信托公司担任受托人并根据信托文件的约定进行管理、运用和处分的行为。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范银信理财合作业务有关事项的通知》规定,商业银行和信托公司开展投资类银信理财合作业务,其资金可以投资于非上市公司股权。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于规范银信理财合作业务有关事项的通知》的规定,信托公司的理财要积极落实国家宏观经济政策,引导资金投向有效益的新能源、新材料、节能环保、生物医药、信息网络、高端制造产业等新兴产业,为经济发展模式转型和产业结构调整做出积极贡献。___
A. 正确
B. 错误
【单选题】
根据《中国银监会办公厅关于印发银行业金融机构销售专区录音录像管理暂行规定的通知》(银监办发〔2017〕110号)的规定,某商业银行制定销售专区录音录像资料管理细则,规定产品终止之日起6个月后,录音录像资料一律销毁。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于完善银行业金融机构客户投诉处理机制切实做好金融消费者保护工作的通知》(银监发〔2012〕13号)规定,银行业金融机构要加强对各分支机构客户投诉处理工作的管理,将投诉处理工作纳入经营绩效考评和内控评价体系。___
A. 正确
B. 错误
【单选题】
根据《国务院办公厅关于加强金融消费者权益保护工作的指导意见》(国办发〔2015〕81号)的规定,对于涉及金融消费者权益保护的重大突发事件,地方人民政府负责协调本行政区域内各方力量做好应急处置工作。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发银行业消费者权益保护工作指引的通知》的规定,银行业金融机构应当严格遵守国家关于金融服务收费的各项规定,披露收费项目和标准,不得随意增加收费项目或提高收费标准。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发银行业消费者权益保护工作指引的通知》的规定,银行业金融机构应当设立或指定专门部门负责银行业消费者权益保护工作,该部门相关工作经分管行领导审定后上报董事长、行长。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发银行业消费者权益保护工作指引的通知》(银监发〔2013〕38号)的规定,消费者有权拒绝银行在发放贷款时强制捆绑、搭售理财产品、保险、基金等其他金融产品。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发银行业消费者权益保护工作指引的通知》(银监发〔2013〕38号)规定,银行业金融机构应当定期总结消费者权益保护工作开展情况,必要时可向社会披露相关工作情况。___
A. 正确
B. 错误
【单选题】
根据《中国银监会关于印发银行业消费者权益保护工作指引的通知》(银监发〔2013〕38号)的规定,银行业金融机构特别要关怀老弱病残孕,以及因出国、意外事件等特殊原因,无法办理须由本人亲自办理的金融服务需求。___
A. 正确
B. 错误
【单选题】
根据《中国银监会办公厅关于加强银行业消费者权益保护解决当前群众关切问题的指导意见》(银监办发〔2016〕25号)的规定,开办个人业务的银行业金融机构应在董(理)事会下设立专门的消费者权益保护委员会,同时,在法人机构层面设立专职的消费者权益保护部门。___
A. 正确
B. 错误
【单选题】
根据《中国银监会办公厅关于加强银行业消费者权益保护解决当前群众关切问题的指导意见》(银监办发〔2016〕25号)规定,银行业金融机构应建立产品信息查询平台,收录全部在售及存续期内金融产品的基本信息。___
A. 正确
B. 错误
【单选题】
根据《中国银监会办公厅关于加强银行业消费者权益保护解决当前群众关切问题的指导意见》(银监办发〔2016〕25号)的规定,银行业金融机构未经消费者授权,不得向第三方机构或个人提供消费者的姓名、证件类型及证件号码、电话号码、通信地址及其他敏感信息。___
A. 正确
B. 错误
推荐试题
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用