【判断题】
个人住房贷款的计息结息方式由央行确定 _______
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
一笔借款合同可以选择多种还款方式 _______
A. 对
B. 错
【判断题】
公积金个人住房贷款利率相对较低 _______
A. 对
B. 错
【判断题】
质押贷款档案管理中,贷款发放后,“贷款转存凭证”的业务部门留存联并进行存档 _______
A. 对
B. 错
【判断题】
贷款档案主要包括借款人相关资料和贷后管理相关资料,应为资料的原件 _______
A. 对
B. 错
【判断题】
抵押是指债务人或者第三人转移对法定财产的占有,将该财产作为债权的担保 _______
A. 对
B. 错
【判断题】
商业银行查询个人信用报告时应当取得被查询人的口头授权 _______
A. 对
B. 错
【判断题】
根据《巴塞尔新资本协议》,在信用风险评级标准法下,商业银行不得通过信用衍生工具进行信用风险缓释 _______
A. 对
B. 错
【判断题】
申请授信的单一法人客户应向商业银行提交的基本信息包括近3年经审计的资产负债表.利润表等;成立不足3年的客户,提交自成立以来各年度的报表_______
A. 对
B. 错
【判断题】
实践表明,单一法人客户的各项周转率越高,盈利能力和偿债能力必然就越好 _______
A. 对
B. 错
【判断题】
一个债务人只能拥有一个债项评级 _______
A. 对
B. 错
【判断题】
压力测试主要采用敏感性分析和情景分析方法 _______
A. 对
B. 错
【判断题】
风险信息在各业务单元的流动是单向循环的 _______
A. 对
B. 错
【判断题】
经济资本能够用于弥补银行的预期损失和非预期损失_______
A. 对
B. 错
【判断题】
其他条件不变,贷款增加意味着融资缺口减少_______
A. 对
B. 错
【判断题】
商业银行采用情景分析的目的是测试单一风险因素的假设变动对组合价值的影响_______
A. 对
B. 错
【判断题】
商业银行交易账户的项目通常按历史成本定价_______
A. 对
B. 错
【判断题】
操作风险是指由于不完善或有问题的内部程序,人员及系统或外部事件所造成损失的风险_______
A. 对
B. 错
【判断题】
培养开放、互信、互助的机构文化是声誉风险管理的内容_______
A. 对
B. 错
【判断题】
商业银行内部的性别/种族歧视事件属于声誉风险的范畴_______
A. 对
B. 错
【判断题】
商业银行进行风险管理的目标就是消除风险,实现零风险_______
A. 对
B. 错
【判断题】
只有当外部审计组织按照有关监管法律的授权或接受监管当局的委托对商业银行进行审计时,其工作才具有风险监管的性质_______
A. 对
B. 错
【判断题】
计量违约损失率的方法包括市场价值法和回收现金流法_______
A. 对
B. 错
【判断题】
有效资本监管的起点是商业银行自身严格的资本约束_______
A. 对
B. 错
【判断题】
公允价值是指在评估基准日,自愿的买卖双方在知情、谨慎、非强迫的情况下通过公平交易资产所获得的资产的预期价值_______
A. 对
B. 错
【判断题】
《巴塞尔新资本协议》的信用风险评级标准法要求对于缺乏外部评级的公司类债权统一给予100%的风险权重_______
A. 对
B. 错
【判断题】
商业银行法律或合规部门不需接受内部审计部门的审计_______
A. 对
B. 错
【判断题】
新发生不良贷款的内部原因包括违反贷款“三查”制度、地方政府行政干预、违反贷款授权授信规定和银行员工违法_______
A. 对
B. 错
【判断题】
商业银行公司治理的核心是在所有权、经营权分离的情况下,为妥善解决委托一代理关系而提出的董事会、高管层组织体系和监督制衡机制_______
A. 对
B. 错
【判断题】
客户评级与债项评级是反映信用风险水平的两个维度,同一个债务人的不同债项可能会有不同的债项评级,同样,同一个债务人也会对应不同的信用评级_______
A. 对
B. 错
【判断题】
贷款定价所包含的成本包括资金成本、经营成本、风险成本和资本成本。资本成本主要是指商业银行的股权成本,资金成本主要指商业银行负债的债务成本_______
A. 对
B. 错
【判断题】
银监会提出的银行监管理念包括管法人、管风险、管内控_______
A. 对
B. 错
【判断题】
商业银行的“风险管理部门”和“风险管理委员会”在职能上没有明显区别_______
A. 对
B. 错
【判断题】
商业银行风险管理的目标并不是要完全消除风险,而是将风险控制在可承受范围的基础上,尽量争取收益/风险的有效性_______
A. 对
B. 错
【判断题】
传统的组合监测方法中,授信集中是指相对于商业银行资本金.总资产或总体风险水平而言,存在较小潜在风险的授信_______
A. 对
B. 错
【判断题】
对风险模型进行压力测试是风险管理的关键,因为压力测试既能够说明极端事件的影响程度,也能说明事件发生的可能性。因此,通过压力测试有助于了解风险管理中存在的问题和薄弱环节_______
A. 对
B. 错
【判断题】
董事会和高级管理层除制定“正常的”风险处理政策和程序外,还应当制定危机处理程序,以应对严重的突发事件可能造成的管理混乱和重大损失_______
A. 对
B. 错
【判断题】
如果某机构美元的敞口头寸为正值,则说明该机构在美元上处于空头_______
A. 对
B. 错
【判断题】
信用风险具有明显的系统性风险特征,是不可规避的_______
A. 对
B. 错
【判断题】
系统性风险因素对贷款组合信用风险的影响,主要是由行业风险和区域风险的变动反映出来的_______
A. 对
B. 错
【判断题】
对于我国生产企业来说,各项周转率(如存货周转率.应收账款周转率.资产回报率等)越高.则该企业的盈利能力和偿债能力就越好_______
A. 对
B. 错
推荐试题
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto