【判断题】
存款人只能在银行开立一个基本存款账户,银行不得在同一网点为单位客户开立基本存款账户和一般存款账户。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
除基本账户外,其他账户开立后一个月内,应由客户经理或指定人员到单位客户的经营(办公)场所进行实地回访核实。
A. 对
B. 错
【判断题】
注册验资的临时存款账户在验资期间只收不付,注册验资的汇缴人与出资人可以不一致
A. 对
B. 错
【判断题】
银行工作人员严禁代理客户办理各类单位银行结算账户的开户手续。
A. 对
B. 错
【判断题】
账户开立后,开户单位的开户资料和预留印鉴,一律不准再由开户单位或他人经手,也不准在银行内部违规调阅、复印和使用。
A. 对
B. 错
【判断题】
基本存款账户是存款人办理日常转账结算和现金收付的账户,存款人的工资、奖金等现金的支取,只能通过该账户办理。
A. 对
B. 错
【判断题】
开户行必须遵循“了解你的客户”的原则,通过外部网站查询企业资质,落实实际经营地实访等方式,勤勉尽职,做好企业存款人的调查工作,识别企业身份及其实际控制人、收益所有人身份,了解企业开户目的及用途,并根据反洗钱要求填制《单位客户尽职调查表》。
A. 对
B. 错
【判断题】
开户手续完成后,应交给开户单位的有关资料、印鉴卡等物品,需填制移交清单,直接交给有权人,如果客户不在,也可以由客户经理转交。
A. 对
B. 错
【判断题】
基本存款账户“转户”,是指存款人因迁址或其他需要,在原基本存款账户开户银行撤销基本存款账户后,选择其他银行,申请重新开立基本存款账户的行为。
A. 对
B. 错
【判断题】
开立人民币结算账户,必须由法定代表人或单位负责人直接办理。
A. 对
B. 错
【判断题】
核准类账户预留印鉴卡的启用日期为办理预留印鉴卡的当天。
A. 对
B. 错
【判断题】
非核准类基本户开户手续完成后,应交给开户单位的印鉴卡、基本存款账户信息表、机构信用代码证,需填制移交清单,一律直接交给有权人,由其当场签字确认,并在移交清单注明“已收妥”字样,严禁由他人代领。
A. 对
B. 错
【判断题】
《综合服务协议签署表》对于未勾选协议,需在选项前打“X”,并用横线划去。有特别约定事项的在特别约定栏中填写。
A. 对
B. 错
【判断题】
军队、武警保密单位在银行办理支付结算时,可免填用途。
A. 对
B. 错
【判断题】
当单位客户在同一开户行撤销银行结算账户后重新开立银行结算账户,重新开立的银行结算账户三个工作日后方可办理付款业务。
A. 对
B. 错
【判断题】
基本存款账户是单位客户的主办账户。单位客户日常经营活动的资金收付及其工资、奖金和现金的支取,应通过该账户办理。
A. 对
B. 错
【判断题】
中央预算单位按有关规定开立的预算收入汇缴专用存款账户资金只能按规定及时上缴中央国库或中央财政专户,不得用于本单位支出。
A. 对
B. 错
【判断题】
单位银行卡的资金必须由其基本存款账户转账存入,该账户不得办理现金收付业务。
A. 对
B. 错
【判断题】
印鉴变更中存款人更换预留印鉴中有权签字人的个人签章同时需提供原有权签字人出具签名确认的书面申请,若无法提供,则存款人需出具正式公函,承诺承担由此所造成的一切经济、法律责任。
A. 对
B. 错
【判断题】
临时存款账户用于办理单位客户各项专用资金的收付。
A. 对
B. 错
【判断题】
业务支出账户除从其基本存款账户拨入款项外,只付不收,其现金支取必须按照国家现金管理的规定办理。
A. 对
B. 错
【判断题】
农民工工资账户按专用账户性质开立,总承包公司账户名称为总承包+承包项目名称,分包公司账户名称为总承包+承包项目名称+分包公司名称。其账户名称必需与预留公章相一致。
A. 对
B. 错
【判断题】
持有基本存款账户编号的企业申请开立一般存款账户、专用存款账户、临时存款账户时,开户行应当通过账户管理系统查询企业基本存款账户“经营范围”是否含有“取消开户许可证核发”字样,核实企业是否持有开户许可证。如经营范围含有“取消开户许可证核发”字样的,需出具基本存款账户开户许可证原件。
A. 对
B. 错
【判断题】
基本账户开户企业遗失或损毁取消许可前基本存款账户开户许可证的,可通过开户银行向中国人民银行申请补发。而取消开户许可之后遗失的应出具情况说明,由基本户开户申请补发《基本存款账户信息》。
A. 对
B. 错
【判断题】
开户行为企业开立一般存款账户、专用存款账户后,应于账户开立之日起2个工作日内通过账户管理系统向中国人民银行当地分支机构备案。
A. 对
B. 错
【判断题】
存款人变更预留印鉴中的授权代理人签章的,可不提供营业执照,但必须提供法定代表人出具的撤销原授权并对新的代理人授权的授权文件。
A. 对
B. 错
【判断题】
开户行对单位客户的变更通知和证明文件审核无误后,为单位客户办理变更手续,于5个工作日内向中国人民银行当地分支行报告。
A. 对
B. 错
【判断题】
如客户申请变更账户性质,应按照开销户手续提供相应证明文件并填写撤销原银行结算账户申请书、开立银行结算账户申请书。
A. 对
B. 错
【判断题】
工作人员应对联网核查获得的公民身份信息进行保密,非依法律规定,不得向任何单位和个人提供。不得将联网核查获得的公民身份信息用于办理银行业务外的其他目的
A. 对
B. 错
【判断题】
单位提供相关开户资料原件,让客户填写开立单位银行结算账户申请书,盖上公章,开立单位银行结算账户申请书一式三联第三联作为柜员传票。
A. 对
B. 错
【判断题】
对公信息建立1703可由主办会计授权。
A. 对
B. 错
【判断题】
对账户变更性质涉及核准类账户的,则须报人民银行核准通过,退回/换发/新发许可证后,方可以在核心系统中维护账户性质。
A. 对
B. 错
【判断题】
户名变更,客户当天一起办理户名变更和印鉴变更的,《更换银行预留印鉴申请书》中账户名称填写填写旧户名,盖新公章。
A. 对
B. 错
【判断题】
客户在账户名称变更后 ,再次单独进行印鉴变更时,《更换银行预留印鉴申请书》中账户名称填写新户名。
A. 对
B. 错
【判断题】
变更银行结算账户申请书前四行内容为变更前信息,开户许可证(基本存款账户信息)核准号为旧的核准号。
A. 对
B. 错
【判断题】
预留印鉴卡资料须按规定的项目填写,内容准确、完整。其中:签章式样、账户名称、账号、启用日期为不可更改要素,其他要素在预留时需要更改的,必须由营业机构经办人员在更改处签章,经换人审核并签章确认。
A. 对
B. 错
【判断题】
预留印章时必须使用朱红印油,印鉴的字迹和轮廓要圆润清晰、印油均匀、没有断笔。图章轮廓以内和附近没有与印鉴内容无关的干扰或杂质。不得使用原子印章预留印鉴,其签章为篆体字的,不予受理。
A. 对
B. 错
【判断题】
办理新印鉴预留手续时,存款人在新印鉴卡背面加盖旧印鉴及新公章后,由经办柜员在新印鉴卡正面注明启用日期。印鉴启用日期为印鉴变更手续完成后的次日,特殊情况需在当日启用的,应由客户出具加盖公章的公函说明,原印鉴注销日期为新印鉴启用日期。
A. 对
B. 错
【判断题】
撤销一般存款账户,销户后账户资金转账划入法定代表人账户。
A. 对
B. 错
【判断题】
核准类账户撤销,柜员在审核相关资料无误后,在核心系统中办理销户,并在2个工作日内,将销户手续报送至当地人行。
A. 对
B. 错
【判断题】
基本存款账户“转户”,是指存款人因迁址或其他需要,在原基本存款账户开户银行撤销基本存款账户后,选择其他银行,申请重新开立基本存款账户的行为。
A. 对
B. 错
推荐试题
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering