【判断题】
按照《商业银行风险监管核心指标(试行)》规定,单一集团客户授信集中度为最大一家集团客户授信总额与资本净额之比,不应高于15%;单一客户贷款集中度为最大一家客户贷款总额与资本净额之比,不应高于10%
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
按照《商业银行风险监管核心指标(试行)》规定,累计外汇敞口头寸比例为累计外汇敞口头寸与资本净额之比,不应高于10%
A. 对
B. 错
【判断题】
按照《商业银行风险监管核心指标(试行)》规定,利率风险敏感度为利率上升200个基点对银行净值的影响与资本净额之比
A. 对
B. 错
【判断题】
按照《商业银行风险监管核心指标(试行)》规定,风险迁徙类指标包括正常类贷款迁徙率和不良类贷款迁徙率
A. 对
B. 错
【判断题】
按照《商业银行风险监管核心指标(试行)》规定,资本利润率为税后净利润与平均净资产之比,不应低于11%
A. 对
B. 错
【判断题】
按照《商业银行流动性风险管理办法(试行)》规定,农村合作银行、村镇银行、农村信用社、外国银行分行以及资产规模小于C亿元人民币的商业银行不适用流动性覆盖率监管要求
A. 对
B. 错
【判断题】
按照《商业银行流动性风险管理办法(试行)》规定,商业银行应当按照本外币合计和重要币种分别进行流动性风险识别、计量、监测和控制
A. 对
B. 错
【判断题】
紫荆银行2013年1-10月税后净利润为10亿元,平均资产总额2000亿元。为符合监管核心指标,2013年剩余2个月紫荆银行应至少实现3亿元净利润
A. 对
B. 错
【判断题】
大洲银行2014年6月末资本净额400亿元,全部关联度如要符合监管核心指标要求,全部关联授信不应超过200亿元
A. 对
B. 错
【判断题】
《商业银行流动性风险管理办法(试行)》规定,流动性风险是指商业银行无法以合理成本及时获得充足资金,用于偿付到期债务、履行其他支付义务和满足正常业务开展的其他资金需求的风险
A. 对
B. 错
【判断题】
《商业银行流动性风险管理办法(试行)》规定,商业银行监事会(监事)应当对董事会和高级管理层在流动性风险管理中的履职情况进行监督评价,至少每半年向股东大会(股东)报告一次
A. 对
B. 错
【判断题】
《商业银行流动性风险管理办法(试行)》规定,流动性风险管理策略、政策和程序应当涵盖表内外各项业务以及境内外所有可能对其流动性风险产生重大影响的业务部门、分支机构和附属机构,并包括正常和压力情景下的流动性风险管理
A. 对
B. 错
【判断题】
《商业银行流动性风险管理办法(试行)》规定, 商业银行应当加强日间流动性风险管理,确保具有充足的日间流动性头寸和相关融资安排,及时满足正常和压力情景下的日间支付需求
A. 对
B. 错
【判断题】
《商业银行流动性风险管理办法(试行)》规定,商业银行应当根据其流动性风险偏好,考虑压力情景的严重程度和持续时间、现金流缺口、优质流动性资产变现能力等因素,按照审慎原则确定优质流动性资产的规模和构成
A. 对
B. 错
【判断题】
为了落实《商业银行流动性风险管理办法(试行)》的相关要求,某商业银行建立了流动性风险管理委员会,由行长、副行长、风险总监等高级管理人员组成,负责审批流动性风险管理策略、偏好和程序,并承担流动性风险的最终责任
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于印发银行业金融机构案件问责工作管理暂行办法的通知》规定,案件是指银行业金融机构从业人员独立实施的,侵犯银行业金融机构或客户资金或其他财产权益的,涉嫌触犯刑法,已由公安、司法机关立案侦查或按规定应当移送公安、司法机关立案查处的刑事犯罪案件;由外部人员实施的案件不在通知规范范围之内
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于印发银行业金融机构案件问责工作管理暂行办法的通知》规定,案件责任人员范围应当根据相关岗位和业务条线的职责内容、管理权限、履职情况等因素予以认定
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于印发银行业金融机构案件问责工作管理暂行办法的通知》规定,案件问责方式可以合并使用,对于应当给予纪律处分的,可以以经济处理追加其他问责方式进行替代
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于印发银行业金融机构案件问责工作管理暂行办法的通知》规定,银行业金融机构离职人员对离职前的案件发生负有责任的,银行业金融机构应当做出责任认定,并报告监管机构,案件责任人仍在银行业金融机构任职的,应当将认定结果及拟处理意见移送离职人员现任职单位
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于印发银行业金融机构案件问责工作管理暂行办法的通知》规定,银行业金融机构对案件责任人员做出免责、从轻或减轻处理的责任认定,应当逐一提出处理意见和理由,并由案发层级机构向银行业监督管理机构报告
A. 对
B. 错
【判断题】
B银行为A银行在B省的省分行,C银行为B银行在C市的市分行。2014年2月C分行下属D储蓄所发生一笔金融案件,D储蓄所储户E某在账户上的人民币CD万元被他人非法转走。依据《银行业金融机构案件问责工作管理暂行办法》规定,金融机构追究相关责任时,只需要对D储蓄所和C分行相关人员进行责任认定
A. 对
B. 错
【判断题】
甲银行于2014年3月发生一笔案件,甲银行拟对相关责任人进行问责。依据《银行业金融机构案件问责工作管理暂行办法》规定,甲银行可以酌情以经济处理代替纪律处分
A. 对
B. 错
【判断题】
按照《关于加强银行业基层营业机构管理的通知》规定,前台经办人员与后台授权人员岗位应分离,柜员号和密码严禁交叉使用
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业基层营业机构管理的通知》规定,商业银行应强化大额资金交易控制,严格执行业务办理人(客户或代办人)身份信息及大额转账实时核实制度,严禁越权办理
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业基层营业机构管理的通知》规定,商业银行应严格执行前台经办人员与后台授权人员岗位分离制度,加强柜员号和密码管理,除人手不够或当班柜员临时请假外,严禁交叉使用
A. 对
B. 错
【判断题】
A银行营业机构由于人员轮休导致人手不足,根据《中国银监会办公厅关于加强银行业基层营业机构管理的通知》的规定,该支行行长要求后台授权人员同时办理前台的工作,缓解柜面压力,满足客户需求
A. 对
B. 错
【判断题】
A银行信贷客户经理由于家庭经济压力较大,利用工作“八小时”外的时间在该银行授信客户大地公司从事财务工作。该情况经同事反映给该支行行长,该行长认为此员工是为了缓解家庭经济压力且是利用工作外的时间,因此根据《中国银监会办公厅关于加强银行业基层营业机构管理的通知》的规定,没有将该情况作为排查情况上报
A. 对
B. 错
【判断题】
《商业银行信息披露办法》适用于在中华人民共和国境内依法设立的商业银行,包括中资商业银行、外资独资银行、中外合资银行、外国银行分行。适用于农村合作银行、农村信用社、村镇银行、贷款公司、城市信用社,本办法或银监会另有规定的除外
A. 对
B. 错
【判断题】
按照《商业银行信息披露办法》规定,商业银行应在会计报表附注中说明会计报表中重要项目的明细资料,其中表外项目应披露其年初余额、年末余额及其他具体情况
A. 对
B. 错
【判断题】
按照《商业银行信息披露办法》规定,商业银行应披露会计师事务所出具的审计报告。商业银行在会计师事务所出具审计报告前,应与会计师事务所、银行业监督管理机构进行双边会谈
A. 对
B. 错
【判断题】
按照《商业银行信息披露办法》规定,财务情况说明书应当对本行经营的基本情况、利润实现和分配情况以及对本行财务状况、经营成果有重大影响的其他事项进行说明
A. 对
B. 错
【判断题】
按照《商业银行信息披露办法》规定,外国银行分行的信息由主报告行汇总后披露;外国银行分行应将其总行所披露信息摘要译成中文后披露
A. 对
B. 错
【判断题】
《商业银行信息披露办法》没有规定的,但若遗漏或误报某个项目或信息会改变或影响信息使用者的评估或判断时,商业银行应将该项目视为关键性项目予以披露
A. 对
B. 错
【判断题】
按照《商业银行信息披露办法》规定,商业银行应确保股东及相关利益人能及时获取年度报告,但不应将年度报告置放在商业银行的主要营业场所
A. 对
B. 错
【判断题】
按照《商业银行信息披露办法》规定,商业银行的行长应当保证所披露的信息真实、准确、完整,并就其保证承担相应的法律责任
A. 对
B. 错
【判断题】
按照《商业银行信息披露办法》规定,资产总额低于10亿元人民币或存款余额低于5亿元人民币的商业银行,按照《商业银行信息披露办法》规定进行信息披露确有困难的,经说明原因并制定未来信息披露计划,报中国银监会批准后,可免于信息披露
A. 对
B. 错
【判断题】
某商业银行就其资本构成在季度报表中披露如下:2014年9月30日总资本净额为392亿元,风险加权资产为3232亿元;2013年12月31日总资本净额325亿元,风险加权资产为2703亿元。 从以上数据我们可以看到该商业银行已依照《商业银行信息披露办法》充分披露了资本净额、加权资产合计数据,因此该商业银行就资本构成已符合披露要求。------
A. 对
B. 错
【判断题】
因经济下行,某地区的法人型银行不良贷款数额及比例出现大幅充上升,其核心资本充足率为此受到较大影响。该行经研究担心披露下降的核心资本充足率将影响其股价及储户对该银行的信赖。为此决定对外披露资本充足率,但不披露核心资本充足率。这一决定是为了社会稳定,也符合对外年资本充足率的管理要求。------
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业客户投诉处理工作的通知》规定,银行业金融机构应及时对客户投诉作出回应并展开调查,按照业务的复杂程度在不同时限要求内妥善解决并最终给予答复,不能按预定时间处理完毕的,需向客户说明原因
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业客户投诉处理工作的通知》规定,银行业金融机构应定期向高级管理层报告投诉处理情况,对于重大的投诉问题要及时向银行业监管机构报告
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业客户投诉处理工作的通知》规定,银监会和行业协会不能公开银行业金融机构客户投诉的信息
A. 对
B. 错
推荐试题
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability