【判断题】
银行业金融机构要审慎制定利润分配政策,合理确定利润留存比率和分红比例,严格控制突击分红、高比例分红
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
银行业金融机构要加强员工行为排查、岗位制衡和岗外监测,加强对重点人员、重要岗位、案件多发部位的监控
A. 对
B. 错
【判断题】
对于符合贷款条件的守信优质小微企业,银行不需优化贷款审批程序,简化贷款手续,提高贷款审批效率,加大信贷支持力度,扩大信用贷款业务
A. 对
B. 错
【判断题】
商业银行应当建立健全与其转型发展进程相适应的全面风险管理体系
A. 对
B. 错
【判断题】
势,科学细分市场和客户,根据市场需求提供有针对性的金融产品和差异化服务,推进特色经营,形成特色品牌
A. 对
B. 错
【判断题】
商业银行应当创新业务模式,建立适应科技金融需求特点的经营管理与考核体系,不断提高服务科技创新创业企业的专业化水平
A. 对
B. 错
【判断题】
对于条件成熟的商业银行,在现行法律框架下,探索开展信用卡、理财、私人银行、直销银行等专业子公司试点,提高经营管理效率,促进业务差异化发展
A. 对
B. 错
【判断题】
商业银行不用主动适应金融业改革开放深入推进所形成的新环境,在加强风险管理和风险隔离的前提下,拓展参与金融市场的广度和深度
A. 对
B. 错
【判断题】
根据中国银监会办公厅关于商业银行转型发展的指导意见(银监办发【2016】37号),强化风险管理要求商业银行实施激进的风险偏好和风险管理政策与程序,培育与其发展战略相适应的风险文化
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业消费者权益保护解决当前群众关切问题的指导意见(银监办发(2016)25号)》,开办个人业务的银行业金融机构应在董(理)事会下设立专门的消费者权益保护委员会,同时,在法人机构层面设立专职的消费者权益保护部门
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业消费者权益保护解决当前群众关切问题的指导意见(银监办发(2016)25号)》,银行业机构要改变单纯压降投诉数量的简单管理模式,注重源头治理,畅通投诉渠道,规范投诉处理流程,切实承担起投诉处理的主体责任
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业消费者权益保护解决当前群众关切问题的指导意见(银监办发(2016)25号)》,银行业金融机构应建立产品信息查询平台,收录全部在售及存续期内金融产品的基本信息
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业消费者权益保护解决当前群众关切问题的指导意见(银监办发(2016)25号)》,银行业金融机构未经消费者授权,不得向第三方机构或个人提供消费者的姓名、证件类型及证件号码、电话号码、通信地址及其他敏感信息
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强银行业消费者权益保护解决当前群众关切问题的指导意见(银监办发(2016)25号)》,凡未在产品信息查询平台上收录的产品,一律不得销售,切实保障消费者知情权和自主选择权
A. 对
B. 错
【判断题】
按照《中国人民银行 中国银行业监督管理委员会关于进一步完善差别化住房信贷政策有关问题的通知》规定,人民银行、银监会各派出机构应按照“分类指导,因地施策”的原则,加强与地方政府的沟通,根据辖内不同城市情况,在国家统一信贷政策的基础上,指导各省级市场利率定价自律机制结合当地实际情况自主确定辖内商业性个人住房贷款的最低首付款比例
A. 对
B. 错
【判断题】
金融机构可与中介合作,离行离柜大量办理无真实贸易背景票据贴现
A. 对
B. 错
【判断题】
机构可以利用贴现资金还旧借新,调节信贷质量指标
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于票据业务风险提示的通知》规定,对于账户特别是异地账户的开立和使用管理,必要时候可以出租、出借账户
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于票据业务风险提示的通知》规定,严防银行票据资金被套取、挪用,违规参与民间借贷或非法集资
A. 对
B. 错
【判断题】
制,确保信贷资金有效服务实体经济
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于票据业务风险提示的通知》规定,对管理不力、屡查屡犯及账外经营等严重违法违规问题,除对直接责任人进行严肃问责外,还要追究上级管理人员责任
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于票据业务风险提示的通知》规定,银行业金融机构要将“低风险”业务全口径纳入统一授信范围,认真履行尽职调查、审核、审批职责
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于银行业重大案件(风险)约谈告诫有关事项的通知》规定,约谈告诫原则上采取会议通报的形式进行。会议由银监会会领导或相关部门负责人主持,案发地银监局负责人参加
A. 对
B. 错
【判断题】
上级机构成立专案组总体负责,案防部门参与,并按照内部职责分工做好案件调查、责任认定和资产清收等工作,不得由案发分支机构主导
A. 对
B. 错
【判断题】
排查管理办法》,对于排查中发现的案件疑点和线索,可有分支机构自行开展自查
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于严格执行案件风险防控制度依法追偿涉案债权有关事项的通知》规定,银行业金融机构要改进绩效考评体系,突出合规经营和风险管理的重要性,合规经营类指标和风险管理类指标权重应当明显高于其他类指标
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于严格执行案件风险防控制度依法追偿涉案债权有关事项的通知》规定,发现内部员工存在失职渎职、违纪违法等行为的,要从严惩处,构成犯罪的,一律移送公安司法机关
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于严格执行案件风险防控制度依法追偿涉案债权有关事项的通知》规定,银行业金融机构要持续优化内部保卫、监察、法律、合规、风险、保全、内审、稽核等案防部门的组织架构和职责,强化对案防职能的条线管理,实行“条线主导、‘双线’报告”
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于严格执行案件风险防控制度依法追偿涉案债权有关事项的通知》规定,对于涉案资产的责任认定和清收,应由案发分支机构成立专案组总体负责,案防部门参与,并按照内部职责分工做好案件调查、责任认定和资产清收等工作
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于严格执行案件风险防控制度依法追偿涉案债权有关事项的通知》规定,银行业金融机构要认真执行《银行业金融机构案件问责工作管理暂行办法》等有关案件问责的制度,对于主动反映、举报案件线索的,可以免予追究案发分支机构和上级机构有关责任人员的责任
A. 对
B. 错
【判断题】
防范和处置非法集资,关系人民群众切实利益,关系经济金融健康发展,关系社会稳定大局,关系银行业金融机构防范自身风险、维护良好声誉、保护金融消费者合法权益
A. 对
B. 错
【判断题】
各银监局要承担对社会公众的宣传教育义务,加强对广大群众的金融知识和风险警示教育,通过宣传让群众辨清什么是合法、什么是非法,不轻易上当、不主动参与,自觉抵制非法集资
A. 对
B. 错
【判断题】
定期存单、非融资性担保、P2P网络借贷、农村专业合作社等领域涉及非法集资问题严重,大案要案高发
A. 对
B. 错
【判断题】
各银监局、银行业金融机构要建立防范处置非法集资工作责任制,建立健全考核奖惩和责任追究制度,明确风险防控、宣传教育、监测预警、涉案账户查控等各项工作职责分工,对直接责任人、机构负责人和业务条线管理人员等严格厘清责任并明确相应的奖惩措施
A. 对
B. 错
【判断题】
各银行业金融机构在严格执行大额可疑资金报告制度基础上,应对各类账户交易中具有分散转入集中转出、定期批量小额转出等资金异动进行监测分析
A. 对
B. 错
【判断题】
各银监局和银行业金融机构要根据银监会和高法院、公安部相关工作部署,大力推进涉案账户资金网络查控平台建设应用,切实提高涉案资金查控的合法性、及时性、准确性
A. 对
B. 错
【判断题】
银监会及其派出机构在处罚银行业金融机构时,应当依法对直接负责的董(理)事、高级管理人员和其他直接负责人员追究法律责任,区别不同情形给予行政处罚
A. 对
B. 错
【判断题】
按照《中国银监会关于银行业打击治理电信网络新型违法犯罪有关工作事项的通知》规定,若新开银行卡客户预留非本人实名登记的手机号码,一经发现,银行业金融机构有权停用该银行卡,待客户更新本人实名登记的手机号码再恢复使用
A. 对
B. 错
【判断题】
按照《中国银监会关于银行业打击治理电信网络新型违法犯罪有关工作事项的通知》规定,对已办理4张以上借记卡的客户,银行业金融机构要主动与开卡客户进行联系,开展核查工作,发现非本人意愿办理的,应当中止服务
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于印发商业银行信息科技风险动态监测指标(试行)及试点实施方案的通知》规定,信息科技风险动态监测指标由商业银行信息科技基础运行数据经采集、加工、计算形成,综合反映了商业银行信息科技风险水平及风险管控能力
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于印发商业银行信息科技风险动态监测指标(试行)及试点实施方案的通知》规定,信息科技风险动态监测指标分为稳定性指标、安全性指标和规模性指标3类共8个指标
A. 对
B. 错
推荐试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.