【单选题】
下列公式中,不能反映存货周转速度的是_____
A. 销货成本/平均存货余额×100%
B. 存货平均余额×计算期天数/销货成本
C. 计算期天数/存货周转次数
D. _期初存货余额+期末存货余额_/2
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
下列不属于资产负债表的基本内容的是_____
A. 资产
B. 负债
C. 资本结构
D. 所有者权益
【单选题】
下列不属于企业财务状况风险的是_____
A. 借款人在银行的存款有较大幅度下降
B. 应收账款异常增加
C. 流动资产占总资产比重下降
D. 短期负债增加适当,长期负债大量增加
【单选题】
所有者权益代表投资者对企业__所有权。___
A. 全部资产
B. 全部负债
C. 净资产
D. 流动资产
【单选题】
商业银行对借款人最关心的就是其现在和未来的__。___
A. 技术水平
B. 销售业绩
C. 偿债能力
D. 信息披露
【单选题】
一般企业贷款操作流程:___
A. 建立正式客户-评级-授信-申请贷款-发放贷款
B. 建立正式客户-授信-评级-申请贷款-发放贷款
C. 建立正式客户-申请贷款-评级-授信-发放贷款
D. 建立正式客户-申请贷款-授信-评级-发放贷款
【单选题】
借款人盈利能力的比率通过__反映。___
A. 效率比率
B. 杠杆比率
C. 流动比率
D. 营业利润率
【单选题】
借款人还款能力的主要标志就是__。___
A. 借款人的现金流量是否充足
B. 借款人的资产负债比率是否足够低
C. 借款人的管理水平是否很高
D. 借款人的销售收入和利润是否足够高
【单选题】
借款人存货周转率是指用一定时期内的__除以__得到的比率。___
A. 平均存货余额,销货收入
B. 销货收入,平均存货余额
C. 销货成本,平均存货余额
D. 平均存货余额,销货成本
【单选题】
反映客户长期偿债能力的比率是_____
A. 流动比率
B. 资产负债率
C. 净利润率
D. 速动比率
【单选题】
__对客户盈利能力的持续增长和偿债能力的不断提高有着决定性的影响。___
A. 现金比率
B. 借款人的资本结构
C. 营运能力
D. 借款人的经营业绩
【单选题】
以下关于现金类资产表述不正确的是__。___
A. 速动资产扣除应收账款后的余额
B. 只包括货币资金
C. 最能反映客户直接偿付流动负债的能力
D. 现金比率越高,表明客户直接支付能力越强
【单选题】
__是指企业长期使用但没有实物形态的资产,包括土地使用权、专利权、商标权、商誉等。___
A. 递延资产
B. 流动资产
C. 固定资产
D. 无形资产
【单选题】
在抵押期间,不论抵押物所生的是天然孳息还是法定孳息,由__来收取。___
A. 抵押人
B. 质权人
C. 银行
D. 抵押权人
【单选题】
在贷款质押业务的风险中,最主要的风险因素是__。___
A. 虚假质押风险
B. 司法风险
C. 汇率风险
D. 操作风险
【单选题】
在贷款担保中,借款人将其动产交由债权人占有的方式属于__。___
A. 保证
B. 抵押
C. 质押
【单选题】
银行防范质物的价值风险,应要求质物经过有行业资格且资信良好的评估公司做价值认定,选择__的动产或权利作为质物,谨慎地接受股票、权证等价值变化较大的质物。___
A. 价值高
B. 价值低
C. 价格高
D. 价值稳定
【单选题】
以下各项中不得抵押的财产是__。___
A. 抵押人依法有处分权的原材料、半成品、产品
B. 抵押人所有的机器、交通运输工具和其他财产
C. 土地所有权
D. 专款专用
【单选题】
信贷人员应根据抵押物的__,分析其变现能力,充分考虑抵押物价值的变动趋势,科学地确定抵押率。___
A. 原值
B. 评估现值
C. 市场价值
D. 核定价值
【单选题】
下列关于质押和抵押的区别说法,不正确的是_____
A. 质权的标的物为动产和财产权利,动产质押形成的质权为典型质权
B. 抵押权的设立不转移抵押标的物的占有,而质权的设立必须转移质押标的物的占有
C. 质权的设立不交付质物的占有,因而质权人没有保管标的物的义务,而在抵押的场合,抵押权人对抵押物则负有善良管理人的注意义务
D. 在抵押担保中,抵押物价值大于所担保债权的余额部分,可以再次抵押
【单选题】
下列关于质押的说法,不正确的是__。___
A. 质押是债权人所享有的通过占有由债务人或第三人移交的质物而使其债权优先受偿的权利
B. 设立质权的人称为质权人
C. 质押担保的范围包括质物保管费用
D. 以质物作担保所发放的贷款为质押贷款
【单选题】
下列关于防范质押操作风险的说法,不正确的是__。___
A. 银行应当确认质物是否需要登记
B. 银行应收齐质物的有效权利凭证
C. 银行应当与质物出质登记、管理机构和出质人签订三方协议,约定保全银行债权的承诺和监管措施.
D. 银行借出质押证件时,应书面通知登记部门或托管方撤销质押
【单选题】
下列关于抵押物估价的说法,正确的是_____
A. 可以由抵押人自行评估
B. 可以由债务人自行评估
C. 可委托具有评估资格的中介机构给予评估
D. 可以由抵押人委托给政府物价部门进行估价
【单选题】
下列关于担保的补充机制中,说法不正确的是__。___
A. 银行如果在贷后检查中发现借款人提供的抵押品或质押物的抵押权益尚未落实,可以要求借款人落实抵押权益或追加担保品
B. 如果抵押人的行为足以使抵押物价值降低的,抵押权人_银行_有权要求抵押人停止其行为
C. 如果由于借款人财务状况恶化,或由于贷款展期使得贷款风险增大,银行也会要求借款人追加担保品
D. 倘若保证人的担保资格或担保能力发生不利变化,其自身的财务状况恶化,银行应要求担保人追加新的保证人
【单选题】
下列关于贷款抵押风险分析正确的有__。___
A. 抵押权建立的前提是抵押物必须实际存在,且抵押人对此拥有完全的所有权
B. 我国《担保法》规定了在法律规定范围内的财产或权利抵押时,双方当事人只需签订抵押合同即可
C. 共有财产是指两人以上对同一财产享有所有权。对以共有财产抵押的,只要一方同意抵押就有效
D. 未经所有权人同意就擅自抵押的,抵押关系无效,但不构成侵权
【单选题】
如果抵押人的行为足以使抵押物价值降低的,抵押权人_银行_有权除了可以追加担保品之外,还可以_____
A. 要求抵押人停止其行为,并要求其恢复抵押物的价值
B. 收缴罚金
C. 责令其更换同价值担保品
D. 拍卖担保品
【单选题】
某抵押物市场价值为l5万元,其评估值为l0万元,抵押贷款率为60%,则抵押贷款额为__万元。___
A. 12.6
B. 9
C. 8.6
D. 6
【单选题】
借款人需要将其动产与权利凭证移交银行占有的贷款方式为_____
A. 质押贷款
B. 抵押贷款
C. 信用贷款
D. 留置贷款
【单选题】
关于贷款质押风险防范,下列说法不正确的是__。___
A. 为防范虚假质押风险,银行查证质押票证时,有密押的应通过联行核对
B. 动产或权利凭证质押,银行要亲自与出质人一起到其托管部门办理登记,将出质人手中的全部有效凭证质押在银行保管
C. 接受共有财产质押,必须经所有共有人书面同意
D. 为防范质物司法风险,银行必须严格审查各类质物适用的法律、法规,确保可依法处置质物;对难以确认真实、合法、合规性的质物或权利凭证可以质押
【单选题】
对于由第三方提供担保的保证贷款,在__的情况下,银行无权要求借款人追加新的保证人。___
A. 由于借款人要求贷款展期造成贷款风险增大,银行加收罚息而导致借款人债务负担加重,而原保证人又不同意增加保证额度
B. 保证人的担保资格发生不利变化
C. 抵押品市场价值出现变化
D. 担保人自身的财务状况恶化
【单选题】
对于抵押物的存货估价,应当是评估存货的__。___
A. 现值
B. 购买成本
C. 生产成本
D. 历史价值
【单选题】
担保的充分性和有效性分别指_____
A. 法律方面和经济方面
B. 风险方面和收益方面
C. 经济方面和法律方面
D. 收益方面和风险方面
【单选题】
贷款担保是指为提高__的可能性,降低银行资金损失的风险,银行在发放贷款时要求借款人提供担保,以保障贷款债权实现的法律行为。___
A. 贷款偿还
B. 贷款性质
C. 发放方式
D. 数额多少
【单选题】
保证人性质的变化会导致保证资格的丧失,保证人应是具有代为清偿能力的_____
A. 企业
B. 企业法人
C. 自然人
D. 企业法人或自然人
【单选题】
保证期间是指__主张权利的期限。___
A. 保证人向借款人
B. 保证人向债权人
C. 债权人向保证人
D. 债权人向债务人
【单选题】
保证方式除一般保证外还包括_____
A. 部分责任保证
B. 全责责任保证
C. 第一顺序责任
D. 连带责任保证
【单选题】
__的一个重要特征是债务人保持对相关财产的占有权,而债权人则取得所有权或部分所有权。___
A. 质押
B. 担保
C. 抵押
D. 保证
【单选题】
下列关于贷款金额的说法不正确的是__。___
A. 贷款金额应考虑借款人的合理资金需求量,以确保需求合理
B. 固定资产贷款需求量可根据项目经审核确定的总投资、拟定且符合法规要求的资本金比例及其他资金来源构成等加以确定
C. 贷款金额的确定可超出借款人的承贷能力范围
D. 流动资金贷款需求量可参考《流动资金贷款管理暂行办法》提供的方法进行测算
【单选题】
审贷分离的核心是__,以达到相互制约的目的。___
A. 将负责贷款调查的业务部门_岗位_的工作人员相分离
B. 将负责贷款调查的业务部门_岗位_与负责贷款审查的管理部门_岗位_相分离
C. 将负责贷款审查的管理部门_岗位_的工作人员相分离
D. 将负责贷款审查的管理部门_岗位_与放款部门_岗位_相分离
【单选题】
客户的还款能力主要取决于__。___
A. 客户的信誉
B. 客户的现金流
C. 贷款期限
D. 贷款金额
【单选题】
__是指将信贷业务办理过程中的调查和审查环节进行分离,分别由不同层次机构和不同部门_岗位_承担,以实现相互制约并充分发挥信贷审查人员专业优势的信贷管理制度。___
A. 信贷授权
B. 授信额度
C. 贷款审查
D. 审贷分离
推荐试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first