【判断题】
预付款项属于非货币性资产
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
认定涉及少量货币性资产的交换为非货币性资产交换,通常以补价占整个资产交换金额的比例高于25%作为参考
A. 对
B. 错
【判断题】
未同时满足准则规定的两个条件的非货币性资产交换,即(1)该项交换具有商业实质;(2)换入资产或换出资产的公允价值能够可靠地计量。应当以换出资产的账面价值和为换入资产应支付的相关税费作为换入资产的成本,不确认损益
A. 对
B. 错
【判断题】
货币性资产,是指企业持有的货币资金和将以固定或可确定的金额收取的资产
A. 对
B. 错
【判断题】
将债务转为资本的债务重组中,债务人应将股份的公允价值总额与股本(或实收资本)之间的差额确认为投资收益
A. 对
B. 错
【判断题】
货币性资产以外的资产属于非货币性资产
A. 对
B. 错
【判断题】
在延期付款清偿债务并附或有支出条件的情况下,债权人应当将修改其他债务条件后的债权将来应收金额作为重组后债权的账面价值。重组债权的账面价值与重组后债权的入账价值之间的差额,计入当期损益
A. 对
B. 错
【判断题】
准备持有至到期的债券投资属于非货币性资产
A. 对
B. 错
【判断题】
债务重组中,债权人一定会由于债务重组而确认营业外支出
A. 对
B. 错
【判断题】
固定资产属于货币性资产
A. 对
B. 错
【判断题】
债务人根据转换协议,将应付可转换公司债券转为资本不属于债务重组
A. 对
B. 错
【判断题】
应收账款属于非货币性资产
A. 对
B. 错
【判断题】
债务重组中以现金清偿债务的,债权人应当将重组债权的账面余额与收到的现金之间的差额,计入营业外支出
A. 对
B. 错
【判断题】
可供出售金融资产属于非货币性资产
A. 对
B. 错
【判断题】
修改其他债务条件涉及的或有应收金额,在债权人方面,或有应收金额属于或有资产,债权人应确认或有应收金额
A. 对
B. 错
【判断题】
银行存款属于货币性资产
A. 对
B. 错
【判断题】
对于附或有应付条件的债务重组,债务重组利得为重组债务的账面价值与重组后债务的入账价值和预计负债金额之和的差额,这部分利得应计入当期损益(营业外收入)
A. 对
B. 错
【判断题】
务重组,是指在债务人发生财务困难的情况下,债权人按照其与债务人达成的协议或者法院的裁定作出让步的事项
A. 对
B. 错
【判断题】
在混合重组方式下,债权人依次以收到的现金、接受的非现金资产公允价值、债权人享有股份的公允价值冲减重组债权的账面余额
A. 对
B. 错
【判断题】
以非现金资产清偿债务的,债务人应当将重组债务的账面价值与转让的非现金资产公允价值之间的差额,计入当期损益。转让的非现金资产公允价值与其账面价值之间的差额,计入当期损益
A. 对
B. 错
【判断题】
修改后的债务条款中涉及或有应收金额的,债权人不应当确认或有应收金额,不得将其计入重组后债权的账面价值。只有在或有应收金额实际发生时,才计入当期损益
A. 对
B. 错
【判断题】
债务重组以现金清偿债务、非现金资产清偿债务、债务转为资本、修改其他债务条件等方式的组合进行的,债务人应当以支付的现金、转让的非现金资产公允价值、债权人享有股份的公允价值冲减重组债务的账面价值,再按照债务人修改其他债务条件的规定进行会计处理
A. 对
B. 错
【判断题】
债务重组采用以现金清偿债务、非现金资产清偿债务、债务转为资本、修改其他债务条件等方式的组合进行的,债权人应当依次以收到的现金、接受的非现金资产公允价值、债权人享有股份的公允价值冲减重组债权的账面余额,再按债权人修改其他债务条件的规定进行会计处理
A. 对
B. 错
【判断题】
资产负债表日,如果未来期间很可能无法获得足够的应纳税所得额用以抵扣递延所得税资产的利益,应当减记递延所得税资产的账面价值
A. 对
B. 错
【判断题】
资产账面价值小于其计税基础,产生可抵扣暂时性差异;负债账面价值大于其计税基础,产生可抵扣暂时性差异
A. 对
B. 错
【判断题】
利润表中的所得税费用包括当期应交所得税和当期递延所得税两部分
A. 对
B. 错
【判断题】
对于因可供出售金融资产公允价值变动而确认的递延所得税资产或递延所得税负债,应该通过其他综合收益核算。虽然不影响当期所得税费用,但是在根据利润总额计算应纳税所得额时,仍然要考虑这部分可抵扣暂时性差异或应纳税暂时性差异
A. 对
B. 错
【判断题】
资产账面价值小于其计税基础,负债账面价值大于其计税基础,产生应纳税暂时性差异
A. 对
B. 错
【判断题】
因税收法规的变化,导致企业在某一会计期间适用的所得税税率发生变化的,企业需对以后期间的递延所得税按照新的税率进行计量,已经确认的递延所得税不用再做调整
A. 对
B. 错
【判断题】
企业确认的预收账款,其计税基础一定等于其账面价值
A. 对
B. 错
【判断题】
企业在收到客户预付的款项时,因不符合收入确认条件,会计上确认为负债,如税法中对于收入确认的原则与会计相同,计税时亦不能计入当期的应纳税所得额,则该负债的计税基础等于账面价值
A. 对
B. 错
【判断题】
可供出售金融资产公允价值变动通过“其他综合收益”科目核算,并不影响会计利润,同时税法此时也是不承认公允价值变动的,所以在计算应纳税所得额时,不需要考虑这部分暂时性差异的
A. 对
B. 错
【判断题】
递延所得税资产的确认原则是以可抵扣暂时性差异转回期间预计将获得的应税所得为限,确认相应的递延所得税资产
A. 对
B. 错
【判断题】
递延所得税资产或递延所得税负债均应以相关暂时性差异产生当期适用的所得税税率计量
A. 对
B. 错
【判断题】
所得税会计是针对会计与税收规定之间的差异,在所得税会计核算中的具体体现
A. 对
B. 错
【判断题】
所有无形资产在初始确认时其账面价值与计税基础是相同的
A. 对
B. 错
【判断题】
对于应付职工薪酬,超过税法扣除标准的部分产生可抵扣暂时性差异,应确认相关的递延所得税资产
A. 对
B. 错
【判断题】
对于罚款、滞纳金,在尚未支付之前按照会计规定确认为费用,同时作为负债反映。税法规定,罚款和滞纳金不允许税前扣除,所以形成可抵扣暂时性差异
A. 对
B. 错
【判断题】
暂时性差异是指资产、负债的账面价值与其计税基础不同产生的差额
A. 对
B. 错
【判断题】
应纳税暂时性差异在未来期间转回时,会减少转回期间的应纳税所得额和应交所得税
A. 对
B. 错
【判断题】
若资产的账面价值大于计税基础,则形成可抵扣暂时性差异
A. 对
B. 错
推荐试题
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set