【多选题】
存单置换的类型可分为___
A. 收回单位定期存款开户证实书启用定期存单
B. 收回定期存单启用单位定期存款开户证实书
C. 收回单位定期存款开户证实书收回定期存单
D. 启用单位定期存款开户证实书启用定期存单
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
AB
解析
暂无解析
相关试题
【多选题】
8柜员在收到信贷部门提交的抵质押物入库凭证、抵质押物品收据单和实物封包后,应进行哪些合规性审查。___
A. 抵质押物入库凭证是否签字
B. 封包骑缝处双人签章是否齐全
C. 抵质押物品收据单封包联是否已粘贴在封包上
D. 抵质押物品收据单内容是否按规定填写完整、正确
【多选题】
5抵质押入库中需要注意哪些 ___
A. 该交易需经过信贷系统审批
B. 系统校验输入的抵质押品类别以及金额是否与信贷审批一致
C. 保管人应为封包管理柜员
D. 封包管理柜员必须是客户经理
【多选题】
下列表述正确的是:___
A. 抵、质押品管理是对抵质押品分类、价值评估、担保设立与变更、保管、贷后监管、风险预警、返还与处置等全流程管理。
B. 抵、质押品价值评估应按照国家有关法律、法规和我行相关制度,运用适当的评估方法,对评估基准日抵质押品价值进行分析、估算并发表评估意见。
C. 抵、质押品贷后监管是在贷款发放后,对抵质押品进行现场检查、价值重估和合同履约管理。
D. 抵、质押品管理应遵循合法性、有效性、审慎性原则。
【多选题】
7抵质押品出库应审核:___
A. 抵质押物出库凭证是否有客户经理及审核人签字
B. 柜员取出专夹保管的抵质押品收据单底卡联,核对信息、取出封包
C. 客户留存联、客户经理留存联抵质押品收据单是否与底卡联、封包联信息一致
D. 所有抵质押品收据单是否有抵质押人签章,是否有信贷部门经办人员签字
【多选题】
以下关于保证金追加业务说法正确的是:___
A. 保证金子账号账户余额减锁定金额应大于等于本次追加金额。
B. 追加银承保证金子账号应与票据币种一致。
C. 保证金追减金额不能大于锁定登记簿中汇总锁定金额之和。
D. 银承维护交易可以在银承签发日操作保证金追加减业务。
【多选题】
5关于履约保函,下列说法正确的是___
A. 履约付款时,履约付款金额应小于等于合同金额。
B. 实际履约付款小于合同金额时,表外销的是实际付款金额。
C. 履约付款时先支付保证金再支付结算账户,若保证金销户时金额大于履约付款金额,则剩余部分返回申请人账户。
D. “保函开立冲账”后,如已收取手续费的应在“2912冲账”交易做手续费冲账。
【多选题】
7申请保函业务的客户对象为经我国工商行政管理机关(或主管机关)核准登记的企事业法人、其他经济组织、个体工商户及自然人。___仅可以申请办理低风险的非融资性保函业务。
A. 企事业法人
B. 其他经济组织
C. 个体工商户
D. 自然人
【多选题】
贷款维护是指对已发放的贷款借据进行维护修改。可维护修改___
A. 贷款利率
B. 还款账号
C. 自主还款计划变更
D. 按揭还款方式变更
E. 宽限期
F. 利率调整生效时间
G. 欠款顺序调整
【多选题】
按揭还款方式变更支持___,但在变更前如有欠款,需先将欠款归还。
A. 等额本息按月与等额本息按季互换
B. 等额本金按月与等额本金按季互换
C. 等额本息按月与等额本金按月互换
D. 等额本息按季与等额本金按季互换
【多选题】
预收本息签约业务中,以下___为正确。
A. 月预收金额即预扣本息日(工资发放日)冻结金额,可大于月还款金额。
B. 一笔借据只能关联一个签约存款账户,一个签约存款账户可以关联多笔借据。
C. 预收本息签约仅支持还款方式为等额本金按月以及等额本息按月的贷款。
D. 如果签约账号/卡号不是该借据号的还款账号,需要在“3004借据查询维护”交易中将签约账号/卡号维护为该借据号的第一还款账号。
【多选题】
抵债资产按规定进行变现处理或转为自用时,柜面操作凭___,办理抵债资产处置。
A. 《绍兴银行以资抵债资产处置申请审批表》
B. 《绍兴银行抵债资产处置集体评审表》
C. 以资抵债资产清单
D. 《绍兴银行不良贷款以资抵债报备表》
【多选题】
经法院等程序所取得的抵债资产经信贷风险管理系统登记后,柜员凭___办理抵债资产登记及收取抵债资产的处理。
A. 绍兴银行以资抵债资产清单
B. 企业以资抵债的合法证明文件复印件(法院判决书、裁定书、和解协议书及其它相关文件和资产清单)
C. 《绍兴银行不良贷款以资抵债报备表》
D. 《绍兴银行以资抵债资产处置申请审批表》
【多选题】
抵债资产登记录入柜员对客户经理递交的资料要如何审核___。
A. 以资抵债资产清单审核其要素填写是否齐全
B. 以资抵债报备表审批流程是否已经完整
C. 相关有权人意见是否明确肯定并俱已签名确认
D. 相关合法证明文件复印件是否已经完备
【多选题】
对收取抵债资产处理说法正确的有___
A. 该交易用于对已完成录入登记的抵债资产进行抵偿相应贷款的处理。
B. 费用金额不能超过抵债资产登记时输入的登记费用金额。
C. 还贷金额与费用金额之和小于等于抵债资产余额。
D. 还贷金额应小于等于剩余本金、欠款合计、应计合计之和。
E. 若费用金额大于0,需要输入费用挂账账号;若费用金额等于0,费用挂账账号置灰不需要输入。
【多选题】
以资抵债资产系债务人因___无力偿还我行借款及应收款等债务,我行通过法律诉讼及其它合法手段所取得的债务人、担保人或第三人代为偿债拥有的房产、设备、土地使用权及其它各类资产。
A. 关停
B. 倒闭
C. 破产
D. 其它原因
【多选题】
以下关于抵债资产登记说法正确的有___。
A. 抵债资产登记为不可逆交易,不支持冲账;
B. 该交易需要信贷审批。
C. “登记费用”字段不产生账务,只是登记;
D. 后续处理贷款时的输入的支付费用不能超过登记费用。
【多选题】
关于利息调整说法正确的有___
A. 如调整方式为调减,是从最早的未收欠款开始往下调减。
B. 如调整方式为调增,则是从最后面新插入一条欠款信息,调增利息前需要检查当天该贷款账号是否处理过归还欠款、提前还本,需将原交易冲账后再做调增。调增后可处理归还欠款等业务。
C. 参与行的银团贷款应收利息、利率使用错误导致利息与实际不符均可使用该交易调整。但只能调整已结未收利息,不允许调整应计利息。
D. 若需要调整的利息为已经结出且已从客户账户中扣收了的利息,则只能在“1873—表内通用记账”交易中,调整客户账及对应的利息收入科目。
【多选题】
利息调整方式选择调增/调减,输入调整金额,选择调整类型有:利息/减值利息/罚息/减值罚息/复利/减值利息等。___
A. 利息
B. 减值利息
C. 罚息
D. 减值罚息
E. 复利
F. 减值利息
【多选题】
授信划转业务业务受理,录入柜员根据信贷客户经理提供的绍兴银行资产转移审批表进行合规性审核,审核___。
A. 移入行客户经理是否填写意见及签名
B. 移入行行长是否填写审批意见及签名
C. 移出行客户经理是否填写意见及签名
D. 移出行行长是否填写审批意见及签名
【多选题】
下列关于抵质押品划转的说法正确的有___
A. 抵质押品划转后,所属机构为接收机构;
B. 只有抵质押品接收机构才能查询到该抵质押品的信息;
C. 划出机构当日申请划转后,接受机构可以隔日接收;
D. 划出机构当日申请划转后,接受机构不可以隔日接收;
E. 该交易需会计主管本地授权。
【多选题】
抵质押品划转说法正确的是___
A. 抵质押品划转后,所属机构为接收机构,只有接收机构都能查询到该笔抵质押品信息。
B. 划转成功后接收部门记两个部门的表外账,即划出部门表外付出,接收部门表外增加。
C. 划出机构当日申请划转后,接受机构可以隔日接收。
D. 抵质押品划转交易后,需要在“3806保管人查询及变更”交易做保管人的变更。
推荐试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity