【多选题】
"140.☆☆☆为防范不法分子获取印鉴卡后,通过伪造公司印章盗取客户资金或实施经济诈骗,应()。___
A. 印鉴卡保管人员按规定使用印鉴卡片,遵循“谁保管、谁使用、谁负责”的原则
B. 开户行将印鉴卡作为重要物品管理
C. 指定后台会计管理人员专人保管印鉴卡,原则上不得调阅(手工验印除外)
D. 严禁非银行会计人员接触印鉴卡,不得复印印鉴卡(特殊调用情况除外)
E.
F. "
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
ABC
解析
暂无解析
相关试题
【多选题】
"141.☆☆为防范不法分子可利用银行支票出售环节的漏洞,挪用或盗取客户资金,()。___
A. 开户单位申请购买支票时,核对预留印鉴并核实购买人身份。
B. 银行受理人员应将购买人的相关信息摘录于重要空白凭证购买凭据上备查
C. 代开户单位购买支票等重要空白凭证须由代客服务申请表上的指定银行人员办理。
D. 严禁客户经理代开户单位购买支票等重要空白凭
E.
F. "
【多选题】
"142.☆☆为防止银行内部人员利用遗失或复制的钥匙实施犯罪。柜员卡遗失或被复制,使不法分子能冒用柜员身份进行系统操作,隐匿犯罪踪迹,钥匙、柜员卡应()。___
A. 营业中随用随收,不得任意放置。
B. 午休时随身携带。
C. 营业终了在监控范围内放入箱(柜)上锁保管。
D.
【多选题】
"143.☆公司金融客户经理()。___
A. 不得代客户保管预留印鉴章,不得持客户预留印鉴章代客户办理任何业务
B. 不得代客户申请开立、变更和撤销单位银行结算账户
C. 不得代客户申请变更预留银行印鉴
D. 不得代客户填写票据和结算凭证
E. 不得为客户上门收款,不得代客户解入或支取现金
F. "
【多选题】
"144.☆公司金融客户经理不得代客户办理下列业务()。___
A. 购买重要空白凭证
B. 申请签发票据
C. 申请办理单位定期(通知)存款业务
D. 领取对账单
E.
F. "
【多选题】
"147.☆☆☆有下列()情况的对公结算账户应纳入存款风险滚动式检查。___
A. 大收大付
B. 短期内频繁收付
C. 整收零付或零收整付且金额大致相当
D. 与无业务往来者频繁划转大额资金
E.
F. "
【多选题】
"148.☆有下列()情况的单位结算账户应作为重点关注账户纳入存款风险滚动式检查。___
A. 临时结算账户
B. 未经银行营销主动开立并立即收付大额款项
C. 由非开户企业人员代理开户
D. 长期未发生业务又突然发生大额资金收付
E. 长期不与银行对账或不及时领取对账回单
F. 由客户经理代办业务的账户"
【多选题】
"151.☆防范操作风险三十禁内容包括:()。___
A. 重要物品的保管及操作行为
B. 账户及相关操作管理
C. 储蓄、现金及自助设备管理
D. 岗位制度及履职管理
E. 职业操守及道德风险管理
F. "
【多选题】
"152.☆防范操作风险三十禁中,禁止不按规定的频率、方法检查或督促检查重要物品,重要物品是指()。___
A. 库存现金
B. 贵金属
C. 有价单证
D. 重要空白凭证
E. 业务印章
F. "
【多选题】
"153.☆下面不正确的是:()。___
A. 使用内部账户为客户办理结算业务
B. 一般存款账户办理现金支取
C. 超期临时存款账户办理支付结算
D. 擅自垫款、压款,无理退票
E. 使用本人、他人账户归集、过渡银行和客户资金
F. "
【多选题】
"154.☆☆对待客户准则包括()。___
A. 充分了解客户
B. 公平对待客户
C. 风险充分提示
D. 拒绝商业贿赂
E. 保护客户信息
F. 为有需要的客户上门代办业务"
【多选题】
"157.☆☆☆员工应当保证其管理下的各项信息、记录、资料的(),严格按照规章制度和操作流程处理业务。___
A. 时效性
B. 真实性
C. 准确性
D. 完整性
E.
F. "
【多选题】
"158.☆对于内外调查部门提出的工作要求,员工应当主动配合,并诚实作答,不得()。___
A. 隐瞒、虚构事实
B. 有损本行利益
C. 涂改、变造、伪造资料
D. 藏匿、销毁资料
E.
F. "
【多选题】
"159.☆运营重大事项报告内容包括()。___
A. 具体事项
B. 事件经过
C. 成因分析
D. 损失情况
E. 已采取的风险控制措施或管理措施
F. 相关人员处罚情况"
【多选题】
"160.☆运营检查人员权利包括下列()。___
A. 有权查阅与风控检查工作有关的文件、凭证、账表和其他相关档案、资料
B. 有权要求被检查单位就检查事项提供相关资料并作出书面或口头说明
C. 有权对被检查单位的现金库箱、重要空白凭证、业务印章等进行检查
D. 有权对被检查单位的人员配置情况、运营基础管理、风险管控措施、业务操作流程等提出建议
E. 有权调离不胜任会计工作的人员
F. "
【多选题】
"161.☆被检查单位对检查人员查出的问题和所提整改意见持有异议的,被检查单位可()申请复议。___
A. 向上级管理部门
B. 向检查人员
C. 向总行运营管理部
D. 通过上级管理部门向总行运营管理部
E.
F. "
【多选题】
"163.☆下答案中正确的选项是:因违规行为引发银行业案件的,应按照案件问责办法对()严肃问责,并从重或加重处罚。___
A. 违规操作人员
B. 有关管理人员、高管人员
C. 有关机构
D. 客户
E.
F. "
【多选题】
"164.☆办理具体柜台业务方面,不得存在以下行为:()。___
A. 代客户签名、设置/重置/输入密码
B. 柜员办理本人业务
C. 代客户申请、启用、操作网上银行、手机银行、电话银行业务
D. 代客户保管客户存单、卡、折
E. 代客户申请、购买、签收、保管重要空白凭证和支付设备
F. 允许公司金融客户经理代客户办理业务"
【多选题】
"165.☆办理开户、变更、挂失等业务方面,不得存在以下行为:()。___
A. 不核对企业证明文件原件
B. 不核查单位法定代表人身份
C. 不核查授权经办人身份
D. 受理个人账户开户(卡)申请或开通网银时,不按规定核实申请人意愿和身份信息
E.
F. "
【多选题】
"166.☆银行账户管理方面,不得存在以下行为:()。___
A. 获取客户密码,泄露、擅自修改客户信息
B. 利用客户账户过渡本人资金
C. 通过本人、他人账户过渡银行和客户资金、套取资金
D. 违规使用内部账户为客户办理支付结算业务
E.
F. "
【多选题】
"168.☆对账方面,不得存在以下行为:()。___
A. 制度规定不允许参与对账的人员参与对账
B. 客户在对账单回执上的签章非单位公章而是预留银行印鉴
C. 不按规定审核对账回执
D. 不按规定处理存在问题的对账回执
E.
F. "
【多选题】
"169.☆各机构要采取多种措施确保对账工作按照制度规范和要求有效落实;切实解决企业()导致对账工作不能落实的问题。___
A. 不按时对账
B. 不配合对账
C. 不使用电子对账
D. 其他原因
E.
F. "
【多选题】
"171.☆商业银行应当建立有效的核对、监控制度,对各种账证、报表定期进行核对,对()及时进行盘点。___
A. 现金
B. 有价证券等有形资产
C. 重要凭证
D. 客户回单
E.
F. "
【多选题】
"172.☆商业银行应当建立贯穿各级机构、覆盖所有业务和全部流程的管理信息系统和业务操作系统,及时、准确记录经营管理信息,确保信息的()。___
A. 完整
B. 连续
C. 可比性
D. 准确
E. 可追溯
F. "
【多选题】
"174.☆☆为防止员工参与民间融资、非法集资、地下钱庄非法活动,可采取()等方式进行防控。___
A. 注重案例警示教育,健全制度规章
B. 禁止员工使用两部以上手机
C. 落实轮岗和强制休假制度要求
D. 严格执行反洗钱相关要求,加强异常交易的监测预警
E.
F. "
【多选题】
"175.☆☆营业机构办理个人存款账户的开立、变更、撤销等业务应遵循()的原则。___
A. 开户自主
B. 账户实名
C. 本人办理
D. 证件核验
E. 为客户保密
F. "
【多选题】
"176.☆对于()等情形,各银行业金融机构和支付机构有权拒绝开户。___
A. 不配合客户身份识别
B. 有组织同时或分批开户
C. 开户理由不合理或开立业务与客户身份不相符
D. 同一代理人代理开立多户
E. 有明显理由怀疑客户开立账户存在开卡倒卖或从事违法犯罪活动
F. "
【多选题】
"179.☆☆以下不得转让的票据有:___
A. 填明“现金”字样的银行汇票
B. 记载”不得转让”的支票
C. 已到期提示付款的银行承兑汇票
D. 由个人申请签发的银行本票
E.
F. "
【多选题】
"180.☆☆可以挂失止付的票据有:___
A. 已承兑的商业汇票
B. 支票
C. 填明“现金”字样和代理付款人的银行汇票
D. 填明“现金”字样的银行本票
E.
F. "
推荐试题
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption