【单选题】
库房、保险柜的修锁、换锁,必须向法人机构负责人报告,由网点负责人联系维修。 ___
A. 正确
B. 错误
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
零币盒内的零币不随款包解送,可留置于工作区域,且不在查库范围之内。 ___
A. 正确
B. 错误
【单选题】
票币兑换,坚持先收款后兑换的原则。 ___
A. 正确
B. 错误
【单选题】
纸币呈十字形缺少四分之一的,按全额兑换。 ___
A. 正确
B. 错误
【单选题】
残缺、污损人民币持有人对金融机构认定的兑换结果有异议的,法人机构不能将该残缺、污损人民币退回。 ___
A. 正确
B. 错误
【单选题】
柜员尾箱库存限额由法人机构核定,并由参数管理机构在核心业务系统中进行设置。 ___
A. 正确
B. 错误
【单选题】
在途现金是指调拨运送过程中的现金,即机构间现金调拨时,调拨方发起调拨,现金接收方尚未接收确认的现金。 ___
A. 正确
B. 错误
【单选题】
营业机构之间、普通柜员之间可以进行现金调拨或调剂。 ___
A. 正确
B. 错误
【单选题】
机构内实体柜员间的现金调拨是现金实物的转移,属于账务性交易。 ___
A. 正确
B. 错误
【单选题】
自助设备管理员临时更换或工作调动,应在会计主管的监督下进行交接,并详细登记。保险柜密码保管人员变动时,接班人员应次日更换密码。 ___
A. 正确
B. 错误
【单选题】
现金类自助设备管理员清加钞过程中应遵循独立操作、换人复核的原则。 ___
A. 正确
B. 错误
【单选题】
自助设备钥匙使用完毕,应随身携带,以防丢失。 ___
A. 正确
B. 错误
【单选题】
所有的上解下拨款项均应在有效视频监控下进行,由双人共同清点、开箱、落锁。 ___
A. 正确
B. 错误
【单选题】
柜员尾箱是指柜员保管营业所需的现金、有价单证、重要空白凭证、业务印章、个人名章等物品的箱(包) ___
A. 正确
B. 错误
【单选题】
中心库专人同押运人员到人民银行或同业机构提取现金,取款时应当场验看券别,逐捆卡把,点清总数。 ___
A. 正确
B. 错误
【单选题】
柜员受理客户缴存的现金和缴款凭证时,须在客户视线范围内。 ___
A. 正确
B. 错误
【单选题】
柜员在办理现金收款业务时,发现有可疑币(怀疑是伪造、变造的人民币或外币)的,应当立即提示客户,提示后不中断业务操作。 ___
A. 正确
B. 错误
【单选题】
现金收付款需要换人复核时,可不经会计主管而由其他柜员进行卡把复核。 ___
A. 正确
B. 错误
【单选题】
一次性发现假人民币20张(枚)以上、假外币10张以上的,应当立即报告当地公安机关,提供有关线索。 ___
A. 正确
B. 错误
【单选题】
柜员短期离岗或长期离岗时,应将尾箱中现金全部缴清。 ___
A. 正确
B. 错误
【单选题】
营业机构中午正常营业但柜员换班休息时,有保险柜的,大额现金应入柜保管;无保险柜的,柜员尾箱应置于有效监控范围内妥善保管。 ___
A. 正确
B. 错误
【单选题】
机械锁钥匙坚持分管分持、平行交接原则,由两名管库员或会计主管与其中一名管库员各持一把。 ___
A. 正确
B. 错误
【单选题】
法人机构上解下拨款项时,所有款项的装箱、加锁、开锁、清点均应在有效视频监控下进行,并由双人共同操作。 ___
A. 正确
B. 错误
【单选题】
现金出入库必须坚持“现金入库先收款后记账,现金出库先记账后付款”的原则。 ___
A. 正确
B. 错误
【单选题】
技术性错款按照规定的程序审批后,长款归公,短款自赔,不得以长补短。 ___
A. 正确
B. 错误
【单选题】
柜员在一日三碰库时,整把票币必需拆把清点,不可以直接卡把。 ___
A. 正确
B. 错误
【单选题】
库内现金、实物应按种类、券别摆列整齐、保持清洁;库内不准存放私人财物,允许存放其他物品。 ___
A. 正确
B. 错误
【单选题】
机械锁钥匙坚持分管分持、交叉交接原则,由两名管库员或会计主管与其中一名管库员各持一把。 ___
A. 正确
B. 错误
【单选题】
中心库向同业机构以现金方式领取现金时,根据管库员提供的提款数额填制转账支票,经会计主管审核支票无误后,按规定加盖预留印鉴,留存支票存根。 ___
A. 正确
B. 错误
【单选题】
柜员办理现金支取人民币5万元或外币等值1万美元以上的业务时应换人卡把复核。 ___
A. 正确
B. 错误
【单选题】
墩齐是指钞票要平铺,一把钞票中间不要有折叠,每一把钞票的下端和右端要墩齐。 ___
A. 正确
B. 错误
【单选题】
下拨的现金运到后,原封新券按捆验收,回笼券须当面点清细数。 ___
A. 正确
B. 错误
【单选题】
机械锁钥匙坚持分管分持、平行交接原则,由两名管库员或会计主管与其中一名管库员各持一把,但密码必须由会计主管掌管。 ___
A. 正确
B. 错误
【单选题】
中心金库的备用钥匙由管库员、会计主管和现金管理部门负责人当面共同密封,签字或加盖个人印章,办理登记签收手续。 ___
A. 正确
B. 错误
【单选题】
现金中心是指不对外营业,未在外部机构开立账户,可通过行内准备金、同业账户的开户机构审批后与人民银行或同业机构直接办理现金业务往来的一类特殊中心库。 ___
A. 正确
B. 错误
【单选题】
机构间缴存现金既可以通过预约模式缴存和也可以通过非预约缴存。 ___
A. 正确
B. 错误
【单选题】
重要空白凭证销毁后,保管人员应及时登记《重要空白凭证登记簿》,并将重要空白凭证销毁清单一份( ),一份报送上级会计部门备案。 ___
A. 作会计档案永久保管
B. 附重要空白凭证登记簿保管
C. 附会计出纳工作日志保管
D. 入15年会计档案保管
【单选题】
无磁条重要空白凭证作废时,应( )剪角。 ___
A. 自右侧中间沿45度角向下
B. 自右侧中间沿60度角向上
C. 右上
D. 右下
【单选题】
下列关于重要空白凭证说法错误的是( ) ___
A. 自行领用重要空白凭证,在途凭证当日必须入库
B. 集中解送重要空白凭证,在途凭证原则上应当日入库。
C. 凭证管理员调拨凭证时原则上应按照凭证号码由大到小的顺序调拨。
D. 柜员间调拨重要空白凭证时,应当面逐份清点。
【单选题】
下列关于重要空白凭证说法错误的是( ) ___
A. 对外出售重要空白凭证应验证客户身份,并根据客户业务量适量出售。
B. 对外出售重要空白凭证应坚持先收款后办理的原则。
C. 农商行工作人员不能代客户签收、购买重要空白凭证。
D. 柜员签发填错的重要空白凭证交主管盖章证明后,可继续出售。
【单选题】
下列关于重要空白凭证核算的说法错误的是( ) ___
A. 重要空白凭证收付按照“先记账后收入,先付出后记账”的原则进行核算。
B. 重要空白凭证要纳入表外科目核算,采用单式记账法。
C. 重要空白凭证统一以每份一元人民币的假定价格记账。
D. 重要空白凭证应纳入核心业务系统和凭证管理系统。
推荐试题
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions