【单选题】
金融衍生品市场上有不同类型的交易主体,如果某主体利用两个不同黄金期货市场的价格差异,同时在这两个市场上贱买贵卖黄金期货,以获得无风险收益,则该主体属于_____。___
A. 套期保值者
B. 套利者
C. 投机者
D. 经纪人
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
如果某投资者拥有一份期权合约,使其有权在某一确定时间内以确定的价格购买相关的资产,则该投资者是_____。___
A. 看跌期权的卖方
B. 看涨期权的卖方
C. 看跌期权的买方
D. 看涨期权的买方
【单选题】
在信用衍生品中,如果信用风险保护的买方向信用风险保护卖方定期支付固定费用或一次性支付保险费,当信用事件发生时,卖方向买方赔偿因信用事件所导致的基础资产面值的损失部分,则该种信用衍生品是_____。___
A. 信用违约互换(CDO)
B. 信用违约互换(CDS)
C. 债务单板凭证(CDO)
D. 债务担保凭证(CDS)
【单选题】
根据利率的风险结构理论,各种债权工具的流动性之所以不同,是因为在价格一定的情况下,它们的_____不同。___
A. 实际利率
B. 变现所需时间
C. 名义利率
D. 交易方式
【单选题】
我国的小额贷款公司是由自然人、企业法人与其他社会组织投资设立的机构,可以经营小额贷款业务,但不得_____。___
A. 发放企业贷款
B. 发放涉贷款
C. 吸收公众存款
D. 从商业银行融入资金
【单选题】
根据中国银行业监督管理委员会2005年发布的《商业银行风险监管核心指标》,“风险监管核心指标”分为风险水平、风险迁徙和_____三个层次。___
A. 风险控制
B. 风险抵补
C. 风险识别
D. 风险测度
【单选题】
在证券一、二级市场上,投资银行所开展的最本源、最基础的业务活动分别是_____。___
A. 证券发行与交易、财务顾问与投资咨询
B. 证券经纪与交易、证券发行与承销
C. 证券发行与承销、证券经纪与交易
D. 证券经纪与交易、财务顾问与投资咨询
【单选题】
西方经济学家对金融创新的动因提出了不同的理论观点,其中,希克斯和尼汉斯等学者认为,金融创新的支配因素是_____。___
A. 消除经营约束
B. 制度变革
C. 降低交易成本
D. 规避管制
【单选题】
商业银行存款业务创新的最终目的是_____.___
A. 扩大原始存款的资金来源,创造更多的派生存款
B. 调整表外业务的结构
C. 降低中间业务的成本
D. 减少资产业务的风险
【单选题】
关于期权交易双方损失与获利机会的说法,正确的是_____。___
A. 买方和卖方的获利机会都是无限的
B. 买方的损失是有限的,卖方的获利机会是无限的
C. 买方的获利机会是无限的,卖方的损失是无限的
D. 买方和卖方的损失都是有限的
【单选题】
金融深化程度可以用"货币化"程度衡量,即_____.___
A. 商品交易总额中货币交易总值所占的比例
B. 国民生产总值中货币交易总值所占的比例
C. 商品交易总额占金融资产总值的比例
D. 国民生产总值占金融资产总值的比例
【单选题】
在政府对商品价格和货币工资进行严格控制的情况下,隐蔽型通货膨胀可以表现为_____。___
A. 市场商品供过于求
B. 商品过度需求通过物价上涨吸收
C. 居民实际消费水平提高
D. 商品黑市、排队和凭证购买等
【单选题】
强制性的国民收入再分配是通货膨胀对社会再生产的负面影响之一,其表现在债权债务关系中,就是由于通货膨胀_____。___
A. 降低了实际利率,债务人受益
B. 提高了实际利率,债务人受益
C. 降低了实际利率,债权人受益
D. 提高了实际利率,债权人受益
【单选题】
在为治理通货膨胀而采取的紧缩性财政政策中,政府可以削减转移性支出。下列支出中,属于转移性支出的是_____。___
A. 政府投资、行政事业费
B. 福利支出、行政事业费
C. 福利支出、财政补贴
D. 政府投资、财政补贴
【单选题】
弗里德曼等经济学家针对通货膨胀治理而提出的收入指数化政策,是指将工资、利息等各种名义收入自动随物价指数升降而升降。这种政策_____。___
A. 加重通货膨胀给收入阶层带来的损失,且不能消除通货膨胀
B. 减轻通货膨胀给收入阶层带来的损失,但不能消除通货膨胀
C. 加重通货膨胀给收入阶层带来的损失,但能消除通货膨胀
D. 减轻通货膨胀给收入阶层带来的损失,并能消除通货膨胀
【单选题】
关于金融宏观调控机制中第二阶段的说法,正确的是_____。___
A. 调控主体为中央银行
B. 货币政策工具为再贴现率等
C. 变换中介为商业银行
D. 调控受体为企业与居民
【单选题】
在经济学中,充分就业并不等于社会劳动力100%就业,通常将_____排除在外。___
A. 摩擦性失业和自愿失业
B. 摩擦性失业和非自愿失业
C. 周期性失业和自愿失业
D. 摩擦性失业和周期性失业
【单选题】
短期债券、中期债券、长期债券的期限分别为___________
A. 1年期以内、1年至10年、10年以上
B. 1年期以内、1年至5年、5年以上
C. 半年以内、半年至10年、10年以上
D. 半年以内、半年至5年、5年以上
【单选题】
在2003年新巴塞尔资本协议中,巴塞尔委员会继承了过去以________为核心的监管思想___
A. 治理结构
B. 资本充足率
C. 监管当局的监督检查
D. 内部评级模型
【单选题】
由发行人为了筹措短期资金或弥补短期资金缺口,在货币市场上向投资者发行并承诺在将来一定时期偿付本息的凭证是___________
A. 企业债券
B. 商业票据
C. 银行大额可以转让定期存单
D. 银行承兑汇票
【单选题】
企业应当以实际发生的交易或者事项为依据进行会计确认、计量和报告,如实反映确认和计量要求的各项会计要素及其它相关信息,如实反映企业的财务状况.经营成果和现金流量这是对会计信息质量________的要求___
A. 可靠性
B. 清晰性
C. 相关性
D. 谨慎性
【单选题】
商业银行应确定一个管理部门或委员会统一审核批准对客户的授信,不能由不同部门分别对同一或不同客户进行授信,这是指授信要做到________ ___
A. 授信主体的统一
B. 授信形式的统一
C. 授信对象的统一
D. 不同币种授信的统一
【单选题】
在中央银行的一般性货币政策工具中,与存款准备金政策相比,公开市场业务的优点之一是_____。___
A. 富有弹性,可对货币进行微调
B. 对商业银行具有强制性
C. 时滞较短,不确定性小
D. 不需要发达的金融市场条件
【单选题】
根据凯恩斯学派的货币政策传导机制理论,货币政策增加国民收入的效果,主要取决于_____。___
A. 投资的利率弹性和货币需求的利率弹性
B. 投资的利率弹性和货币供给的利率弹性
C. 投资的收入弹性和货币需求的收入弹性
D. 投资的收入弹性和货币供给的收入弹性
【单选题】
债务依存度是指___________
A. 当年国债累计余额占当年国内生产总值的比重
B. 当年债务收入占当年国内生产总值的比重
C. 当年债务收入与当年财政支出的比例关系
D. 当年债务收入与当年财政收入的比例关系
【单选题】
我国某企业从德国进口一批设备,以欧元计价结算,在对德国出口商进行支付时,正逢欧元兑人民币升值,结果为购买同款欧元支付的人民币金额增多。这种情形是该企业承受的_____。___
A. 利率风险
B. 汇率风险
C. 投资风险
D. 操作风险
【单选题】
政府对外汇市场的干预,在货币模型下非冲销式干预是_______,而在资产组合分析法下非冲销式干预是__________
A. 有效/有效
B. 有效/无效
C. 无效/有效
D. 微效/无效
【单选题】
根据资产组合分析法,当该国中央银行为融通财政赤字而发行本国债券时,本国汇率和利率会__________
A. 升值/上升
B. 升值/下降
C. 贬值/上升
D. 贬值/下降
【单选题】
在保险法律体系中,保险公司与投保人、被保险人及受益人通过保险合同建立主体间的权利义务法律关系,适用保险_____法律规范。___
A. 商事
B. 刑事
C. 民事
D. 行政
推荐试题
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode