【单选题】
下列不能作为登记银行存款日记账依据的是___。
A. 银行存款收款凭证|
B. 银行存款付款凭证|
C. 现金收款凭证
D. 现金付款凭证
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
在下列有关账项的核对中,不属于账账核对的是___
A. 银行存款日记账和银行对账单余额的核对|
B. 银行存款日记账余额与其总账余额的核对|
C. 总账账户余额与其所属明细账余额的核对|
D. 会计部门的明细分类账与物资保管部门明细分类账的核对|
【单选题】
下列事项中,属于账实核对的是___。
A. 现金日记账余额和库存现金实有数核对|
B. 总分类账余额与其所属明细分类账余额核对|
C. 原始凭证与记账凭证核对|
D. 会计报表与会计账簿核对|
【单选题】
现金清查时,在盘点结束后,应根据盘点结果编制___,由相关入员签字后作为调整账簿记录的重要原始凭证。
A. 账存实存对比表|
B. 盘点表|
C. 现金盘点报告单|
D. 对账单|
【单选题】
在企业和银行双方记账均无错误的情况下,银行对账单与企业银行存款日记账的余额不一致的原因是___。
A. 结账时间不一致|
B. 外填存款|
C. 未达账项|
D. 应收账款的存在|
【单选题】
下列单据中,应由财会部门编制,并可以直接作为调整账簿记录原始凭证的是___。
A. 银行存款余额调节表|
B. 存货盘存单|
C. 存货账存与实存对比表|
D. 银行对账单|
【单选题】
结账时,应当划通栏双红线的是___
A. 12月末结出全年累计发生额后|
B. 各月末结出本月累计发生额后|
C. 结出本季累计发生额后|
D. 结出当月发生额后|
【单选题】
下列不属于对账内容的有___。
A. 现金日记账和库存现金的核对|
B. 总分类账和会计报表的核对|
C. 固定资产卡片和固定资产实物的核对|
D. 总分类账和所属明细分类成的核对
【单选题】
下列既需要进行“本月合计”月结,又需要进行“本年累计”月结的是___。
A. 总分类账|
B. 银行存款日记账|
C. 产品销售收入明细分类账|
D. 应收、应付款明细账|
【单选题】
下列不属于账实核对的是___。
A. 库存现金总账与日记账的核对|
B. 银行存款日记账与银行对账单的核对|
C. 应收账款明细账与债务单位的核对|
D. 库存商品明细账与库存商品库存的核对
【单选题】
我国企业采用的资产负债表的格式为___。
A. 账户式|
B. 单步式|
C. 报告式|
D. 多步式|
【单选题】
编制利润表的主要依据是___。
A. 资产负债及所有者权益各账户的本期发生额|
B. 损益类各账户的本期发生额|
C. 资产负债及所有者权益各账户的期末余额|
D. 损益类各账户的期末余额
【单选题】
下列不属于资产负债表中“存货”项目的有___
A. 周转材料||
B. 原材料|
C. 固定资产|
D. 库存商品|
【单选题】
下列不属于现金及现金等价物的是___。
A. 银行存款|
B. 库存现金|
C. 从购入至变现不超过3个月的债券投资|
D. 从购入准备随时变现的股票投资
【单选题】
某企业的资产1000万元,负债为300万元,则该企业的所有者权益为___元。
A. 1000|
B. 300|
C. 1300|
D. 700|
【单选题】
会计是以___为主要计量单位,反映和监督一个单位经济活动的一种经济管理工作。
A. 实物|
B. 商品|
C. 货币|
D. 劳动|
【单选题】
在资产负债表中,可按总分类账户的余额直接填列的是___
A. 货币资金|
B. 应付职工薪|
C. 固定资产|
D. 存货
【单选题】
“应收账款”科目所属明细账期末有借方余额,应在资产负债表中的___项目中反映。
A. 应收账款|
B. 应付账款|
C. 预收账款|
D. 预付账款|
【单选题】
下列资产负债表项目,需要根据相关总账所属明细账户的期末余额分析填列的是___。
A. 应收账款|
B. 应收票据|
C. 应付票据|
D. 应付职工薪酬|
【单选题】
在资产负债表中,应按几个总分类账户的余额计算填列的有___。
A. 货币资金|
B. 应付职工薪酬
C. 应交税费|
D. 应付股利|
【单选题】
资产负债表中,排列资产项目顺序的依据是___。
A. 项目的重要性|
B. 项目的流动性|
C. 项目的时间性|
D. 项目的货币性|
【单选题】
现金流量表中,现金的正确分类方法是___。
A. 经营活动、投资活动和筹资活动|
B. 现金流入、现金流出和非现金活动|
C. 直接现金流量及间接现金流量|
D. 营业活动现金流量和非营业活动现金流量
【单选题】
下列不符合现金流量表中“现金”概念的是___。
A. 金库中存放的现金|
B. 存在银行可以随时动用的银行存款|
C. 购入的三个月内到期的债券|
D. 存在银行的超过1年的理财产品
【单选题】
在填列资产负债表时,下列通过分析才能填列的项目是___。
A. 长期借款|
B. 长期股权投资|
C. 短期借款|
D. 在建工程
【单选题】
下列属于经营活动的是___。
A. 销售商品
B. 从银行借款|
C. 购买固定资产|
D. 分配股利
【单选题】
所有者权益变动表是___。
A. 主要报表且是年度报表|
B. 主要报表且是中期报表|
C. 利润表的附表|
D. 资产负债表的附表|
【单选题】
下列不属于企业主要报表的是___。
A. 资产负债表|
B. 利润表|
C. 现金流量表|
D. 利润分配表|
【单选题】
下列资料中,不属于会计档案的是___。
A. 原始凭证|
B. 汇总凭证|
C. 生产计划|
D. 记账凭证|
【单选题】
产品销售过程的广告费应计入___
A. 销售费用|
B. 生产成本|
C. 主营业务成本|
D. 管理费用
【单选题】
银行存款日记账由___根据审核无误的收.付款凭证逐日逐笔进行登记。
A. 会计主管入员|
B. 审核入员
C. 记账入员|
D. 出纳入员|
【单选题】
登记现金日记账时,误将记账凭证中的“200”抄成“2000”,应采用的错账更正方法是___。
A. 划线更正法|
B. 红字更正法|
C. 补充登记法|
D. 蓝字更正法|
【单选题】
记账后发现记账凭证账户正确,但所记金额小于应记金额,应采用的错账更正方法___。
A. 划线更正法|
B. 红字更正法|
C. 补充登记法|
D. 挖补更正法|
【单选题】
如果发现记账凭证所用的科目正确,只是所填金额大于应填金额,并已登记入账,应采用___更正。
A. 划线更正法|
B. 红字更正法|
C. 平行登记法|
D. 补充登记法
【单选题】
下列错账更正过程中,可采用划线更正法的是___。
A. 记账凭证正确,只是记账过程中,在账簿中将数字抄写错误|
B. 记账凭证不正确,但还没有记账|
C. 记账凭证中会计科目运用不正确,并且已记账|
D. 记账凭证中金额小于应记金额,并已登记入账|
【单选题】
银行存款余额调节表是___。
A. 对银行和本单位产生的未达账项进行余额试算平衡的表格|
B. 通知银行更正错误的依据|
C. 调整银行存款账簿记录的依据|
D. 更正本单位银行存款日记账记录的依据|
【单选题】
对于银行已经入账,本单位尚未入账的未达账项,企业应该___
A. 立即入眼|
B. 任意处理|
C. 等结算凭证到达后入账
D. 计入备查簿
【单选题】
作为中国共产党和社会主义事业指导思想的马克思主义是指 ___
A. 不仅指马克思恩格斯创立的基本理论、基本观点和学说的体系,也包括继承者对它的发展
B. 无产阶级争取自身解放和整个人类解放的学说体系
C. 关于无产阶级斗争的性质、目的和解放条件的学说
D. 列宁创立的基本理论、基本观点和基本方法构成的科学体系
【单选题】
马克思主义最重要的理论品质是 ___
A. 吐故纳新
B. 科学严谨
C. 博大精深
D. 与时俱进
【单选题】
马克思主义公开问世的标志是 ___
A. 《资本论》的发表
B. 《共产党宣言》的发表
C. 《哥达纲领批判》的发表
D. 《反杜林论》的发表
【单选题】
以人民为中心,一切为了人民,一切依靠人民,是马克思主义的 ___
A. 基本观点
B. 基本立场
C. 基本方法
D. 基本品质
【单选题】
以下不属于马克思主义基本观点的是 ___
A. 实践和认识辩证关系
B. 世界统一于物质
C. 社会意识决定社会存在
D. 人民群众创造历史
推荐试题
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure