【多选题】
一级操作风险原因分类有( )以及政治、监管和破坏或事故等。___
A. 信息科技系统
B. 流程
C. 人员
D. 经营活动
E. 环境
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
ABCDE
解析
暂无解析
相关试题
【多选题】
银行在全行范围内开展操作风险的自我评估,有助于( )。___
A. 实现操作风险的主动识别与内部控制持续优化
B. 化和完善各项作业流程
C. 在自我评估的基础上建立操作风险事件数据库
D. 为建立操作风险管理的关键风险指标体系和操作风险计量奠定基础
E. 促进风险管理文化的转变
【多选题】
业务连续性计划应当是一个全面的计划,与银行经营的规模和复杂性相适应,强调操作风险识别、缓释、恢复以及持续计划,具体包括:( )和持续经营意识培训等方面。___
A. 业务和技术风险评估
B. 面对灾难时的风险缓释措施
C. 常年持续性/经营性的恢复程序和计划
D. 恰当的治理结构
E. 危机和事故管理
【多选题】
个人信贷业务是国内银行竞相发展的零售银行业务,包括( )等业务品种。___
A. 个人住房按揭贷款
B. 个人大额耐用消费品贷款
C. 个人生产经营贷款
D. 个人质押贷款
E. 黄金买卖
【多选题】
操作风险损失数据收集(Loss Data Collection , LDC)指操作风险损失数据(包括损失事件信息和会计记录中确认的财务影响)的( )。___
A. 搜集
B. 汇总
C. 监控
D. 分析
E. 报告工作
【多选题】
风险控制自我评估一般通过以下方式进行( )。___
A. 通过结构化问卷
B. 参与风险控制评估工作的单位或人员按问卷要求评估主要风险事件,并对控制中的弱点进行分析
C. 通过研讨会方式
D. 将评估结果进行汇总分析,形成不同层次风险特征信息
E. 行政处罚
【多选题】
借款人到期不归还担保贷款的,商业银行依法有权( )。___
A. 要求保证人归还贷款本金
B. 要求保证人归还贷款利息
C. 要求就担保物优先受偿
D. 扣押保证人财产
E. 直接享有抵押物的所有权
【多选题】
根据国务院“三定方案”,下列属于国家外汇管理局职责的是( )。___
A. 分析研究外汇收支和国际收支状况,提出维护国际收支平衡的政策建议
B. 拟定外汇市场的管理办法,监督管理外汇市场的运作秩序
C. 按规定经营管理国家外汇储备
D. 制定经常项目汇兑管理办法,依法监督经常项目的汇兑行为,规范境内外外汇账户管理
E. 负责国际收支统计数据的采集,编制国际收支平衡表
【多选题】
下列关于商业银行组织机构的说法,正确的是( )。___
A. 城市商业银行属于全国性商业银行
B. 设立全国性商业银行的注册资本最低限额为一亿元人民币
C. 商业银行的注册资本应当是实缴资本
D. 商业银行分支机构不具有法人资格,在总行授权范围内依法开展业务,其民事责任由总行承担
E. 商业银行对其分支机构实行全行统一核算,统一调度资金,分级管理的财务制度
【多选题】
根据《中华人民共和国反洗钱法》,下列属于中国人民银行的反洗钱职责的是( )。___
A. 指导、部署金融业反洗钱工作,负责反洗钱的资金监测
B. 制定或者会同国务院有关金融监督管理机构制定金融机构反洗钱规章
C. 参与制定银行业金融机构反洗钱规章
D. 在职责范围内调查可疑交易活动
E. 对银行业金融机构提出按照规定建立健全反洗钱内部控制制度的要求
【多选题】
中国人民银行不得从事的业务和工作是( )。___
A. 对银行业金融机构的账户透支
B. 不得向任何单位和个人提供担保
C. 不得对政府透支
D. 可以根据需要,为银行业金融机构开立账户
E. 不得向政府部门提供贷款
【多选题】
按照《商业银行法》的规定,下列做法或说法中错误的有( )。___
A. 王明为某商业银行的行长,信贷人员对其发放信用贷款
B. 商业银行不得对商业银行的董事、监事、管理人员、信贷业务人员的近亲属发放贷款
C. 甲有限责任公司为张某投资兴办的,张某又是乙商业银行的高级管理人员,乙商业银行可以对甲有限责任公司发放信用贷款
D. 经国务院批准的特定贷款项目,国有独资商业银行应当发放贷款
E. 商业银行有权拒绝任何单位和个人强令要求其发放贷款或者提供担保
【多选题】
根据《商业银行法》,商业银行可以经营下列部分或者全部业务( )。___
A. 吸收公众存款
B. 发放短期、中期和长期贷款
C. 办理国内外结算
D. 发行金融债券
E. 从事同业拆借
【多选题】
下列选项中,属于中国人民银行可以从事的业务和工作的是( )。___
A. 代理国务院财政部门向各金融机构组织发行、兑付国债和其他政府债券
B. 为银行业金融机构开立账户
C. 为银行业金融机构提供担保
D. 协调银行业金融机构相互之间的清算事项,提供清算服务,并制定具体办法
E. 直接认购、包销国债和其他政府债券
【多选题】
我国人民币的禁止性规定中规定的禁止行为包括( )。___
A. 伪造、变造人民币
B. 出售伪造、变造的人民币
C. 购买伪造、变造的人民币
D. 明知是伪造、变造的人民币而持有、使用
E. 在宣传品、出版物或者其他商品上非法使用人民币图样的
【多选题】
根据《商业银行法》中的相关规定,商业银行须在下列事项之后才可以将资金同业拆出的是( )。___
A. 交足存款准备金
B. 留足备付金
C. 归还中国人民银行到期贷款
D. 留足股东的股权收益
E. 留足坏账准备金
【多选题】
根据《中华人民共和国银行业监督管理法》,下列属于银行业监管人员违法的行为有( )。___
A. 擅自查询账户
B. 擅自对金融机构处罚
C. 擅自对银行业金融机构进行现场检查
D. 擅自冻结账户
E. 擅自批准金融机构终止
【多选题】
银行业监督管理机构的监督管理措施包括( )。___
A. 非现场监管措施
B. 现场检查措施
C. 对违反审慎经营规则的监管措施
D. 对问题银行业金融机构的接管、促成重组、撤销等监管措施
E. 其他监督管理措施
【多选题】
2003年12月27日,十届全国人大常委会第六次会议审议通过了《中国人民银行法修正案》。修正后的《中国人民银行法》规定,中国人民银行的主要职能包括( )。___
A. 防范和化解金融风险
B. 制定和执行货币政策
C. 发行人民币,管理人民币流通
D. 维护金融稳定
E. 依法制定和执行货币政策
【多选题】
对违反审慎经营规则的银行业金融机构,银监会可以采取的措施有( )。___
A. 责令暂停部分业务、停止批准开办新业务
B. 限制分配红利和其他收入
C. 禁止资产转让
D. 责令控股股东转让股权或者限制有关股东的权利
E. 对于情节严重者,可以强制注销并没收其财产
【多选题】
《商业银行法》禁止对关系人提供信用贷款的目的是( )。___
A. 提高银行的信贷资产质量
B. 降低风险
C. 创造公平、公开的贷款环境
D. 防止信贷活动中的内幕交易
E. 防止信贷活动中的操纵市场行为
【多选题】
贷款业务风控规则包括( )。___
A. 商业银行贷款,应当实行审贷分离、分级审批的制度
B. 商业银行贷款,应当与借款人订立书面合同
C. 商业银行不得向关系人发放信用贷款
D. 向关系人发放担保贷款的条件不得优于其他借款人同类贷款的条件
E. 同业拆借,应当遵守中国人民银行的规定
【多选题】
关于商业银行贷款业务,下列说法正确的有( )。___
A. 上级领导机关强令其提供担保的,商业银行无权拒绝
B. 借款人应当按期归还贷款的本金和利息
C. 对同一借款人的贷款余额与商业银行资本余额的比例不得超过10%
D. 商业银行可以向关系人发放信用贷款
E. 商业银行不得向任何人发放信用贷款
【多选题】
下列关于商业银行的接管与终止的说法,正确的是( )。___
A. 接管的目的是对被接管的商业银行采取必要措施,以保护存款人的利益,恢复商业银行的正常经营能力
B. 接管由银监会决定,并组织实施
C. 接管决定由被接管商业银行予以公告
D. 接管期限届满,银监会可以决定延期,但接管期限最长不得超过一年
E. 自接管开始之日起,被接管的商业银行的债权债务关系因接管而变化
【多选题】
我国《商业银行法》对商业银行金融业务和直接投资的限制包括( )。___
A. 不得从事商业房地产投资
B. 不得从事信托投资业务
C. 不得从事债券投资业务
D. 不得从事证券经营业务
E. 不得向非自用不动产投资
【多选题】
《银行业监督管理法》规定,银行业金融机构应当按照规定如实向社会公众披露( )。___
A. 财务会计报告
B. 风险管理状况
C. 董事和高级管理人员变更事项
D. 员工中所有违法违规处理结果
E. 其他重大事项
【多选题】
银行业金融机构违反审慎经营规则的,逾期未改正的,或者其行为严重危及该银行业金融机构的文件运行、损害存款人和其他客户合法权益的,经银监会或者其省一级派出机构负责人批准,可以区别情形,采取下列措施( )。___
A. 限制分配红利和其他收入
B. 责令暂停部分业务、停止批准开办新业务
C. 限制资产转让
D. 责令控股股东转让股权或限制有关股东的权利
E. 停止批准增设分支机构
【多选题】
依据法律规定,银监会对银行业金融机构进行检查时,对涉嫌违法事项相关的单位和个人可以采取的措施有( )。___
A. 询问有关单位和个人,要求说明有关情况
B. 对可能被转移、隐匿、毁损或者伪造的文件、资料,予以先行登记保存
C. 对违法事项有关的个人采取短暂的限制自由的强制措施
D. 冻结违法单位和个人的有关账号
E. 查阅、复制有关财务会计等文件
推荐试题
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy