【判断题】
在客户信用等级有效期内,如果客户与其他债权人的合同项下发生重大违约事件,信用评级的初评、审核部门均有责任及时提示,并按程序调整授信客户的信用等级
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
贷后检查其目的就是对可能影响贷款质量的有关因素进行监控,及早发出预警信号,从而采取相应的预防或补救措施。贷后检查的主要内容包括借款人情况检查和担保情况检查两个方面
A. 对
B. 错
【判断题】
贷款的回收是指借款人按借款合同约定的还款计划、还款方式及时、足额地偿还贷款本息。贷款的支付方式有委托扣款和柜台还款两种方式。借款人可在合同中选定一种还款方式,但在贷款期限内不得进行变更
A. 对
B. 错
【判断题】
贷款审查人负责对借款申请人提交的材料进行合规性审查,对贷前调查人提交的面谈记录等申请材料以及贷前调查内容是否完整等进行审查。贷款审查人认为需要补充材料和完善调查内容的,应否决该申请人的申请
A. 对
B. 错
【判断题】
等额本息还款法是每月以相等的额度偿还贷款本息,其中归还的本金和利息的配给比例是逐月变化的,利息逐月递增,本金逐月递减
A. 对
B. 错
【判断题】
如果调查人发现抵押物交易价格明显高于当地平均市场价格,可要求经银行认可的评估机构重新评估
A. 对
B. 错
【判断题】
商业银行在进行贷后跟踪管理时,不能查看个人的信用报告
A. 对
B. 错
【判断题】
授信风险越高的客户,贷后检查次数应越多、频率应越高
A. 对
B. 错
【判断题】
一笔借款合同可以选择多种还款方式
A. 对
B. 错
【判断题】
用多项质物申请个人质押贷款的,贷款到期日不能超过所质押质物的最晚到期日
A. 对
B. 错
【判断题】
《个人贷款管理暂行办法》贷款人应与借款人签订书面借款合同,需要担保的可以根据担保人情况延时签订担保合同
A. 对
B. 错
【判断题】
《个人贷款管理暂行办法》规定贷款人应要求借款人当面签订借款合同及其他相关文件,但电子银行渠道办理的贷款除外
A. 对
B. 错
【判断题】
《固定资产贷款管理暂行办法》规定贷款人受托支付是指贷款人根据借款人的提款申请和支付委托,将贷款资金支付给符合合同约定用途的借款人交易对手
A. 对
B. 错
【判断题】
《固定资产贷款管理暂行办法》规定贷款人应落实具体的责任部门和岗位,履行尽职调查并形成书面报告。尽职调查人员应当确保尽职调查报告内容的真实性、完整性和有效性
A. 对
B. 错
【判断题】
《固定资产贷款管理暂行办法》规定固定资产贷款贷款人应在合同中与借款人约定对借款人相关账户实施监控,必要时可约定专门的贷款发放账户和还款准备金账户
A. 对
B. 错
【判断题】
《固定资产贷款管理暂行办法》规定固定资产贷款中贷款人应按照审贷分离、分级审批的原则,规范固定资产贷款审批流程,明确贷款审批权限,确保审批人员按照授权独立审批贷款
A. 对
B. 错
【判断题】
按借款合同约定需办理抵押物登记的,客户经理应当参与。农信社需委托第三方办理的,应对抵押物登记情况予以核实
A. 对
B. 错
【判断题】
办理自然人贷款业务必须严格执行金融法律、法规和规章制度,坚持“小额、流动、分散”的信贷策略
A. 对
B. 错
【判断题】
本金或利息逾期含展期,下同180天以内的贷款或表外业务垫款30天以内一般划入关注类贷款
A. 对
B. 错
【判断题】
本金或利息逾期含展期,下同90天以内的贷款或表外业务垫款30天以内可划为关注类贷款
A. 对
B. 错
【判断题】
本金或利息逾期181天以上的贷款或表外业务垫款91天以上划为可疑类贷款
A. 对
B. 错
【判断题】
次级类贷款:债务人无法足额偿还债务,即使执行担保,也肯定要造成较大损失
A. 对
B. 错
【判断题】
贷款到期未结清、至今未收回包括已核销呆账贷款的信贷档案、信贷档案移交清册、销毁清册、调阅登记薄等重要信贷档案要永久保管
A. 对
B. 错
【判断题】
贷款的抵押物、质押物价值下降,或农村信用社对抵(质)押物失去控制,保证的有效性出现问题,可能影响贷款归还可划为关注类贷款
A. 对
B. 错
【判断题】
贷款的抵押物、质押物价值下降,或农村信用社对抵(质)押物失去控制,保证的有效性出现问题,可能影响贷款归还一般划入可疑类贷款
A. 对
B. 错
【判断题】
贷款风险分类通过对影响债务人偿还债务可能性的诸多因素的定性与定量分析评估,合理划分风险类别。介于相邻类别之间的信贷资产原则上应归入低级档次
A. 对
B. 错
【判断题】
贷款人应加强贷款资金发放后的管理,针对借款人所属行业及经营特点,通过定期与不定期现场检查与非现场监测,分析借款人经营、财务、信用、支付、担保及融资数量和渠道变化等状况,掌握各种影响借款人偿债能力的风险因素
A. 对
B. 错
【判断题】
贷款人在不损害借款人合法权益和风险可控的前提下,可将贷款调查中的部分特定事项审慎委托第三方代为办理,但必须明确第三方的资质条件
A. 对
B. 错
【判断题】
贷款审查应对贷款调查内容的合法性、合理性、准确性进行全面审查,重点关注调查人的尽职情况和借款人的偿还能力、诚信状况、担保情况、抵质押比率、风险程度等
A. 对
B. 错
【判断题】
贷款重组后仍不能正常归还本息划为可疑类贷款
A. 对
B. 错
【判断题】
办理流动资金贷款应合理测算借款人营运资金需求,审慎确定借款人的流动资金授信总额及具体贷款的额度,不得超过借款人的实际需求发放流动资金贷款
A. 对
B. 错
【判断题】
对借款人违反合同约定的行为应发现而未发现,或虽发现但未及时采取有效措施的,按照省联社有关规定对有关责任人进行责任认定和处罚
A. 对
B. 错
【判断题】
发放自然人贷款所辖信用社行只能向一户家庭中的一个人贷款,不得一个人在多家信用社行贷款或多个人在一家信用社行贷款
A. 对
B. 错
【判断题】
放任借款人将流动资金贷款用于固定资产投资、股权投资以及国家禁止生产、经营的领域和用途的,按照省联社有关规定对有关责任人进行责任认定和处罚
A. 对
B. 错
【判断题】
固定资产贷款的借款人项目进度落后于贷款资金使用进度农信社应与借款人协商补充贷款发放和支付条件,或根据合同约定停止贷款资金的发放和支付
A. 对
B. 错
【判断题】
挤占、挪用贷款,拒不改正的,农信社停止支付借款人尚未使用的贷款,并按合同约定,下发《河南省农村信用社提前收回贷款通知书》,要求其归还贷款
A. 对
B. 错
【判断题】
借款人采用隐瞒事实等不正当手段取得贷款的划为次级类贷款
A. 对
B. 错
【判断题】
借款人处于停产、半停产状态、固定资产贷款项目处于停、缓建状态划为可疑类贷款
A. 对
B. 错
【判断题】
借款人的管理层出现重大意见分歧或者法定代表人和主要经营者的品行出现了不利于贷款偿还的变化可划为关注类贷款
A. 对
B. 错
【判断题】
借款人改制后,难以落实农村信用社债权或虽落实债权,但不能正常还本付息划为可疑类贷款
A. 对
B. 错
【判断题】
借款人签订长期供销合同、使用金融衍生工具或者发起人提供资金缺口担保等方式,在项目融资中可以有效分散经营期风险
A. 对
B. 错
推荐试题
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping