Skip to main content

CFA问答


啥是CFA?
GOOGLE

考CFA有什么价值?
对于找基本的金融分析工作来讲,考过一级CFA+MS/PHD顶多==只有本科金融专业。
出去拿本科水准工资,和本科生一起工作。
由于考CFA的人越来越多,一级基本不值钱,要考就考二级以上。

CFA难考吗?
不难,即使你没有金融背景,考一次少则一两个月,多则三四个月的准备就够了。

CFA面向什么工作?
基本金融分析工作,BUY SIDE,个人认为主要就是研究EQUITY投资的。适合的工作机
会遍地都是。

QUANT面向什么工作?
华尔街高级金融研究及应用工作,SELL SIDE,金融产品定价,交易,对冲,风险控制
。工作机会非常有限。

CFA的数学水平要求 VS QUANT的数学水平要求?
初中 VS 硕士研究生

CFA对于找QUANT的弊?
浪费时间精力

CFA对于找QUANT的利?
1。简历上表现出对金融界的兴趣。
2。CFA基本COVER了JOHN HULL那本破书的前1/3,但是这本书的重点是后2/3。
3。找不到QUANT了但是仍然想搞金融,CFA可以给你奠点底,但是再想回到QUANT则不易。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...