Skip to main content

婚姻绿卡面经 (F2A)

12/3/2012 USCIS收到I-130申请
7/25/2013 I-130批准
8/2/2013  交I-485,I-765,I-131申请,以及lg给我的财政担保和体检证明
8/6/2013  USCIS收到I-485等上述材料
8/14/2013 收到打指纹预约信
8/29/2013 打指纹(没有提前walk in)
9/16/2013 收到面试预约信
10/15/2013 收到EAD卡(上面印着回美证)
10/16/2013 USCIS 面试

绿卡配偶8月2日递申请
10月16日下午面试
我和老公认识2年,结婚一年,住在一起1年半左右。没有小孩。
面试官是一位越南大叔,很和蔼的接待了我们,面试很快总共15分钟,算是水过。
我和lg是一起面试的。大叔的办公室有个小摄像机似的东西。大叔首先要我和老公站起
来举右手发誓所说的都是事实。然后他开始提问
他先是要我拿出ID,护照,同时还要lg出示绿卡。他重点
1.查我护照上的签证页,估计是要证明我合法进入美国。
2.他查我在美国期间是否一直保持合法身份,比如他问我现在在做什麽,我告诉他我还
在上学,他还问了我学校名字和专业。然后他和我要了I-20复印件(其实我已经交啦)。
3.他问了我485上一些回答NO的问题,问我是否是共产党blah blah。
4.他还问我lg是否还在XX公司上班,估计是想check老公能否support我。
然后他看似很轻松的还问我还有什麽要交的材料。我当时灵光一现就想起来网上的面经
,这问题是在暗示我给他看证明婚姻的其他材料。所以我给他银行联合账户还有大约20
张照片。他挺有兴趣看了一部分照片,我和老公还给他大概解释了一下照片的时间,背
景是啥。然后趁着我找ID复印件的功夫大叔问我老公是怎么认识我的,什么时候认识我
的。问我和老公前是否结过婚,我们是否有孩子。
然后,他就很和蔼的告诉我们绿卡会给我,2周后寄到。晚上回家后发现USCIS status
状态变成card production了。
总是我算是很幸运的,没有被刁难。虽然面试前多等了40分钟,但是面试过程比较轻松
,问题也都很简单,没有超过网上面经范围。非常感谢网站上以前的资料(包括huaren
,google面经)和大家的经验。我准备I-485,I-765,I-131,财政担保的材料都是看
文学城皮匠的blog。再次感谢,同时希望其他的网友能顺利通过面试拿到绿卡。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...