【判断题】
根据GB50500-2013规定,暂估价中的材料、工程设备暂估单价应根据工程造价信息或参照市场价格估算,列出明细表。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
根据GB50500-2013规定,总承包服务费可不列明服务项目及其内容等。
【判断题】
根据GB50500-2013规定,社会保险费和住房公积金不属于规费项目。
【判断题】
根据GB50500-2013规定,国有资金投资的建设工程招标,招标人必须编制招标控制价。
【判断题】
根据GB50500-2013规定,当招标控制价超过批准的概算时,招标人可委托具有相应资质的其他工程造价咨询单位审批部门审核。
【判断题】
根据GB50500-2013规定,招标人发布招标文件时公布招标控制价,招标控制价及有关资料可不报送工程所在地或有该工程管辖权的行业管理部门工程造价管理机构。
【判断题】
根据GB50500-2013规定,综合单价中应包括招标文件中划分的应由投标人承担的风险范围及其费用。招标文件中没有明确的,应提请招标人明确。
【判断题】
根据GB50500-2013规定,投标人经复核认为招标人公布的招标控制价未按照本规范的规定进行编制的,应在招标控制价公布后7天内向招投标监督机构和工程造价管理机构投诉。
【判断题】
根据GB50500-2013规定,工程造价管理机构应当在受理投诉的10天内完成复查,特殊情况下可适当延长,并作出书面结论通知投诉人、被投诉人及负责该工程招投标监督的招投标管理机构。
【判断题】
根据GB50500-2013规定,投标价应由投标人或受其委托具有相应资质的工程造价咨询人编制。
【判断题】
根据GB50500-2013规定,投标人的投标报价可高于招标控制价。
【判断题】
根据GB50500-2013规定,综合单价中应包括招标文件中划分的应由投标人承担的风险范围及其费用,招标文件中没有明确的,应提请招标人明确。
【判断题】
根据GB50500-2013规定,计日工应按招标工程量清单中列出的项目和数量,自主确定综合单价并计算计日工金额。
【判断题】
根据GB50500-2013规定,招标工程量清单与计价表中列明的所有需要填写单价和合价的项目,投标人均应填写且只允许有一个报价。未填写单价和合价的项目,可视为此项费用已包含在已标价工程量清单中其他项目的单价和合价之中,当竣工结算时,可重新组价予以调整。
【判断题】
根据GB50500-2013规定,实行招标的工程合同价款应在中标通知书发出之日起15天内,由发承包双方依据招标文件和中标人的投标文件在书面合同中约定。
【判断题】
根据GB50500-2013规定,承包人应当按照合同约定的计量周期和时间向发包人提交当期已完工程量报告。发包人应在收到报告后14天内核实,并将核实计量结果通知承包人。
【判断题】
根据GB50500-2013规定,合同工程竣工结算核对完成,发承包双方签字确认后,发包人不得要求承包人与另一个或多个工程造价咨询人重复核对竣工结算。
【判断题】
根据GB50500-2013规定,发包人应在收到最终结清支付申请后的14天内予以核实,并应向承包人签发最终结清支付证书。
【判断题】
根据GB50500-2013规定,工程造价管理机构应在收到申请的10个工作日内就发承包双方提请的争议问题进行解释或认定。
【判断题】
根据GB50500-2013规定,合同履行期间,发包人或承包人任何一方均可提出调换或终止任何调解人。
【判断题】
"根据GB50500-2013规定,当发承包双方中任一方对调解人的调解书有异议时,应在收到调解书后28天内向另一方发出异议通知,并应说明争议的事项和理由。"
【判断题】
根据GB50500-2013规定,仲裁可在竣工之前或之后进行,但发包人、承包人、调解人各自的义务不得因在工程实施期间进行仲裁而有所改变。
【判断题】
"根据GB50500-2013规定,发包人、承包人在履行合同时发生争议,双方不愿和解、调解或者和解、调解不成,又没有达成仲裁协议的,可依法向人民法院提起诉讼。"
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定: 超过图纸所示的面积或体积,只要现场施工,都可以计量与支付。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:结构物已完工程量计量时,倒角不超过0.15m×0.15m时不扣除,面积不超过0.15m×0.15m的填角部分也不增加。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:胸径大于10cm 树木的砍伐在清理现场子目计量;
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:地面下沉增加的填方量按填料来源可以在对应子目中计量。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:路堤整修包括路堤整修和路堑边坡的修整,本节工作内容均不作计量。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:片石护坡计算数量含碎落台、护坡平台满 铺浆砌片石数量。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:河道防护石笼使用的钢筋网片可单独计量。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:绞缝、湿接缝混凝土应计入现浇混凝土附属结构子目中。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:预制构件的起吊、运输、装卸、储存和安装不可单独计量。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:400章桥涵工程的小型钢构件可以单独计量。
【判断题】
《公路工程标准施工招标文件》(2018版)清单计价规则中规定:涵洞的基底软基处理计入该200章软基处理清单子目下。
【判断题】
《公路工程机械台班费用定额》(2018版)中机械台班费用中的不变费用,任何地区使用时都不能调整。
【判断题】
《公路工程预算定额》(2018版)中各类混凝土均考虑的是商品混凝土。
【判断题】
《公路工程预算定额》(2018版)规定,当以填方压实体积为工程量,利用土方套用开挖定额时,利用土方数量按需要的利用的天然密实方数量计算。
【判断题】
《公路工程预算定额》(2018版)规定,路基填筑填前夯实定额中夯(压)实如需用水时,备水费用另行计算。
【判断题】
《公路工程预算定额》(2018版)规定,强夯定额中已综合考虑夯坑的排水费用,使用定额时不得另行增加费用。
【判断题】
《公路工程预算定额》(2018版)规定,码砌菱形格护坡定额已包括框格间缝隙的填塞费用,不需要时应另行计算。
【判断题】
《公路工程预算定额》(2018版)规定,预制钢筋混凝土锚定板定额按使用木模计算,如采用钢模,按“预制、安装钢筋混凝土锚定板式挡土墙”定额计算。
推荐试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.