刷题
导入试题
【填空题】
45 根据《公路工程建设项目概算预算编制办法》___规定,基本预备费以建筑安装工程费、土地使用及拆迁补偿费、【工程建设其他费】之和为基数
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
JTG3830-2018
解析
暂无解析
相关试题
【填空题】
46 根据《公路工程建设项目概算预算编制办法》___规定,建设期贷款利息系指工程项目使用的贷款部分在建设期内应计取的贷款利息,包括各种【金融机构贷款】、建设债券和外汇贷款等利息。
【填空题】
填空___
【填空题】
4 依据《关于安全生产费提取和使用管理办法》铁建设[2012]245号文,2012年2月14日___之后完成的建筑安装工程,按其建筑安装工程费的0.5% 补列安全生产费,由此增加的费用在【招标降造费或基本预备费】中解决,由建设单位按规定履行报批手续。
【填空题】
11 《关于加强铁路建设项目保证金管理的通知》的规定,对于质量保证金,建设单位在拨付工程进度款时,按批准的验工计价额的5%预留质量保证金,工程【竣工验收___合格交付使用】一年后,建设单位应于3个月内不计息按规定返还。
【填空题】
21 根据《铁路基本建设项目投资管理办法》铁总计统[2017]179号文的规定,铁路项目在决策审查期间,建设单位在现场踏勘的基础上组织相关业务部门、咨询单位___对项目可行性研究报告进行初审并出具初审意见报【总公司】。
【填空题】
24 《关于铁路建设项目实施阶段材料价差调整的指导意见》铁建设[2009]46号文规定,铁路项目施工合同有风险包干费的,概算内材料价格变化幅度___在【±5%】以内部分由施工企业承担,超出部分纳入概算并由建设单位承担。
【填空题】
25 《关于公布___等二十九项定额标准的通知》铁总建设[2016]359号文等现行定额中的其他材料费乘以【0.85】的系数,其他机械使用费乘以【0.9】的系数,其他消耗量按原定额执行。
【填空题】
37 建筑安装工程费按照费用构成要素划分:由人工费、材料___费、【施工机具使用费】、企业管理费、利润、【规费】和税金组成。
【填空题】
42 根据《房屋建筑和市政基础设施工程施工招标投标管理办法》___,工程施工招标分为公开招标和【邀请招标】。
【填空题】
43 根据《房屋建筑和市政基础设施工程施工招标投标管理办法》___,招标人采用邀请招标方式的,应当向【3】个以上符合资质条件的施工企业发出投标邀请书。
【填空题】
44 增值税一般纳税人___提供建筑服务,按规定适用或选择适用简易计税方法计税的,实行【一次备案】制。
【填空题】
49 《公路工程标准施工招标文件》___中投标偏差分为【重大偏差】和细微偏差。
【填空题】
51 根据《企业安全生产费用提取和使用管理办法》___,施工企业以建筑安装工程造价为计提依据,其中铁路工程提取标准为【2】%。
【填空题】
52 根据《企业安全生产费用提取和使用管理办法》___,施工企业以建筑安装工程造价为计提依据,其中公路工程工程提取标准为【1.5】%。
【填空题】
53 《公路工程标准施工招标文件》___明确了投标保证金【可以】计算利息。
【填空题】
54 根据《公路工程标准施工招标文件》___,当图纸与工程量清单所列数量不一致时,以【工程量清单所列数量】作为报价的依据。
【填空题】
55 《公路工程标准施工招标文件》___中对于信用查询,新增投标人在【“信用中国”】网站查询的要求。
【填空题】
填空___
【填空题】
10 铁路预算定额[2017]33号通信工程规定:敷设光___缆根据设计单条电缆或光缆的长度,以【条公里】计算。
【填空题】
12 铁路工程[2017]30号基本定额规定:组合钢模板每次摊销量=一次性使用量+___÷摊销次数
【填空题】
13 2007铁路工程工程量清单计价指南___:【子目划分特征】是指对清单子目的不同类型、结构、材质、规格等影响综合单价的特征的描述,是设置最底一级清单子目的依据,与其相关的工程内容属子细目,不单独计量,费用计入该清单子目。
【填空题】
14 2007铁路工程工程量清单计价指南___:刚构连续梁与桥墩的分界:桥墩顶部【变坡点___】以上属梁部,以下属桥墩。
【填空题】
15 2007铁路工程工程量清单计价指南___:梁的运输费用计入【架设】清单子目中。
【填空题】
16 2007铁路工程工程量清单计价指南___:桥梁基础在河滩、水中筑岛施工时应按【陆上】清单子目考虑
【填空题】
17 2007铁路工程工程量清单计价指南___:【工程量清单】是签订工程合同、支付工程款、调整工程量和办理工程结算的基础。
【填空题】
18 铁路预算定额[2017]33号路基工程规定:光面___爆破定额单位按【设计边坡面积】计算。
【填空题】
21 铁路预算定额[2017]33号桥梁工程规定:基坑回填数量=基坑开挖数量—【基坑___圬工数量】。
【填空题】
24 2007铁路工程工程量清单计价指南___:路桥分界:不设置路堤与桥台过渡段时,桥台后缺口填筑属【桥梁范围】。
【填空题】
25 2007铁路工程工程量清单计价指南___:清单子目工程量均以设计图示的工程实体净值计算,施工中的各种损耗和【因施工工艺】需要所增加的工程量,应由投标人在把投标报价时考虑。
【填空题】
26 2007铁路工程工程量清单计价指南___:【道路过渡工程】是指为了不中断既有道路交通,确保施工、运营安全所修建的过渡工程。
【填空题】
27 2007铁路工程工程量清单计价指南___:既有改造工程所引起的既有【路基落底】、抬坡的土石方数量应按相应的土石方的清单子目计量。
【填空题】
28 2007铁路工程工程量清单计价指南___:拆迁工程仅指产权不属于【路内】的拆迁工程___。
【填空题】
29 2007铁路工程工程量清单计价指南___:工程保险费是指为减少工程项目的【意外损失风险】,就所约定的范围进行工程投保所需支付的费用。
【填空题】
30 2007铁路工程工程量清单计价指南___:土钉墙分别按土钉、基础圬工和【喷射混凝土】的清单子目计量。
【填空题】
54 根据GB50500-2013规定,承包人参加投标的专业工程分包招标,应由___作为招标人,与组织招标工作有关的费用由【发包人】承担。同等条件下,应优先选择承包人中标。
【填空题】
61 《公路工程标准施工招标文件》___计量规则规定,除非另有规定,计算面积时,其长、宽应按图纸所示尺寸线或按监理人指示 计量。对于面积在【1m2】以下的固定物,如检查井等不予扣除。
【填空题】
62 《公路工程标准施工招标文件》___计量规则规定,挖方工程量计算依据图纸所示地面线、 路基设计横断面图、路基土石比例,采用【平均断面】面积法计算,包括边沟、排水沟、截水沟的土方。
【填空题】
63 《公路工程标准施工招标文件》___计量规则规定,当填料中石料含量大于【70%】时,适用于利用石方子目。
【填空题】
64 《公路工程标准施工招标文件》___计量规则规定,填方路基预留路基宽度宽填的填方量作为【路基填筑】的附属工作,不另行计量。
【填空题】
65 《公路工程标准施工招标文件》___计量规则规定,干砌片石护坡计量依据图纸所示位置和铺砌厚度,扣除【急流槽】所占部分,以立方米为单位计量。
推荐试题
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用