相关试题
【多选题】
ATC型板式楼梯中,楼板两侧设置边缘构件,说法正确的是() ___
A. 抗震等级为一二级时不少于6根
B. 抗震等级为三四级不少于4根
C. 纵筋直径不小于12且不小于楼板纵向受力钢筋的直径
D. 箍筋直径不小于6,间距不大于200
【多选题】
墙身竖向分布钢筋在基础中的构造中,基础内箍筋说法正确的是() ___
A. 间距≤500
B. 不少于两道水平分布钢筋
C. 不少于两道拉结筋
D. 间距≥500
【多选题】
16G平法规范中柱插筋弯折长度不再判断a值,下列哪项是正确的() ___
A. 当基础的厚度Hj >Lae时,柱插筋弯折长度为max(6d,150);
B. 当基础的厚度Hj≤Lae时,柱插筋的弯折长度为15d;
C. 当基础的厚度Hj >Lae时,柱插筋弯折长度为max(15d,150);
D. 当基础的厚度Hj≤Lae时,柱插筋的弯折长度为6d;
【多选题】
基础主次梁相交时附加吊筋描述正确的是() ___
A. 平直段=次梁宽度+100
B. 斜长考虑角度60°
C. 弯折长度20d
D. 斜长考虑角度45°
【多选题】
基础梁底不平,高差坡度a可用() ___
A. 30°
B. 45°
C. 60°
D. 90°
【多选题】
梁板式发型基础平板板底部平,高差坡度a可用() ___
A. 30°
B. 45°
C. 60°
D. 90°
【多选题】
GTJ2018软件中下列哪些构件可以三点变斜构件? ___
A. 筏板基础
B. 面式垫层
C. 大开挖土方
D. 大开挖灰土回填
E. 桩承台
【多选题】
在GTJ2018中筏板基础端部外伸上部钢筋构造包括? ___
A. 上部钢筋伸到端部弯折12d
B. 上下部钢筋端部搭接150
C. 上部钢筋伸到端部弯折15d
D. 上下部钢筋端部搭接100
E. 上部钢筋伸到端部弯折10d
【多选题】
在GTJ2018中常见的拉筋布置形式有哪两种? ___
A. 梅花布置
B. 矩形布置
C. 直行布置
D. 点式布置
E. XY布置
【多选题】
承台需要计算哪些工程量? ___
A. 钢筋
B. 混凝土
C. 模板
D. 脚手架
E. 装修
【多选题】
做工程时搭接形式应该如何选择? ___
A. 按图纸
B. 按实际
C. 按定额规则
D. 随意选择
E. 以上都对
【多选题】
在GTJ2018中下列哪个构件不能使用直线式绘制法进行绘制 ___
A. 框架柱
B. 独立基础
C. 桩承台
D. 梁
E. 砌体墙
【多选题】
在GTJ2018中下列对马凳筋的表示方式正确的是? ___
A. 200B12
B. B12@1000*1000
C. B12@1000
D. 200B12@1000*1000
E. 200B12@1000
【多选题】
在GTJ2018中可以处理的拱构件有( ) ___
A. 拱梁
B. 拱板
C. 拱墙
D. 拱柱
E. 拱暗梁
【多选题】
GTJ2018中支持导出工程的格式有? ___
A. GFC
B. IFC
C. 导出工程
D. 导出选定构件
E. 导出GMS
【多选题】
在GTJ2018中自动生成吊筋后,软件提供了三种处理吊筋与次梁加筋的方式,下列表述正确的是? ___
A. 软件提供了查改吊筋的功能来修改单个吊筋或次梁加筋的信息
B. 需要删除生成的某些吊筋和次梁加筋可以使用删除吊筋
C. 在绘图区希望隐藏吊筋和次梁加筋的图形和标注可以使用隐藏/显示吊筋功能
D. 可用生成侧面钢筋进行修改
E. 显示吊筋直接修改
【多选题】
___
A. 踢脚
B. 墙裙
C. 独立柱装修
D. 保温层
E. 以上都对
【多选题】
在GTJ2018中以下那些量可以构成筏板基础防水面积? ___
A. 外墙外侧筏板平面面积
B. 斜面面积
C. 直面面积
D. 底部面积
E. 顶部面积
【多选题】
在GTJ2018中构件导航树下门窗洞包含的构件类型有哪些? ___
A. 门、窗、门联窗
B. 带形窗、带形洞
C. 飘窗、老虎窗
D. 过梁、壁龛
E. 墙洞、板洞
【多选题】
GTJ2018人防门框墙可支持哪些方式查看工程量? ___
A. 查看计算式
B. 查看工程量
C. 查看钢筋量
D. 编辑钢筋
E. 查看图元
【多选题】
关于GTJ2018人防门框墙说明正确的是? ___
A. 构造可以自由搭配
B. 截面可以编辑
C. 钢筋可以截面编辑
D. 可以钢筋三维
E. 可以任意绘制
【多选题】
在GTJ2018中下列哪些构件点式绘制时可以查找由带形窗围成的封闭区域内( ) ___
A. 建筑面积
B. 现浇板
C. 房间
D. 散水
E. 点式垫层
【多选题】
在GTJ2018中下列关于自动生成过梁的功能表述正确的的是? ___
A. 自动生成过梁时伸出长度超过墙时能自动断开;
B. 自动生成过梁时,当门窗距框架梁底的距离不足过梁高度时,软件会按照门窗距框架梁底之间的高度来生成
C. 过梁可以分尺寸自动生成,同时不同的过梁还可以设置不同的钢筋
D. 幕墙上的门窗洞不生成过梁,
E. 布置在墙上飘窗不能成过梁。
【多选题】
在GTJ2018中,门构件按照洞口形状提供了几种类型门? ___
A. 矩形门
B. 异形门
C. 参数化门
D. 标准门
E. 圆形门
【多选题】
在GTJ2018中,窗构件按照洞口形状提供了几种类型窗 ___
A. 矩形窗
B. 异形窗
C. 参数化窗
D. 标准窗
E. 圆形窗
【多选题】
当需要在准确的位置绘制门窗洞口时,可以使用精确布置的功能,在GTJ2018支持的门窗洞精确布置的构件 ___
A. 门
B. 窗
C. 门联窗
D. 墙洞
E. 带形窗
【多选题】
在GTJ2018中在砌体墙与框架柱、构造柱、剪力墙相交位置生成砌体加筋,可以生成( ) ___
A. T形
B. L形
C. 一字形
D. 十字形
E. U字型
【多选题】
GTJ2018人防门框墙拉筋功能表述正确的是? ___
A. 拉筋可使用布置拉筋功能支持根数布置
B. 拉筋可使用布置拉筋功能支持单间距布置
C. 拉筋可使用布置拉筋功能支持间距*间距布置,
D. 节点设置支持矩形及梅花布置。
E. 节点设置支持XY方向及梅花布置。
【多选题】
在GTJ2018中提供的设置斜柱的方法( ) ___
A. 按倾斜角度设置斜柱
B. 按倾斜尺寸设置斜柱
C. 正交偏移设置斜柱
D. 极轴偏移设置斜柱
E. 按高度设置斜柱
【多选题】
在GTJ2018中工程中涉及到超高模板的构件有哪些? ___
A. 柱
B. 墙
C. 梁
D. 板
E. 楼梯
【多选题】
在GTJ2018中下列哪种属于梁原位标注的识别方式? ___
A. 自动识别原位标注
B. 点选识别原位标注
C. 框选识别原位标注
D. 单梁识别原位标注
E. 单构件识别原位标注
【多选题】
在GTJ2018中下列关于软件中幕墙构件的表述正确的是( ) ___
A. 幕墙上面可以布置门窗洞
B. 幕墙可以和普通的砼墙重叠绘制
C. 幕墙可以设置起拱
D. 幕墙上可以布置装修
E. 幕墙可以设置斜墙与墙体拉通
【多选题】
在GTJ2018中下列关于柱B边一侧中部筋的输入正确的是? ___
A. 4B22
B. #4B22+2B20
C. *4B22+2B20
D. &4B22+2B20
E. 4B22+2B20
【多选题】
在GTJ2018软件中,下列表述错误的是 ___
A. 在楼层设置中的标高通常用mm表示。
B. 软件中,构件的填充颜色只能一个一个在属性中修改(。
C. 绘图过程中,由于要正确计算钢筋,必须按照支座关系的先后顺序:如柱-梁-板的顺序是不能变的,墙-门窗的顺序是不变的.
D. 同一楼层分层板可以分层之间复制。
E. 软件中的快捷键都是不能修改的
【多选题】
在GTJ2018中拐角处的转角窗如何处理表述正确的是? ___
A. 可以定义带形洞,直线去绘制完,画完之后合并即可
B. 可以定义带形窗,直线去绘制,画完之后合并即可
C. 转角窗只能分别建立两个窗来布置
D. 软件不能处理
E. 带形窗和带形洞处理都可以;
【多选题】
在GTJ2018中关于表格输入表述正确的有 ___
A. 表格输入是算量软件中辅助用户算量的一个工具模块,对于预算中的一些零星工程量、参数化的图集(楼梯、灌注桩等工程量)可以在表格输入中计算。
B. 表格输入的单构件不能存盘
C. 表格输入中可以将指定的构件钢筋信息全部锁定,锁定后的构件钢筋信息不能编辑修改;需要编辑可以使用解锁构件进行解锁。
D. 表格输入包括土建输入和钢筋输入
E. 表格输入钢筋参数输入构件后,钢筋再也不能手动修改。
【多选题】
2013清单工程量计算规范下,门窗的框厚属性会影响到哪些工程量的计算? ___
A. 保温层面积
B. 墙面抹灰面积
C. 墙面块料面积
D. 楼地面的块料地面积
E. 以上都有影响
【多选题】
在GTJ2018中,下列哪个构件可以自动生成过梁? ___
A. 门
B. 老虎窗
C. 壁龛
D. 带型窗
E. 窗
【多选题】
在GTJ2018中设置斜柱功能可以对以下哪些构件操作?( ) ___
A. 框柱
B. 构造柱
C. 转换柱
D. 端柱
E. 暗柱
【多选题】
在GTJ2018中可以点绘可以选中下列哪些图元进行垫层布置 ___
A. 独立基础
B. 集水坑
C. 下柱墩
D. 筏板基础
E. 桩承台
推荐试题
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol