相关试题
【单选题】
叠合梁怎么建模 ___
A. 绘制预制梁即可
B. 先绘制梁,再叠合位置再绘制预制梁
C. 直接绘制叠合梁
【单选题】
预制柱的预制钢筋怎么算量 ___
A. 按“预制钢筋”属性输入的量计算
B. 按纵筋属性计算
C. 按箍筋属性计算
D. 以上都是
【单选题】
【云计价】云计价GCCP6.0产品定位描述正确的是()? ___
A. 利用云+大数据+人工智能技术,进一步提升现有国标计价P5在预算员作业层上的使用体验,利用新技术带来老业务新模式的变化,提升效率及易用性
B. 通过云应用进一步拉动用户上云,数据上云,为后续大数据应用铺垫好基础,向智能计价方向发展
C. 解决定额市场化下,在无定额依据情况下,支持现有计价用户投标报价的产品
D. 以上描述均正确
【单选题】
【云计价】云计价GCCP6.0包括的产品有()? ___
A. 两端:国标计价+企标计价
B. 云应用
C. 大数据
D. 以上描述均正确
【单选题】
【云计价】GCCP6.0产品价值描述正确的是()? ___
A. 全业务完善
B. 云应用
C. 大数据
D. 以上描述均正确
【单选题】
【国标计价】本次验工优化未包含的是哪一项()? ___
A. 新建变更签证
B. 导入变更签证
C. 合同外可添加分期、查看多期、预警提醒
D. 合同外工程量可分期输入或批量设置比例
【单选题】
【国标计价】下面哪个功能不属于优化范围()? ___
A. 扩大编辑区
B. 快捷键设置,提高编制效率
C. 离线转在线无需关闭工程
D. 支持新建全费用工程
【单选题】
【国标计价】端产品国标计价中主要包含()? ___
A. 全过程造价业务
B. 量价一体
C. 企标计价
D. A与B均正确
【单选题】
【国标计价】下面关于结算工程多人协作描述错误的是( )? ___
A. 支持结算工程导出
B. 支持结算工程导入
C. 不支持多人协作
D. 支持同专业工程批量导出
【单选题】
【国标计价】下面关于功能执行描述错误的是( )? ___
A. 结算合同内工程,总价措施可以修改措施费率
B. P6中快速新建单项工程以及快速新建单位工程均支持
C. 结算审核的工程中可以添加单位工程
D. 在编制界面选择某列,通过点击删除即可隐藏该列
【单选题】
【国标计价】哪个功能可以快速将项目中单位工程添加前缀( )? ___
A. 批量修改工程名称
B. 快速新建单位工程
C. 页面显示列设置
D. 编辑区扩大
【单选题】
【国标计价】全费用工程可以通过哪个功能操作( )? ___
A. 新建全费用工程
B. 载入全费用模板
C. 修改取费文件
D. 全费用切换
【单选题】
【国标计价】如果清单没有与之匹配的构件或者匹配的构件不合适,以下哪种操作可以使用户正常提取图形工程量( )? ___
A. 选择清单---选择自己算量中与之匹配的构件---设置分类条件及工程量---勾选分类条件---选择工程量代码---选择工程量---应用
B. 选择清单---选择自己算量中与之匹配的构件---勾选分类条件---选择工程量代码---选择工程量---应用
C. 选择清单---选择自己算量中与之匹配的构件---设置分类条件及工程量---选择工程量代码---选择工程量---应用
D. 选择清单---选择自己算量中与之匹配的构件---设置分类条件及工程量---勾选分类条件---选择工程量---应用
【单选题】
【国标计价】提取图形工程量后,如何快速找到哪些构件的工程量没有被提取应用( )? ___
A. 筛选
B. 显示未提取工程量清单/子目
C. 筛选-未提取构件
D. 筛选-已提取构件
【单选题】
【企标计价】不进场项目比较常见的招标形式是()? ___
A. 公开招标
B. 议标
C. 邀请招标
D. 战略招标
【单选题】
【企标计价】不属于【企业清单编制平台】核心价值的是()? ___
A. 智能组价
B. 高效编制
C. 智能清标
D. 形成企业计价数据依据
【单选题】
【企标计价】企标计价的目标客户包括()? ___
A. 中介
B. 甲方
C. 投标方
D. 以上描述均正确
【单选题】
【大数据】下面关于云定额描述正确的是( )? ___
A. 数据库无需安装,在线应用,软件安装效率成指数级增长
B. 通过云端服务,最新政策文件(勘误、费率文件等)实现快速在线更新
C. 支持补丁静默升级和定额库静默升级
D. 以上描述均正确
【单选题】
【云应用】云报表支持搜索的格式不包含()? ___
A. 关键字
B. Excel
C. PDF
D. word
【单选题】
49、【云应用】智能提量操作正确的是()? ___
A. 导入算量工程-点击提取图形工程量
B. 点击智能提量
C. 导入算量工程-点击智能提量-选择提量规则-点击立即提量
D. 点击立即提取
【单选题】
【云应用】云检查主要检查的内容是()? ___
A. 错套
B. 漏套
C. 总造价
D. 综合单价
【单选题】
【大数据】大数据主要包含哪几点()?___
A. 云定额
B. 清单模板库
C. 基准价格库
D. 企业定额库
E. 以上描述均正确
【多选题】
GTJ2021的核心价值点包含 ___
A. 业务全面:装配式模块、加腋、约束边缘、脚手架
B. 零星工程量灵活处理:自定义贴面、自定义钢筋、智能套做法
C. 云服务:云对比、云汇总
D. 高效应用:量价一体、拆分标准层、判断内外墙、人防门框墙优化
【多选题】
云对比功能的入口有哪些? ___
A. 软件开始界面
B. 绘图界面云应用模块下方
C. 建模界面通用操作模块
D. 以上都对
【多选题】
装配式构件中预制夹心保温墙包含哪些单元? ___
A. 坐浆单元
B. 内叶板单元
C. 外叶板单元
D. 保温层单元
E. 后浇单元
【多选题】
脚手架构件,支持哪些新功能 ___
A. 独立绘制
B. 自动生成
C. 支持查看三维扣减
D. 支持斜面布置
E. 以上描述均正确
【多选题】
下列对于GTJ2021高效应用描述正确的是 ___
A. 自动拆分标准层,在通用编辑分组下,可快速的将标准层展开建立。
B. 量价一体,修改GTJ模型后在计价中直接刷新工程量,实现量价实时刷新。
C. 判断内外墙,根据墙围成的最大封闭区域判断,位于封闭区域最外侧的墙以及封闭区域外的墙为外墙,位于封闭区域内的墙为内墙,内外墙以不同的颜色区分显示。
D. 钢构模型与土建模型互通,实现土建工程量与钢骨的扣减;钢构件防腐、刷漆等工程量与土建构件的扣减,计算结果更精确。
E. 城市轨道工程
【多选题】
【国标计价】本次结算优化包含哪几点()? ___
A. 结算合同内自由新增清单
B. 支持结算工程导出
C. 支持结算工程导入
D. 提供多种总价措施结算方式
【多选题】
【国标计价】复用组价描述正确的是()? ___
A. 支持自动复用组价
B. 支持提取已有组价
C. 支持过滤整个项目组价
D. 支持对比项目中相同清单综合单价是否一致
【多选题】
【国标计价】量价一体核心价值包含哪几点()? ___
A. 快速提量
B. 精准核量
C. 规则库复用
D. 工程自检
【多选题】
【企标计价】实际工程编制中的计价依据有( )? ___
A. 国标定额
B. 国标清单
C. 企业清单
D. 企业基准价
【多选题】
【云应用】云应用主要包含哪几点()? ___
A. 智能组价
B. 智能提量
C. 云报表
D. 云检查
【判断题】
GTJ2021和GTJ2018可以共存,电脑上可同时安装
【判断题】
GTJ2021仅支持5代锁,不支持4带锁
【判断题】
GTJ2021和GTJ2018的工程后缀名称相同,均为(*.GTJ)
【判断题】
智能做法包含图元做法、量分筋合两个功能,支持图元私有化做法
【判断题】
GTJ2021产品中的加腋业务,目前可以处理板加腋、梁柱水平加腋、墙加腋的加腋业务.
【判断题】
【国标计价】导航树可设置置顶/收起( )?
【判断题】
【国标计价】属性区只有下方一种模式,不能切换属性区位置( )?
【判断题】
【国标计价】标准换算中可以查看换算的来源依据( )?
推荐试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.