【单选题】
公路工程的计价方式是( )___
A. 综合单价
B. 全费用单价
C. 只含人、材、机
D. 只含人、材、机、管理费、利润
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
公路的部分施工机械需要计取( ),每个省基本都有对应的文件___
A. 人工价
B. 规费
C. 车船税
D. 广材助手
【单选题】
公路的清单编码是从第( )章到第( )章?___
A. 100,700
B. 1,7
C. 100,500
D. 1,5
【单选题】
当公路项目较偏远时,需要考虑( )费用___
A. 机械费
B. 材料运输费用
C. 人工费
D. 材料费
【单选题】
防治山区、丘陵区、风沙区水土流失,保护、改良与合理利用水土资源,并充分发挥水土资源的经济效益和社会效益;建立良好生态环境。这段话描述的是( )工程。___
A. 水电
B. 火电
C. 水保
D. 电力
【单选题】
云水利水电GWH5.0在新建时有哪些模块可以选择?___
A. 水利、 水电、 水保
B. 水利、水电
C. 水电、水保
D. 水电、火电
【单选题】
云水利水电GWH5.0报表不能导出哪种格式的?___
A. Excel
B. PDF
C. word
【单选题】
水利水电的定额都是( )定额,材机的价格可以来自信息价、询价、民建价格。___
A. 估价表
B. 消耗量
C. 非消耗量
【单选题】
改变了老水利每个单位工程重复编辑的麻烦,大幅提升了编制造价的工作效率。这段话描述的是水利水电GWH5.0中( )价值点?___
A. 与民建及其他行业无缝对接
B. 快速新建多个标段
C. 统一设置费率
D. 基础单价统一编制
【单选题】
以下( )不属于石油石化工程的内容。___
A. 采油工程
B. 钻井工程
C. 通风工程
D. 地质工程
【单选题】
石油石化行业中,在2020年即将要出的新定额是( )___
A. 石化2019概算指标、石化2019预算定额
B. 石油2019概算指标、石化2019预算定额
C. 石油石化2018概预算定额
D. 石油石化2019概预算定额
【单选题】
行业计价平台的名称是___
A. GICP 4.0
B. GICP 5.0
C. GICQ 4.0
D. GCCP 5.0
【单选题】
行业产品部在2020年在( )行业即将发布地区版。___
A. 电力
B. 公路
C. 水利水电
D. 石油石化
【单选题】
( )功能是行业产品的通用价值功能___
A. 内接广场助手
B. 装材运输费
C. 砼增加费
D. 统计工程量
【多选题】
公路与市政客户群最明显的区别在于( )___
A. 主管部门不同
B. 使用定额规范不同
C. 建设区域不同
D. 业务范围不同
【多选题】
以下哪些价值点属于行业产品GICP5.0( )___
A. 与广材助手无缝对接
B. 可借用民间定额
C. 智能组价
D. 云指标
E. 云报表
【多选题】
水利水电中与民建定额区别最大的是( )___
A. 消耗量定额
B. 全费用综合单价
C. 有量无价
D. 有价无量
【多选题】
公路产品最大的核心优势有哪些?( )___
A. 清单指引
B. 取费设置
C. 多项目结构
D. 借用民建定额
E. 复用数据
【多选题】
云电力GEC5.0包含哪些模块?___
A. 火电
B. 水电
C. 变电
D. 技改拆除
E. 火电检修
F. 送电
G. 内蒙配网
【判断题】
云电力GEC5.0可以处理火力发电的计价项目。
A. 对
B. 错
【判断题】
云电力GEC5.0中查询相应材料价格可以使用广材助手功能。
A. 对
B. 错
【判断题】
云水利水电定额与传统定额的区别在于,其为消耗量定额,有价无量。
A. 对
B. 错
【判断题】
云水利水电GWH5.0中不可以借用民建定额
A. 对
B. 错
【判断题】
石油石化云计价软件分为两个模块,分别是中石油、中石化
A. 对
B. 错
【单选题】
客户风险测试评估有效期限是___。
A. 1年
B. 2年
C. 0.5年
D. 1.5年
【单选题】
本行对___岁以上(含)的客户进行风险评估时,将其风险承受能力上限限定为中级。
A. 55
B. 60
C. 65
D. 70
【单选题】
理财系统中账户密码连输___次将会被锁定。
A. 3
B. 4
C. 5
D. 6
【单选题】
李明因工作忙,可以请其母亲代理办理的是___
A. 个人理财签约
B. 个人理财购买
C. 个人理财账户变更
D. 所购理财款项到账,支取款项
【单选题】
单位客户购买理财时不需填定客户风险属性测试书,其风险承受能力默认为___
A. 中低
B. 中等
C. 中高
D. 高
【单选题】
我行客户申请变更理财签约账号可以通过___办理
A. 帐户开户网点
B. 账户所属一级分支行
C. 我行任意网点
D. 手机银行网上银行
【单选题】
柜面认购封闭式理财产品截止至募集期最后一天___
A. 16:00
B. 16:30
C. 16:40
D. 16:45
【单选题】
理财签约,一个客户(同一客户号)允许有___个签约账户。
A. 1
B. 2
C. 3
D. 4
【单选题】
风险评级为低风险、中低风险的理财产品,单一客户销售起点金额不得低于 ( )万元人民币;风险评级为中风险、中高风险的理财产品,单一客户销售起点金额不得低于 ( )万元人民币;风险评级为高风险的理财产品,单一客户销售起点不得低于( )万元人民币。___
A. 5 5 10
B. 5 10 10
C. 5 10 20
D. 5 20 20
【单选题】
理财产品(计划)包含的相关交易工具面临的风险不包括___
A. 信用风险
B. 操作风险
C. 声誉风险
D. 流动性风险
【单选题】
我行理财系统中,连续输入错误密码第___次时将被锁定
A. 6
B. 5
C. 4
D. 3
【单选题】
___是指客户过过理财规划所要实现的目标或满足的期望。
A. 理财目标
B. 投资目标
C. 理财目的
D. 投资目的
【单选题】
关于货币性理财产品,以下描述错误的是___
A. 主要投资于货币市场
B. 投资期短,资金赎回灵活
C. 收益安全性高
D. 本金保证
【单选题】
理财门户代理贵金属业务的可交易品种不包括___
A. Au99.99
B. Au99.95
C. Au100g
D. Au(T+D1)
【单选题】
按照上海黄金交易所有关规定,客户上月()日至本月( )日有贵金属库存积数时不能进行产品解约 ___
A. 10 10
B. 15 15
C. 20 20
D. 25 25
【单选题】
客户到我行开办贵金属代理业务的任意网点进行理财门户签约时支持采用身份证开户的结算账户不包括___
A. 存折
B. 普通兰花卡
C. 金融IC卡
D. 白金卡
【单选题】
在办理理财门户签约时,《银银平台理财门户客户签约三方协议》的“兴业银行联”联同客户有效身份证复印件于___交到总行个金部。( )
A. 每月21日前
B. 每月5日前
C. 每季度第一个月5日前
D. 每季度第一个月21日前
推荐试题
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack