【填空题】
根据《铁路基本建设项目投资管理办法》铁总计统[2017]179号文的规定,建设单位应将施工图优化设计纳入勘察设计、施工图审核合同管理,并约定相应的考核条件。施工图设计优化核减的工程投资作为项目___由建设单位管理使用。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
基本预备费
解析
暂无解析
相关试题
【填空题】
根据《铁路基本建设项目投资管理办法》铁总计统[2017]179号文的规定,铁路项目在决策审查期间,建设单位在现场踏勘的基础上组织相关业务部门、咨询单位<可邀请有关专家>对项目可行性研究报告进行初审并出具初审意见报___。
【填空题】
《关于印发铁路工程混凝土结构高强钢筋设计规定》铁总建设[2015]343号文 规定,使用通用参考图的混凝土工程,在采用HRB400钢筋的通用参考图发布前,暂按___的原则用HRB400钢筋代换图中的HRB335钢筋。
【填空题】
《关于铁路建设项目实施阶段材料价差调整的指导意见》铁建设[2009]46号文规定,铁路项目实施中,建设单位要根据材料调差批复,履行决策程序,与施工单位签订___,依据合同约定和已完工程数量等,与施工单位办理材料价差结算。
【填空题】
《关于铁路建设项目实施阶段材料价差调整的指导意见》铁建设[2009]46号文规定,铁路项目施工合同有风险包干费的,概算内材料价格变化幅度<以批准编制期概算为准>在___以内部分由施工企业承担,超出部分纳入概算并由建设单位承担。
【填空题】
《关于公布<铁路路基工程预算定额>等二十九项定额标准的通知》铁总建设[2016]359号文等现行定额中的其他材料费乘以___的系数,其他机械使用费乘以___的系数,其他消耗量按原定额执行。
【填空题】
《关于转发财政部、税务总局调整增值税税率等5个文件的通知》铁总办财[2018]58号文要求,自2018年5月1日起,铁路项目各单位必须按照___方式签订各类采购合同,增值税税率按财税[2018]32号文件执行;对已签订但尚未执行的购买合同,各单位必须按财税文件[2018]32号文规定增值税税率,对价格和合同条款进行调整。
【填空题】
《关于转发财政部、税务总局调整增值税税率等5个文件的通知》铁总办财[2018]58号文要求,自2018年5月1日起,已签订建设项目合同的建设项目,采用一般计税方法的,建设单位应于施工单位按照价税分离的原则签订补充合同,约定剩余建筑安装工程费税金与设备购置费税金按10%的税率计算,并相应调整合同额,减少投资纳入项目___管理。
【填空题】
依据《铁路建设项目验工计价办法》的通知,铁路建设工程验工计价报表应由施工承包单位编制、监理单位审核、建设单位核准,其他验工计价报表由___编制、建设单位核准,并由各单位负责人签字、加盖单位印章。
【填空题】
根据最新版《造价工程师职业资格制度规定》,造价工程师分为___和二级造价工程师。
【填空题】
国家设置造价工程师___,纳入国家职业资格目录。
【填空题】
一级和二级造价工程师职业资格考试均设置基础科目和___。
【填空题】
国家对造价工程师职业资格实行___制度。
【填空题】
造价工程师执业时应持注册证书和___。
【填空题】
取得造价工程师注册证书的人员,应当按照国家专业技术人员继续教育的有关规定接受___,更新专业知识,提高业务水平。
【填空题】
一级造价工程师职业资格考试设《建设工程造价管理》《建设工程计价》___《建设工程造价案例分析》4个科目。
【填空题】
建筑安装工程费按照工程造价形成由分部分项工程费、___、___、规费、税金组成。
【填空题】
建筑安装工程费按照费用构成要素划分:由人工费、材料<包含工程设备>费、___、企业管理费、利润、___和税金组成。
【填空题】
建筑工程施工发包与承包价在政府宏观调控下,由___形成。
【填空题】
政府性融资担保机构应按照市场化方式运作,依法依规开展___,自主经营、自负盈亏,不得要求或接受地方政府以任何形式在出资范围之外承担责任。
【填空题】
对于中央预算内直接投资项目,因项目建设期价格大幅上涨、政策调整、地质条件发生重大变化和自然灾害等不可抗力因素等原因导致原核定概算不能满足工程实际需要的,可以向___申请调整概算。
【填空题】
公路工程缺陷责任期的“缺陷”是指建设工程质量不符合工程建设强制性标准、___,以及承包合同的约定。
【填空题】
根据《房屋建筑和市政基础设施工程施工招标投标管理办法》<建设部令第89号>,工程施工招标分为公开招标和___。
【填空题】
根据《房屋建筑和市政基础设施工程施工招标投标管理办法》<建设部令第89号>,招标人采用邀请招标方式的,应当向___个以上符合资质条件的施工企业发出投标邀请书。
【填空题】
增值税一般纳税人<以下称“纳税人”>提供建筑服务,按规定适用或选择适用简易计税方法计税的,实行___制。
【填空题】
国务院___部门指导和协调全国招标投标工作,对国家重大建设项目的工程招标投标活动实施监督检查。
【填空题】
依法必须进行招标的项目的境内投标单位,以现金或者支票形式提交的投标保证金应当从其___转出。
【填空题】
___级交通运输主管部门对公路工程定额中缺项的,或者地域性强且技术成熟的建设工艺,可以编制补充性定额规定。
【填空题】
《公路工程标准施工招标文件》2018版与2009版相比,增加了___章节。
【填空题】
《公路工程标准施工招标文件》<2018版>中投标偏差分为___和细微偏差。
【填空题】
合同签订之后28天内,承包人向监理人报送施工进度计划,进度计划应按照关键线路网络图和___两种形式分别编绘,并应包括每月预计完成的工作量和形象进度。
【填空题】
根据《企业安全生产费用提取和使用管理办法》<财企〔2012〕16号>,施工企业以建筑安装工程造价为计提依据,其中铁路工程提取标准为___%。
【填空题】
根据《企业安全生产费用提取和使用管理办法》<财企〔2012〕16号>,施工企业以建筑安装工程造价为计提依据,其中公路工程工程提取标准为___%。
【填空题】
《公路工程标准施工招标文件》<2018版>明确了投标保证金___计算利息。
【填空题】
根据《公路工程标准施工招标文件》<2018版>,当图纸与工程量清单所列数量不一致时,以___作为报价的依据。
【填空题】
《公路工程标准施工招标文件》<2018版>中对于信用查询,新增投标人在___网站查询的要求。
【填空题】
国务院___主管部门负责全国建筑业企业资质的统一监督管理。
【填空题】
施工劳务资质___类别与等级。
【填空题】
铁路预算定额[2017]33号路基工程规定:___是指临时场站至工点间的运输。
【填空题】
铁路预算定额[2017]33号路基工程规定: 路基土石方工程中汽车运输定额仅适用于10km 及以内运输,超过10km部分应乘以___的系数。
【填空题】
铁路预算定额[2017]33号路基工程规定:岩土天然密实方与压实方换算系数表中已考虑了___。
推荐试题
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security