【单选题】
"根据GB50500-2013规定,清单中___是为完成工程项目施工,发生于该工程施工准备和施工过程中的(技术、生活)、安全、环境保护等方面的项目。
A. 分部分项
B. 其他费用
C. 预留金
D. 措施项目"
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
D
解析
暂无解析
相关试题
【单选题】
"根据GB50500-2013规定,承包人应在采购材料前将采购数量和新的材料单价报送发包人 核对,确认用于本合同工程时发包人应确认采购材料的数量和单价。发包人在收到承包人报送的确认资料后___个工作日不予答复的视为已经认可,作为调整合同价款的依据。
A. 1
B. 3
C. 5
D. 7"
【单选题】
"根据GB50500-2013规定,工程造价咨询人收到鉴定项目各方当事人对鉴定意见书征求意见稿的书面复函后,___,修改完善后再出具正式鉴定意见书。
A. 可以忽视不同意见
B. 应对各方不同意见认真复核
C. 对发包方已经认真复核
D. 对发包方已经认真复核"
【单选题】
"根据GB50500-2013规定,若发包人和承包人之间发生任何争议,首先应根据已签叁约合同的规定,提交总监理工程师或造价工程师解决,并应抄送另一方。总监理工程师或造价工程师在收到此提交件后___天内应将暂定结果通知发包人和承包人。发承包双方对暂定结果认可的,应以书面形式予以确认,暂定结果成为最终决定。
A. 5
B. 7
C. 10
D. 14"
【单选题】
"根据GB50500-2013规定,发承包双方在合同工程实施过程中已经确认的工程计量结果和合同价款,在竣工结算办理中应 ___。
A. 重新确认
B. 工程量需重新确认
C. 直接进入结算
D. 工程单价需重新确认"
【单选题】
"根据GB50500-2013规定,承包人现场签证和得到发包人确认的索赔金额应___应增加的金额中。
A. 列入最终结算
B. 列入本周期
C. 不应列入本周期
D. 列入本周期"
【单选题】
"根据GB50500-2013规定,承包人的预付款保函的担保金额根据预付款扣回的数额相应递,但在预付款全部扣回之前一直保持有效。发包人应在预付款扣完后的___天内将预付款保函退还给承包人。
A. 15
B. 10
C. 14
D. 7"
【单选题】
"根据GB50500-2013规定,在施工过程中,当发现合同工程内容因场地条件、地质水文、发包人要求等不一致时,___应提供所需的相关资料,并提交( A )签证认可,作为合同价款调整的依据。
A. 承包人 、发包人
B. 发包人 、承包人
C. 发包人 、监理
D. 承包人 、监理"
【单选题】
"根据GB50500-2013规定,发包人在招标工程量清单中给定的暂估价属于依法必须招标的,应由___以招标的方式选择供应商,确定价格,并应以此为依据取代暂估价,调整合同价款。
A. 承包人
B. 发包人
C. 监理
D. 发承包双方"
【单选题】
"根据GB50500-2013规定,实行招标的工程合同价款应在中标通知书发出之日起___天内,由发承包双方依据招标文件和中标人的投标文件在书面合同中约定。合同约定不得违背招标、投标文件中关于工期、造价、质量等方面的实质性内容。招标文件与中标人投标文件不一致的地方,应以投标文件为准。
A. 20
B. 30
C. 40
D. 60"
【单选题】
"根据GB50500-2013规定,___是根据国家法律、法规规定,由省级政府或省级有关权力部门规定施工企业必须缴纳的,应计入建篷筑安装工程造价的费用。
A. 综合单价
B. 税金
C. 措施费
D. 规费 "
【单选题】
"根据GB50500-2013规定,安全文明施工费,就是在合同履行过程中,承包人按照国家法律、法规、标准等规定,为保证___,保护现场内外环境和搭拆临时设施等所采用的措施而发生的费用。
A. 工程质量
B. 工程进度
C. 安全施工、文明施工
D. 上级检查"
【单选题】
"根据GB50500-2013规定,承包人应在收到发包人指令后的7天内向发包人提交现场签证报告,发包人应在收到现场签证报告后的___小时内对报告内容进行核实,予以确认或提出修改意见。
A. 20
B. 30
C. 40
D. 48"
【单选题】
"根据GB50500-2013规定,已签约合同价中的暂列金额应由___掌握使用, 发包人按照本规范第9.1节至第9.14节的规定支付后,暂列金额余额应归( )所有。
A. 承包人 、发包人
B. 发包人 、承包人
C. 发包人 、发包人
【单选题】
"根据GB50500-2013规定,承包人对___应专款专用,在财务账目中应单独列项备查,不得挪作他用,否则发包人有权要求其限期改正;逾期未改正的,造成的损失和延误的工期应由承包人承担。
A. 措施费
B. 规费
C. 安全文明施工费
D. 税金"
【单选题】
"根据GB50500-2013规定,招标工程承包人的报价浮动率可按下列___公式计算。
A. 承包人报价浮动率L=(招标控制价/中标价—1)×100%
B. 承包人报价浮动率L=(1—中标价/招标控制价)×100%
C. 承包人报价浮动率L=(1+中标价/招标控制价)×100%
D. 承包人报价浮动率L=(1—中标价/预算价)×100%"
【单选题】
"根据GB50500-2013规定,包工包料工程的预付款的支付比例不得低于签约合同价(扣除暂列金额)的___,不宜高于签约合同价(扣除暂列金额)的( )。
A. 10% 、20%
B. 10% 、30%
C. 10% 、40%
D. 20% 30%"
【单选题】
"根据GB50500-2013规定,已标价工程量清单中的单价项目,承包人应按工程计量确认的工程量与综合单价计算;综合单价发生调整的,以___的综合单价计算进度款。
A. 承包人 确认
B. 发包人 确认
C. 监理确认
D. 发承包双方确认调整 "
【单选题】
"根据GB50500-2013规定,关于进度款,发料金额应按照___提供的单价和数量从进度款支付中扣除,列人本周期应扣减的金额中。
A. 发包人 签约
B. 承包人签约
C. 监理签约
D. 供货商"
【单选题】
"根据GB50500-2013规定,承包人应在每个计量周期到期后的7天内向发包人提交已完工程进度款支付申请一式四份,详细说明此周期认为有权得到的款额,包括分包人已完工程的价款。支付申请应包括下列内容:累计已完成的合同价款; 累计已实际支付的合同价款;及___
A. 材料采购价款
B. 现场管理费
C. 本周期合计完成的合同价款
D. 施工水电费"
【单选题】
"根据GB50500-2013规定,最终结清时,承包人被预留的质量保证金不足以抵减发包人工程缺陷修复费用的,___应承担不足部分的补偿责任。
A. 发包人
B. 承包人
C. 承包人提出申请后由发包人
D. 监理"
【单选题】
"根据GB50500-2013规定,竣工结算阶段,对监理或造价工程师暂定合同价款争议发生后,发承包双方可就工程计价依据的争议以书面形式提请___对争议以书面文件进行解释或认定。
A. 发包人
B. 工程造价管理机构
C. 法院
D. 仲裁"
【单选题】
"根据GB50500-2013规定,合同工程竣工结算核对完成,发承包双方签字确认后,发包人___承包人与另一个或多个工程造价咨询人重复核对竣工结算。
A. 必须要求
B. 可以要求
C. 不得要求
D. 与监理协商后可以要求
【单选题】
"根据GB50500-2013规定,发包人未按照本规范第11.4.3条、第11.4.4条规定支付竣工结算款的,承包人可催告发包人支付,___获得延迟支付的利息。
A. 并有权
B. 无权
C. 经分包方同意后方可
D. 经监理同意后方可"
【单选题】
"根据GB50500-2013规定,承包人未按照合同约定履行属于自身责任的工程缺陷修复义务的,发包人___用于缺陷修复的各项支出。经查验,工程缺陷属于发包人原因造成的,应由发包人承担查验和缺陷修复的费用。
A. 有权从质量保证金中扣除
B. 无权从质量保证金中扣除
C. 自筹资金、
D. 有权从监理费用中扣除"
【单选题】
"根据GB50500-2013规定,在合同约定的缺陷责任期终止后,发包人应按照本规范第11. 6节的规定,将___返还给承包人。
A. 全部质量保证金
B. 全部质量保证金及其利息
C. 剩余的质量保证金
D. 全部质量保证金都无须"
【单选题】
"根据GB50500-2013规定,___在收到工程造价管理机构书面解释或认定后仍可按照合同约定的争议解决方式提请仲裁或诉讼。除工程造价管理机构的上级管理部门作出了不同的解释或认定,或在仲裁裁或法院判决中不予采信的外,工程造价管理机构作出的书面解释或认定应为最终结果,并应对发承包双方均有约束力。
A. 发承包双方都
B. 监理方
C. 发承包双方或一方
D. 发包人"
【单选题】
"根据GB50500-2013规定,关于最终结清,发包人应在收到最终结清支付申请后的14天内予以核实,并应向承包人___。
A. 支付全部质量保证金
B. 签发质保期终止证书
C. 支付剩余的质量保证金
D. 签发最终结清支付证书"
【单选题】
"根据GB50500-2013规定,关于最终结清,发包人未在约定的时间内核实,又未提出具体意见的,应视为承包人提交的最终结清支付申请___。
A. 已被发包人认可
B. 已被发包人拒绝
C. 还需进一步审核
D. 无效"
【单选题】
"根据GB50500-2013规定,承包人对发包人支付的最终结清款有异议的,应按照___的争议解决方式处理。
A. 发包人提出的
B. 承包人提出的
C. 监理提出的
D. 合同约定"
【单选题】
"根据GB50500-2013规定,因发包人违约解除合同的,发包人除应按照本规范第12.0.2条的规定向承包人支付各项价款外,应按合同约定核算发包人应支付的违约金以及给承包人造成损失或损害的索赔金额费用。该笔费用应由承包人提出,___的7天内向承包人签发支付证书。协商不能达成一致的,应按照合同约定的争议解决方式处理
A. 监理确认后
B. 发包人核实后应与承包人协商确定后
C. 承包人提出后
D. 解除合同"
【单选题】
"根据GB50500-2013规定,合同履行期间,如果发承包双方发生了争议,___可将该争议以书面形式提交调解人,并将副本抄送另一方,委托调解人调解。
A. 任何一方
B. 监理方
C. 发承包双方协商一致后
D. 发包方"
【单选题】
"《公路工程标准施工招标文件》(2018版)清单计价规则中规定:结构物已完工程量计量时,钢筋的体积不扣除,体积不超过___m3的开孔及开口不扣除。
A. 0.03
B. 0.05
C. 0.06
D. 1"
【单选题】
"《公路工程标准施工招标文件》(2018版)清单计价规则中规定:当填料中石料含量___时,适用于利用土石方混填子目。
A. 小于20%
B. 小于25%
C. 小于30%
D. 小于35% "
【单选题】
"《公路工程标准施工招标文件》(2018版)技术规范中要求:施工驻地选址应安全,严禁设置在泥石流、滑坡体、洪水位下等危险区域,避开取土、弃土场、塌方、落石、危岩等地段,距离集中爆破区___m以外。
A. 100
B. 300
C. 500
D. 1000"
【单选题】
"《公路工程标准施工招标文件》(2018版)计量规则中承包人施工机械设备保险和雇用人员工伤事故保险费、人身意外伤害保险费由___承担。
A. 发包人
B. 承包人
C. 发包人和承包人共同
D. 承包人和监理人共同"
【单选题】
"《公路工程标准施工招标文件》(2018版)计量规则中清除现场工作内容是清理场地表面___ 范围内的垃圾、废料、表土、石头、草皮。
A. 0~10cm
B. 0~20cm
C. 0~30cm
D. 0~50cm"
推荐试题
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding