刷题
导入试题
【判断题】
给药时要严格执行三查七对制度
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
对有疑问的医嘱,应了解清楚后方可给药
A. 对
B. 错
【判断题】
如发现给药错误,应将错就错,妥善处理,避免纠纷
A. 对
B. 错
【判断题】
摆药时应仔细检查药物的有效期及有无变质,用药时无需再次查对
A. 对
B. 错
【判断题】
护理部主任应每周随时轮流巡回查房
A. 对
B. 错
【判断题】
科(总)护士长应每日上午巡视病房
A. 对
B. 错
【判断题】
病区护士长每周一次进行护理业务查房
A. 对
B. 错
【判断题】
组织教学查房一般需选择典型病例
A. 对
B. 错
【判断题】
科(总)护士长每两周进行一次专科护理业务查房
A. 对
B. 错
【判断题】
对患者的卫生宣教不需要(贯穿患者就医的全过程
A. 对
B. 错
【判断题】
住院患者的宣教可以不要记录在健康教育登记表中
A. 对
B. 错
【判断题】
住院患者在入院介绍、诊治护理过程、出院指导内容中均应有卫生常识及防病知识的宣教
A. 对
B. 错
【判断题】
凡属复杂、疑难或跨科室和专业的护理问题和护理操作技术,均可申请护理会诊
A. 对
B. 错
【判断题】
需进行专科护理会诊的,由责任护士向相关专科提出书面会诊申请
A. 对
B. 错
【判断题】
参加会诊人员原则上应由副主任护师以上人员,或由被邀请科室护士长指派人员承担
A. 对
B. 错
【判断题】
集体会诊者,由护理部组织,申请科室由护士长负责介绍患者的病情,并认真记录会诊意见
A. 对
B. 错
【判断题】
科内会诊,由责任护士提出,护士长或主管护师主持,召集有关人员参加,并进行总结。责任护士负责汇总会诊意见
A. 对
B. 错
【判断题】
科间会诊被邀请科室接到通知后24小时内完成
A. 对
B. 错
【判断题】
申请会诊前与管床医生沟通,征得病人及家属同意,按要求填写会诊单,提供病人相关信息,做好相关物品准备
A. 对
B. 错
【判断题】
邀请外院专家对复杂疑难病情进行护理会诊时,由护士长书面上报护理部,同意后方可实施
A. 对
B. 错
【判断题】
在进行医疗护理操作时,至少要使用两种或两种以上信息(如姓名、床号、床头卡等)来识别患者的方法
A. 对
B. 错
【判断题】
手术病人、昏迷、神志不清、无自主能力的重症患者以及小儿和一级护理的病人,均使用“腕带”作为操作前识别病人身份的重要标识。护士在使用腕带时,扫描腕带与床头卡,准确识别患者身份
A. 对
B. 错
【判断题】
术毕手术室护士应与病区护士认真核对腕带、病历,做好病人、病情、药品及物品的交接,核对无误后方可离开
A. 对
B. 错
【判断题】
填入腕带的识别信息必须由一名医务人员核对后方可使用,若损坏需更新时,需要经另一人重新核对;腕带内容填写要求字迹清晰、准确规范,项目包括:病区、床号、姓名、性别、年龄、住院号、诊断等
A. 对
B. 错
【判断题】
在病房、手术室、ICU之间转运交接病人时,使用“腕带”作为识别患者身份的标识,填写交接登记本,双方签名
A. 对
B. 错
【判断题】
使用腕带前无需向病人或家属做好宣教
A. 对
B. 错
【判断题】
手术患者科间交接过程中,严格使用两种或两种以上(姓名、住院号、出生日期)信息进行患者身份识别,并查对手术部位,防止手术相关错误的发生,双方在交接单上共同签名
A. 对
B. 错
【判断题】
护士长每周跟班检查1~2 例手术患者的术前和术后交接,实地查看交接核查全过程,每季度对检查结果进行分析讲评和整改
A. 对
B. 错
【判断题】
科间交接中,手术患者科间交接必须使用“手术患者科间交接核查单”,病房患者转科交接必须使用“科间交接登记本”,并双方签名
A. 对
B. 错
【判断题】
患者术后需要进入麻醉恢复室时,巡回护士应随麻醉医师和手术医师一道,将患者送入麻醉术后恢复室,并与恢复室护士进行手术护理交接,双方在《手术患者科间交接核查单》上签字
A. 对
B. 错
【判断题】
长期卧床的高龄患者或实施高危护理活动,患者身份识别必须包括核对床号
A. 对
B. 错
【判断题】
腕带上应有患者姓名、性别、出生年月、科室、ID号、诊断、入院信息等信息
A. 对
B. 错
【判断题】
早产儿、低体重儿、双胞胎应使用与一般新生儿相同颜色的手腕带
A. 对
B. 错
【判断题】
胎儿娩出后,由助产士和巡回护士分别将新生儿抱给母亲确认性别,并口头复述一遍
A. 对
B. 错
【判断题】
发生不良事件时,护士长要组织相关人员对不良事件进行调查,针对具体情况具体分析。若事件发生属人为因素,应立即上报护理部,并组织安全分析会,制定整改措施,持续质量改进。若事件发生为客观因素,应做好当事人的心理疏导,避免影响当事人心理
A. 对
B. 错
【判断题】
填写《护理不良事件上报登记表》时,应记录护理不良事件发生的具体时间、地点、过程、后果、处理及防范措施,并上报科护士长和护理部
A. 对
B. 错
【判断题】
发生不良事件后,当事人应立即判断事件可能造成的影响后果,酌情向护士长报告。并在第一时间做好病人及家属的安抚工作,积极采取补救措施,以减少或消除由于不良事件造成的不良后果
A. 对
B. 错
【判断题】
一般不良事件发生后要求72小时内报告;重大不良事件,情况紧急者应在处理的同时立即报告护理部及医务部。对发生不良事件的科室和个人有意隐瞒不报者,按情节轻重给予处理
A. 对
B. 错
【判断题】
科室在组织调查护理不良事件过程中,应及时调整补充相关护理病历记录及资料,最大程度地保证护理的无责性,并由专人保管相关病案和资料,其他人不得随意涂改、伪造、隐藏、丢失,违者按情节轻重予以严肃处理
A. 对
B. 错
【判断题】
病房内收住患者应按感染与非感染性疾病分别收治,感染性疾病的患者在患者床头(一栏表卡片上)做标记
A. 对
B. 错
【判断题】
患者的衣服、被单每周更换一次
A. 对
B. 错
推荐试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用