【单选题】
女,40岁。闭经、溢乳半年,磁共振发现垂体1.5cmx1.0cm占位病变,需做激素检查。下列无助于诊断的检查是___
A. 泌乳素
B. 生长激素
C. 促肾上腺皮质激素
D. 血管升压素甲
E. 促甲状腺激素
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
26岁女性患者,因马术训练不慎跌落,导致头部严重挫伤,CT检查发现其垂体柄完全离断。推测其血浆中水平可能升高的激素是___
A. GH
B. OT
C. TSH
D. PRL
E.
F. SH
【单选题】
某患者因脑肿瘤浸润下丘脑室旁核,其所致分泌障碍的下列激素是___
A. LH
B. GH
C. PRL
D. ADH
E. ACTH
【单选题】
43岁男性患者就诊时发现,头、手、足均增大:呈鼻宽、唇厚、粗犷容貌;脊柱变形,体毛多并伴有乳房增大与泌乳现象。患者最可能发生病变的部位是___
A. 睾丸
B. 肾上腺
C. 腺垂体
D. 下丘脑
E. 神经垂体
【单选题】
9岁女童, 因确诊为体肿瘤而行放射性治疗,而后患儿的垂体功能完全丧失,其后将导致的功能显著变化将是___
A. 生长加速
B. 出现甲状腺肿
C. 性腺发育障碍
D. 血浆 ACTH水平升高
E. 血浆 TSH水平升高
【单选题】
25岁妇女就诊,主诉体重减轻,怕热,出汗过多和疲乏无力。体检发现甲状腺肿。化验检查,血中TSH和甲状腺激素浓度升高,但未检测到抗甲状腺抗体。推测符合这些症状的诊断很可能是___
A. Graves 病
B. 甲状腺激素抵抗
C. 甲状腺腺瘤
D. 5-脱碘酶缺乏
E. 分泌TSH的垂体瘤
【单选题】
女,27岁。多食、善饥、大便次数增多,体重下降1个月。经甲疏咪唑治疗1个月后。FT3、FT4 正常,TSH 0.01umol/ml。查体:P78次/分,BP120/60mmHg, 甲状腺Ⅲº肿大,左侧明显气管右偏。患者拟行甲状腺手术治疗,术前准备应选择的药物是___
A. 左甲状腺素钠
B. 普萘洛尔
C. 糖皮质激素
D. 丙硫氧嘧啶
E. 复方碘溶液
【单选题】
甲状腺切除术后半年,患者出现乏力、便秘、怕冷、体重增加,最可能需要的治疗药物是___
A. 左甲状素钠
B. 普萘洛尔
C. 糖皮质激素
D. 内硫氧嘧啶
E. 复方碘溶液
【单选题】
甲状腺功能减退症患者有严重的智力低下、聋哑,估计其甲状腺功能减退始于___
A. 胎儿期或新生儿期
B. 3~5岁
C. 6~10岁
D. 11~17岁
E. 18岁以后
【单选题】
某男性患者,因甲状腺手术不当损伤甲状旁腺十余天,其可能出现的变化是___
A. 低血钙、低血磷,全身僵直
B. 低血钙、低血磷,手足抽搐
C. 低血钙,肌兴奋增强,手足抽搐
D. 高血钙、高血磷,骨基质脱钙
E. 高血钙,肌兴奋增强,骨基质脱钙
【单选题】
符合甲状旁腺功能亢进症的实验室检查结果是___
A. 高血钙、高血磷和低尿钙
B. 高血钙、低血磷和低尿钙
C. 低血钙、低血磷和高尿钙
D. 高血钙、低血磷和高尿钙
E. 低血钙、高血磷和高尿钙
【单选题】
某患者低钙饮食约两月余,可能引起的变化是___
A. 减少小肠上皮细胞钙结合蛋白量
B. 促进24,25-二羟维生素D3合成
C. 提高血磷水平
D. 升高血浆降钙素水平
E. 刺激甲状旁腺激素分泌
【单选题】
女性,45岁。脸圆、变红1年,体重增加、月经稀发6个月。查体: BP160100mmHg,向心性肥胖,皮肤薄,面部痤疮较多,下颌小胡须,全身毳毛增多。腹部、大腿根部可见宽大紫纹。血钾3. 3mmol/L,空腹血糖15.4mmol/L. 该患者最可能的诊断是___
A. 原发性醛固酮增多症
B. 原发性高血压
C. 女性男性化
D. 库欣综合征
E. 糖尿病
【单选题】
66女性,45岁。脸圆、变红1年,体重增加、月经稀发6个月。查体: BP160100mmHg,向心性肥胖,皮肤薄,面部痤疮较多,下颌小胡须,全身毳毛增多。腹部、大腿根部可见宽大紫纹。血钾3. 3mmol/L,空腹血糖15.4mmol/L. 该患者最可能的诊断是库欣综合征,为明确诊断,该患者首先要做的检查是___
A. 促肾上腺皮质激素、皮质醇
B. 肾素、醛固酮
C. 催乳素
D. 尿绒毛膜促性腺激素
E. 肾上腺素
【单选题】
肾上腺皮质功能低下的患者,排除水分的能力大为减弱,可出现“水中毒”,补充下列哪种激素可缓解症状___
A. 胰岛素
B. 糖皮质激素
C. 醛固酮
D. 肾上腺素
E. 胰高血糖素
【单选题】
患者长期大量使用糖皮质激素时,下列哪种变化正确___
A. 血中CRH增加
B. 血中ACTH减少
C. 血中TSH增加
D. 血中GH减少
E. 血中 PRL增加
【单选题】
某人因肾病长期大量用糖皮质激素治疗,患者不会因此而出现___
A. 血糖升高
B. 蛋白质合成增加
C. 面部和躯干脂肪增加
D. 红细胞、血小板增多
E. 淋巴细胞减少
【单选题】
下列关于消化道平滑肌生理特性的叙述正确的是
A. 兴奋性比骨骼肌高
B. 收缩缓慢
C. 对化学刺激不敏感
D. 自律性频率较高且稳定
E. 没有伸展性
【单选题】
消化道平滑肌基本电节律的产生主要由于___
A. Ca2*的跨膜扩散
B. K*的跨膜扩散
C. Na*的跨膜扩散
D. 生电性钠泵周期性变化
E. H*的跨膜扩散
【单选题】
消化道平滑肌细胞的动作电位产生的离子基础是___
A. K*内流
B. Ca2*内流
C. Ca2*与K*内流
D. Na*与 K*内流
E. H*的内流
【单选题】
胃和小肠蠕动频率的决定性因素是___
A. 胃肠平滑肌动作电位频率
B. 胃肠平滑肌本身节律活动
C. 胃肠肌间神经丛活动水平
D. 胃肠平滑肌慢波节律
E. 胃肠平滑肌动作电位幅度
【单选题】
消化道平滑肌收缩的强度主要取决于___
A. 慢波频率
B. 慢波的幅度
C. 动作电位的幅度
D. 动作电位的频率
E. 阈电位
【单选题】
消化道平滑肌的慢波起源于___
A. 黏膜层
B. 环行肌
C. 纵行肌
D. Cajal 间质细胞
E. 神经丛
【单选题】
关于消化道神经系统的叙述,错误的是___
A. 是指消化道壁内的神经丛
B. 不受外来神经的调节
C. 含有大量的神经纤维和神经元
D. 参与消化道运动和消化液分泌的调节
E. 受外来神经的调节
【单选题】
支配消化道的交感神经节后纤维末梢释放的神经递质是___
A. 乙酰胆碱
B. 去甲肾上腺素
C. 多巴胺
D. 肾上腺素
E. 谷氨酸
【单选题】
关于胃肠内在神经从的叙述, 正确的是___
A. 包括粘膜下神经丛和肌间神经丛
B. 含大量神经纤维, 但神经元不多
C. 递质仅是乙酰胆碱或去甲肾上腺素
D. 仅有运动功能,而无感觉功能
E. 内在神经丛不可在局部发挥作用
【单选题】
以下关于促胃液素的叙述,正确的是___
A. 产生促胃液素的细胞存在于胃体和胃底黏膜内
B. 蛋白质消化产物及HCI是引起促胃液素释放的主要因素
C. 促胃液素对壁细胞有很强的刺激分泌作用
D. 切除胃窦的患者, 促胃液素分泌作用不受影响
E. 促胃液素刺激壁细胞分泌作用弱
【单选题】
以下不属于促胃液素生理作用的是___
A. 刺激胃酸分泌
B. 促进胃运动
C. 刺激胰液分泌
D. 促进唾液分泌
E. 延缓胃排空
【单选题】
下列哪一项不是促胰液素的作用___
A. 促进胰液中水和HCO3-的大量分泌
B. 促进胃酸分泌
C. 促进肝细胞分泌胆汁
D. 促进小肠液的分泌
E. 抑制胃排空
【单选题】
下列哪项不属于缩胆囊素(CCK) 的作用___
A. 促进胰酶分泌
B. 促进食管下括约肌收缩
C. 促进胆汁排出
D. 促进胆囊收缩
E. 促进幽门括约肌收缩
【单选题】
下列选项中,不能引起促胃液素分泌的是___
A. HCl灌注刺激幽门部黏膜
B. 肉汤灌注刺激幽门部黏膜
C. 扩张刺激幽门部黏膜
D. 刺激支配幽门部迷走神经
E. 扩张胃
【单选题】
唾液中除唾液淀粉酶以外,还有___
A. 凝乳酶
B. 蛋白水解酶
C. 溶菌酶
D. 寡糖酶
E. 脂肪酶
【单选题】
唾液分泌的调节主要是___
A. 神经反射
B. 神经反射和体液因素
C. 条件反射和体液因素
D. 非条件反射和体液因素
E. 体液因素
【单选题】
关于食管下括约肌的叙述,错误的是___
A. 该部位平滑肌增厚
B. 其内压力比胃高 5~10mmHg
C. 食物经过食管时可反射性舒张
D. 促胃液素可刺激其收缩
E. 阻止胃内容物反流入食管
【单选题】
18关于胃液分泌的描述,哪项是错误的___
A. 壁细胞分泌盐酸
B. 主细胞分泌胃蛋白酶
C. 黏液细胞分泌糖蛋白
D. 幽门腺分泌黏液
E. 壁细胞分泌内因子
【单选题】
在胃黏膜壁细胞完全缺乏时,患者不会出现的表现是___
A. 维生素B¹²吸收障碍
B. 肠道内细菌加速生长
C. 胰腺分泌HCO3-减少
D. 食物蛋白质消化不良
E. 巨幼红细胞性贫血
【单选题】
分泌促胃液素的主要部位是___
A. 胃体
B. 十二指肠
C. 胃窦和十二指肠
D. 空肠
E. 大肠
【单选题】
胃酸的生理作用不包括___
A. 激活胃蛋白酶原,并提供酸性作用环境
B. 杀死进入胃内的细菌
C. 促进胰液和胆汁的分泌
D. 促进维生素 B12的吸收
E. 促进铁的吸收
【单选题】
下列关于壁细胞质子泵的叙述,错误的是___
A. 存在于顶端膜内凹的分泌小管膜上
B. 是一种H+-K+依赖式的ATP酶
C. 抑制质子泵不影响胃酸的分泌
D. 分泌H+同时伴有K+进入细胞
E. H*与K*的交换是1对1的电中性交换
【单选题】
正常情况下胃黏膜不会被胃液所消化,主要是由于___
A. 胃液中不含有可消化胃黏膜的酶
B. 胃液中的内因子具有保护作用
C. 胃液中的糖蛋白可中和胃酸
D. 黏液-碳酸氢盐屏障的作用
E. 胃黏膜的细胞保护作用
【单选题】
关于胃蛋白酶的叙述,正确的是___
A. 由壁细胞分泌胃蛋白酶原
B. 在碱性环境中活性增高
C. 反馈性抑制盐酸分泌
D. 盐酸激活胃蛋白酶原
E. 促胃液素抑制其释放
推荐试题
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit