刷题
导入试题
【单选题】
DIC最常见的病因是___
A. 肿瘤性疾病
B. 感染性疾病
C. 广泛性手术
D. 产科疾病
E. 烧伤
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
关于正常人皮质醇节律,下述哪项最正确___
A. 清晨最高,午夜最低
B. 清晨最高,下午最低
C. 午夜最高,清晨最低
D. 下午最高,午夜最低
E. 午夜最高,下午最低
【单选题】
严重Ⅱ型呼吸衰竭不宜高浓度给氧的原因___
A. 缺氧不是主要原因
B. 可引起氧中毒
C. 降低颈动脉窦化学感受器的兴奋性
D. 促使二氧化碳排除过快
E. 诱发代谢性碱中毒
【单选题】
一建筑工地因野蛮施工使煤气管破裂,煤气外溢,致使多名工人及附近居民中毒。此时最有效的抢救措施是___
A. 血液透析
B. 20%甘露醇快速静脉滴
C. 亚冬眠治疗
D. 鼻导管吸氧
E. 以上都不是
【单选题】
暴发型流脑抗休克扩容治疗时,应进行病情观察的内容是___
A. 血压改变
B. 有无肺底啰音
C. 有无呼吸困难
D. 准确记录24小时出入量
E. 有无泡沫痰
【单选题】
诊断呼吸衰竭的血气标准是___
A. PaO<8.6kPa(65mmHg)和(或)伴有PaCO>7.3kPa(55mmHg)
B. PaO<6.7kPa(50mmHg)和(或)伴有PaCO>8.0kPa(60mmHg)
C. PaO<8.0kPa(60mmHg)和(或)伴有PaCO>7.3kPa(55mmHg)
D. PaO<8.0kPa(60mmHg)和(或)伴有PaCO>6.7kPa(50mmHg)
E. PaCO<8.6kPa(65mmHg)和(或)伴有PaCO>6.7kPa(50mmHg)
【单选题】
慢性肺源性心脏病的X线表现,哪项错误___
A. 常有肺、胸基础疾病表现
B. 可有急性肺部感染的表现
C. 肺动脉段明显突出或其高度≥3mm
D. 右心室肥大征
E. 右下肺动脉干扩张,其横径>10mm,其横径与血管横径之比≥1.07
【单选题】
男性,30岁,与别人打赌而大量进食后上腹部痛1天入院。查血淀粉酶为。700u/dl,诊断为急性胰腺炎,经治疗痊愈,为预防本病复发,进行健康教育时下列哪项措施是不恰当的___
A. 避免暴饮暴食
B. 避免酗酒
C. 忌食油腻食物
D. 积极治疗胆石症
E. 定期预防性应用抑肽酶
【单选题】
原发性肝癌患者疼痛护理哪项不正确___
A. 使用镇痛泵
B. 提供舒适,安静的环境
C. 与别人交谈分散患者的注意力
D. 遵照医嘱应用止痛药
E. 限制止痛药的应用
【单选题】
慢性粒细胞白血病最有特征性的体征是___
A. 胸骨压痛
B. 浅表淋巴结肿大
C. 巨脾
D. 皮肤紫癜
E. 贫血貌
【单选题】
急性肺脓肿最主要的临床表现是___
A. 畏寒、高热
B. 不同程度咯血
C. 胸痛与呼吸运动相关
D. 肺部干湿性啰音
E. 咳大量脓臭痰
【单选题】
流行性乙型脑炎的传播途径是___
A. 粪-口传播
B. 密切接触
C. 气溶剂
D. 虫媒传播
E. 其他
【单选题】
胸12椎体压缩性骨折石膏固定的方法为___
A. 石膏腰围
B. 石膏背心
C. 头颈胸石膏
D. 石膏床
E. 塑形石膏
【单选题】
甲状腺手术后导致呼吸困难和窒息的原因中,哪一项是错误的___
A. 伤口内出血压迫血管
B. 急性喉头水肿
C. 双侧喉返神经损伤
D. 双侧喉上神经损伤
E. 气管软化塌陷
【单选题】
男性,35岁,阑尾切除术后第5天,体温升高,大便次数增多,解黏液便,有里急后重,考虑并发了盆腔脓肿,首选的检验方法是___
A. 腹部B超
B. 腹腔穿刺
C. 直肠指检
D. 大便细菌培养
E. X线腹部透视
【单选题】
关于B超检查在诊断尿路结石方面的价值,下列哪项是错误的___
A. 能发现尿路平片不能显示的小结石和透光结石
B. 能发现结石所致的肾脏结构改变
C. 可直接显示双肾功能改变
D. 可用于无尿、慢性肾衰竭患者
E. 可用于对碘剂过敏或孕妇合并结石患者
【单选题】
一般病人术前血红蛋白大于多少方可手术___
A. 6g/L
B. 8g/L
C. 10g/L
D. 12g/L
E. 14g/L
【单选题】
一侧全肺切除术后输液速度应控制在___
A. 10~20滴/分
B. 20~30滴/分
C. 30~40滴/分
D. 40~50滴/分
E. 50~60滴/分
【单选题】
急性胰腺炎发病的主要病理过程是___
A. 胰酶自体消化的过程
B. 磷脂酶自体消化的过程
C. 弹力纤维酶自体消化的过程
D. 胶原酶自体消化的过程
E. 胰脂肪酶自体消化的过程
【单选题】
下列因素与肺癌的病因无关的是___
A. 长期大量吸烟
B. 长期接触石棉、铬、镍、锡、砷及放射性物质
C. 城市环境污染
D. 人体营养状态
E. 遗传因素
【单选题】
反常呼吸运动可见于___
A. 单根单处肋骨骨折
B. 单根多处肋骨骨折
C. 多根多处肋骨骨折
D. 血气胸
E. 胸壁软组织损伤
【单选题】
骨折临床愈合后,骨痂的改造塑形决定于___
A. 外固定的牢固性
B. 肢体活动和负重所形成的应力
C. 局部血液供应情况
D. 骨痂的多少
E. 是否配合治疗
【单选题】
急性血源性化脓性骨髓炎多见于___
A. 10岁以下儿童
B. 10~19岁青少年
C. 20~35岁青年
D. 40~50岁壮年
E. 60以上老年
【单选题】
脑血管造影过程中,并发症不包括___
A. 癫痫发作
B. 尿潴留
C. 脑栓塞
D. 颅内出血
E. 血管痉挛
【单选题】
下列哪项不宜施行甲状腺大部切除术___
A. 青少年甲亢
B. 继发性甲亢
C. 妊娠期甲亢
D. 甲亢有气管压迫症状
E. 中度原发性甲亢并发心律不齐
【单选题】
男性,70岁,良性前列腺增生3年,近1年出现尿潴留3次,均已留置导尿管缓解,身体状况尚佳,心肺功能无异常,首选治疗是___
A. 激素治疗
B. α-受体阻滞剂治疗
C. 手术治疗
D. 射频治疗
E. 微波治疗
【单选题】
男性,40岁,左下肢静脉曲张10年,内踝上方溃疡反复发作4年,下列哪些治疗是错误的___
A. 积极治疗患肢静脉曲张
B. 休息时抬高患肢,下地前用弹力袜
C. 温盐水湿敷创面
D. 溃疡创面使用5%鱼肝油酸钠
E. 切除溃疡并植皮
【单选题】
男性,30岁,右腰被重物击伤,自觉疼痛。查体见右腰部压痛、叩击痛,血压、脉搏正常,尿液镜检红细胞10~15个/高倍视野,应想___
A. 腰部挫伤
B. 肾挫伤
C. 肾全层裂伤
D. 肾部分裂伤
E. 肾蒂裂伤
【单选题】
终末血尿提示出血部位在___
A. 前尿道
B. 后尿道
C. 肾脏
D. 输尿管
E. 膀胱
【单选题】
男性,68岁,脊柱手术后3日伤口轻度发红,体温37.8℃。下列哪项处理较为合适___
A. 考虑伤口感染,即换广谱抗菌药
B. 考虑伤口感染,加大抗菌药物剂量
C. 无特殊处理,密切观察病情变化
D. 做血液细菌培养
E. 伤口探查冲洗
【单选题】
门静脉高压症术前防止出血的措施应除外___
A. 避免劳累
B. 避免腹压增加
C. 避免食物过热、硬、刺激
D. 不放胃管
E. 绝对卧床
【单选题】
下列属于紫绀型即右向左分流型先天性心脏病的是___
A. 动脉导管未闭
B. 房间隔缺损
C. 室间隔缺损
D. 法洛四联症
E. 二尖瓣狭窄
【单选题】
何种腹腔内脏损伤检查时腹膜刺激征不明显___
A. 肝破裂
B. 脾破裂
C. 胰破裂
D. 肠穿孔
E. 胃穿孔
【单选题】
提示膀胱损伤的表现是___
A. 血尿
B. 假性尿失禁
C. 排尿障碍而膀胱空虚
D. 导尿管不易插入
E. 下腹部腹膜刺激征
【单选题】
治疗脑水肿,下列药物哪一种最常用且效果较好___
A. 50%葡萄糖
B. 30%尿素
C. 25%山梨醇
D. 20%甘露醇
E. 浓缩血清白蛋白
【单选题】
休克病人有效循环血量恢复的征象哪项表述是错误的___
A. 皮肤黏膜红润
B. 四肢温暖
C. 血压正常或回升
D. 肺水肿
E. 静脉充盈,尿量正常
【单选题】
男性,砷岁,良性前列腺增生术后,气囊导尿管拨出时间是术后___
A. 10日
B. 5日
C. 7日
D. 15日
E. 3日
【单选题】
休克病人微循环衰竭期典型临床表现___
A. 表情淡漠,皮肤苍白
B. 尿量减少
C. 血压下降
D. 脉搏增快
E. 弥漫性血管内凝血
【单选题】
有一名颅底骨折病人,以下哪项是正确的___
A. 血性脑脊液病人,腰穿放脑脊液
B. 脑脊液耳漏,需尽早修补硬膜漏口
C. 伤后视力减退,超过一个月可手术减压
D. 颅底骨折,需手术治疗,以便神经减压
E. 着重观察有无脑损伤,并处理脑脊液漏、神经损伤
【单选题】
颅内压增高产生脑水肿多数为___
A. 细胞毒性脑水肿
B. 血管源性脑水肿
C. 混合性脑水肿
D. 白质性脑水肿
E. 灰质性脑水肿
【单选题】
女性,43岁,门静脉高压症多年,拟行分流术,为防止肠道产氨应于术前___
A. 静滴抗生素
B. 肌肉注射抗生素
C. 口服肠道抗生素
D. 禁食2日
E. 禁食3日
推荐试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用