刷题
导入试题
【单选题】
胃、十二指肠溃疡合并出血的好发部位在___
A. 胃大弯或十二指肠后壁
B. 胃小弯或十二指肠后壁
C. 胃大弯或十二指肠前壁
D. 胃小弯或十二指肠前壁
E. 胃体
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
肝癌术前护理错误的是___
A. 术前2日口服肠道消炎药
B. 术前晚及术日晨清洁灌肠
C. 适量输血
D. 高蛋白、高脂肪、高维生素饮食
E. 配血
【单选题】
硬膜外麻醉的禁忌证是___
A. 高血压
B. 婴幼儿和老人
C. 凝血功能不全
D. 颅内高压
E. D.颅内高压
【单选题】
女性,20岁,因外伤致第4、5颈椎骨折并发颈髓损伤,四肢呈弛缓性瘫痪,高热40℃,持续数日不降,应采取何种降温方法___
A. 口服APC
B. 冬眠疗法
C. 使用抗生素
D. 物理降温
E. 以上都不是
【单选题】
一病员胫腓骨骨折,复位后石膏固定,肢体肿胀较明显,治疗中病人未能积极功能锻炼,2个月后去除石膏复查,见骨折已愈,经一个月练习关节活动,恢复不满意,膝关节功能差。此为___
A. 损伤性骨折
B. 创伤性关节炎
C. 关节僵硬
D. 缺血性骨坏死
E. 缺血性肌挛缩
【单选题】
男性,49岁,门静脉高压症分流术后48小时内的体位是___
A. 半卧位
B. 侧卧位
C. 平卧位
D. 俯卧位
E. 中凹卧位
【单选题】
最常见的胸部损伤是___
A. 肋骨骨折
B. 开放性气胸
C. 张力性气胸
D. 血胸
E. 胸壁软组织损伤
【单选题】
婴幼儿肾母细胞瘤的表现___
A. 肿块
B. 血尿
C. 疼痛
D. 消瘦
E. 发热
【单选题】
男性,63岁,因肝癌行肝癌切除,术中肝癌切除过程中出现出血,巡回护士遵医嘱血库取血后为病人输血,哪项操作不正确___
A. 查对病人姓名
B. 输血前肌肉注射氟美松
C. 将库存血加温
D. C.将库存血加温
E. 观察病人输血后反应
【单选题】
肺癌的首发症状通常为___
A. 胸闷、气促
B. 刺激性咳嗽
C. 声音嘶哑
D. 胸腔积液
E. 大量咯血
【单选题】
脊柱骨折造成脱位并脊髓半横切损伤,其损伤平面以下的改变是___
A. 双侧肢体完全截瘫
B. 同侧肢体运动消失,双侧肢体深浅感觉消失
C. 同侧肢体运动和深感觉消失,对侧肢体痛温觉消失
D. 同侧肢体运动和痛温觉消失,对侧肢体深感觉消失
E. 同侧肢体痛温觉消失,对侧肢体运动和深感觉消失
【单选题】
急性胰腺炎时,血清淀粉酶升高的规律是___
A. 发病后2小时升高,12~24小时达高峰
B. 发病后3~12小时开始升高,24~48小时达高峰
C. 发病后24小时开始升高,48小时达高峰
D. 发病后48小时开始升高,72小时达高峰
E. 以上都不对
【单选题】
门静脉高压症,做脾肾静脉分流术的,术前要特别明确___
A. 肾功能
B. 心功能
C. B.心功能
D. 凝血功能
E. 呼吸功能
【单选题】
中晚期食管癌的典型症状是___
A. 持续性胸痛或背痛
B. 进食时呛咳
C. 进行性吞咽困难
D. 食物停滞感或异物感
E. 胸骨后疼痛或闷胀不适
【单选题】
关于骨折临床愈合的标准,下列哪项是正确的___
A. 局部无畸形
B. 局部无反常活动
C. 上肢向前平举2kg重量达1分钟
D. 下肢不扶拐在平地连续步行5分钟,不少于50步
E. 连续功能锻炼2天骨折处不变形
【单选题】
外科病人最常见的缺水___
A. 原发性缺水
B. 继发性缺水
C. 高渗性缺水
D. 低渗性缺水
E. 等渗性缺水
【单选题】
女性,35岁,因车祸骨盆挤压伤,测血清钾6.9mmol/L,脉搏46次/分,并有心律不齐,应选用的药物是___
A. 5%碳酸氢钠溶液
B. 10%葡萄糖酸钙
C. 乳酸溶液
D. 西地兰
E. 利多卡因
【单选题】
颈椎压缩性骨折合并脱位最先选择的治疗方法是___
A. 颌枕带牵引
B. 手法复位,石膏固定
C. 颅骨牵引
D. 两桌复位法
E. 切开复位
【单选题】
临床怀疑有舟骨骨折,应采取哪种固定___
A. 切开复位内固定
B. 石膏托固定
C. 长腿石膏固定
D. 无需固定
E. 短臂石膏固定
【单选题】
溃疡病穿孔非手术治疗期间哪项护理措施最重要___
A. 半卧位
B. 输液
C. 胃肠减压
D. 应用抗生素
E. 做术前准备
【单选题】
原发性醛固酮增多症最常见的病因是___
A. 肾上腺皮质腺瘤
B. 特发性醛固酮增多症
C. 原发性肾上腺上质增生
D. 分泌醛固酮的肾上腺癌
E. 糖皮质激素可抑制性原发性醛固酮增多症
【单选题】
下面哪个部位出血可在短时间内死亡___
A. 小脑
B. 桥脑
C. 脑叶
D. 脑室
E. 壳核
【单选题】
胆总管下端结石易发生___
A. 梗阻
B. 梗阻合并急性胆管炎
C. 急性胆管炎
D. 胆管出血
E. 胆管穿孔
【单选题】
颅内压增高的容积代偿(即空间代偿)主要依靠___
A. 脑组织的压缩
B. 颅腔的扩大
C. 脑脊液被排出颅外
D. 血压的下降
E. 脑血流量减少
【单选题】
肾癌最主要的症状是___
A. 肿块
B. 血尿
C. 疼痛
D. 发热
E. 血压升高
【单选题】
诊断颅底骨折最可靠的临床表现是___
A. 意识障碍
B. 头皮下血肿
C. 脑脊液漏
D. 颅底骨凹陷
E. 脑脊液含血
【单选题】
上尿路结石形成的因素与下列哪项无关___
A. 饮食结构中肉类过多
B. 长期卧床不起
C. 尿中枸橼酸增多
D. 肾小管酸中毒
E. 饮食结构中纤维素过少
【单选题】
急性血源性骨髓炎X线片上出现异常最早时间为病后___
A. 1周
B. 2周
C. 3周
D. 1月
E. 2月
【单选题】
膝关节化脓性关节炎固定的位置为___
A. 解剖位
B. 功能位
C. 屈曲位
D. 旋前位
E. 旋后位
【单选题】
女性,24岁,以往体弱,常大便于结,半月前行胃肠透视后钡剂于结未能排出。10天前大便困难、腹痛、腹胀。灌肠后,由于排便时用力过猛致肛门部剧痛,粪便表面带血迹,近3~4天症状仍明显,大便干硬,应考虑为___
A. 血栓性外痔
B. 内痔
C. 肛门周围脓肿
D. 肛裂
E. 直肠癌
【单选题】
硬脑膜外血肿病人意识变化特点是___
A. 昏迷
B. 昏迷-清醒
C. 昏迷-清醒-昏迷
D. 清醒-昏迷
E. 清醒-昏迷-清醒
【单选题】
肝癌与肝脓肿相同的表现是___
A. 发热
B. 肝肿大、压痛
C. 血白细胞增高
D. 同位素扫描有占位性病变
E. 超声波查到液平面
【单选题】
开放性腹部损伤有肠管脱出时,原则上应___
A. 立即向腹腔还纳
B. 及早行清创术
C. 止痛处理
D. 抗感染
E. 暂不向腹腔回纳
【单选题】
下面哪种情况不适宜做碘过敏试验___
A. 阑尾炎患者
B. 肿瘤患者
C. 眼底病
D. 静脉炎
E. 严重甲状腺功能亢进
【单选题】
男性,21岁,右小腿中下1/3窦道,有时从窦道掉碎骨块12年,近半个月发烧,伤口红肿,流脓。X线显示右胫骨中下1/3处增粗,有死骨,其周围有新生骨,在应用抗菌药物的同时宜采取下列哪些措施___
A. 死骨摘除术
B. 换药观察
C. 切开引流
D. 刮除、植骨
E. 穿刺抽脓
【单选题】
休克病人使用血管扩张剂前必须具备的前提条件是___
A. 纠正酸中毒
B. 心功能正常
C. 补足血容量
D. 先用血管收缩药
E. 先用强心药
【单选题】
男性,50岁,早期肝癌,行肝脏切除术后宜用___
A. 流食
B. 普食
C. 要素饮食
D. 半流食
E. 以上都不对
【单选题】
出现哪些情况怀疑有腹内脏器出血___
A. 早期呈现休克
B. 出现腹部移动性浊音
C. 持续性腹痛并加重趋势者
D. 有呕吐、便血和血尿
E. 以上均是
【单选题】
脊柱骨折病人在搬运过程中,最正确的体位是___
A. 侧卧位
B. 仰卧屈曲位
C. 仰卧过伸位
D. 俯卧过伸位
E. 半坐卧位
【单选题】
急性化脓性阑尾炎,主要的病理改变是指___
A. 炎症限于阑尾黏膜下层
B. 炎症限于阑尾黏膜层
C. 炎症限于浆膜层
D. 腹腔内有脓性液体
E. 阑尾管壁各层有小脓肿形成
【单选题】
急性阑尾炎穿孔局限性腹膜炎的手术治疗要点中下列哪项错误___
A. 注意保护切口,防止感染
B. 阑尾残端妥善处理,防止感染扩散
C. 大量盐水冲洗腹腔,防止感染扩散
D. 腹腔一般不放引流管
E. 缝合切口前,手术人员应用消毒液洗手
推荐试题
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用