相关试题
【单选题】
对外阴尖锐湿疣的处理错误的___
A. 病灶小可用三氯醋酸涂局部
B. 局部用5%5-氟尿嘧啶液贴敷
C. 病灶较大可行手术切除
D. 以全身应用抗生素为主
E. 可用激光或冷冻治疗
【单选题】
SLE药物治疗首选___
A. 青霉素
B. 泼尼松
C. 布洛芬
D. 硫唑嘌呤
E. 环磷酰胺
【单选题】
下列属于全杀菌药的抗结核药物是___
A. 链霉素
B. 异烟肼
C. 对氨基水杨酸
D. 乙胺丁醇
E. 阿司匹林
【单选题】
关于消化性溃疡疼痛特点错误的是___
A. 长期性,周期性,节律性
B. 胃溃疡疼痛部位于剑突下正中偏左
C. 十二指肠溃疡疼痛位于腹上区偏右
D. 十二指肠溃疡疼痛常在进食后0.5~1h出现
E. 十二指肠溃疡疼痛时服抗酸药即能缓解
【单选题】
糖尿病患儿出现生长发育迟缓和抵抗力降低的主要原因是___
A. 肝糖原合成减少
B. 蛋白质合成减少
C. 脂肪分解增加
D. 糖原异生增加
E. 电解质失衡
【单选题】
肘关节骨折脱位最可能导致的严重并发症___
A. 动静脉损伤
B. 周围神经损伤
C. 缺血性肌痉挛
D. 缺血性骨坏死
E. 损伤性骨化
【单选题】
轻度营养不良患儿体重低于正常均值的___
A. 10%以下
B. 10%~15%
C. 15%~25%
D. 25%~40%
E. 40%以上
【单选题】
护理少尿与无尿病人,最主要的措施是___
A. 卧床休息
B. 严格控制钾摄入
C. 预防感染
D. 限制蛋白质的摄入
E. 保证饮食总热量
【单选题】
血清壁细胞抗体阳性多见于___
A. 急性单纯性胃炎
B. 慢性胃体胃炎
C. 慢性胃窦胃炎
D. 胃溃疡
E. 十二指肠壶腹部溃疡
【单选题】
妊娠7个月,胎死宫内,下述哪项是错误的___
A. 自感胎动停止
B. 长大的子宫又缩小
C. 孕妇感觉全身疲倦,食欲不振
D. 胎死宫内超过两周即发生凝血功能障碍
E. X线照片"颅骨重叠,脊柱成角弯曲"
【单选题】
确诊胃癌最可靠的方法___
A. 消化道钡餐
B. 大便潜血阳性
C. 胃B超
D. 纤维胃镜
E. 胃CT检查
【单选题】
有关肝动脉插管化疗的患者护理叙述不正确的是___
A. 严格无菌操作
B. 若出现发热,应使用抗菌药物
C. 注药后用肝素液冲洗导管
D. 定期局部换药
E. 剧烈腹痛时应警惕其他部位动脉栓塞及胆囊坏死等并发症
【单选题】
急性胃炎的健康教育不包括___
A. 保持愉快,稳定的情绪,积极配合治疗原发病
B. 嘱患者戒酒,养成良好的饮食卫生习惯
C. 避免性生活
D. 进行疾病相关知识宣教,避免病因及诱因
E. 在医生严格指导下应用非甾体抗炎药物
【单选题】
脑出血最常见的发病部位是___
A. 延髓
B. 内囊
C. 小脑
D. 脑室
E. 脑叶
【单选题】
关于胃镜检查术后患者饮食护理的描述,错误的是___
A. 术后2小时即可进食温流质饮食
B. 术后30~60分钟咽喉部无麻木感即可饮少量水
C. 术后患者如无不适即可进食温流食
D. 术后如无特殊变化,第2餐可恢复正常饮食
E. 术后第1餐一般不给予普食
【单选题】
淋巴瘤的首发症状多为___
A. 腋下淋巴结肿大
B. 颈部或锁骨上淋巴结无痛性肿大
C. 长期不明原因发热
D. 肝、脾大
E. 深部淋巴结肿大
【单选题】
肾盂肾炎患者尿路感染最常见的致病菌是___
A. 葡萄球菌
B. 变形杆菌
C. 大肠杆菌
D. 副大肠杆菌
E. 粪链球菌
【单选题】
与原发性肝癌发病无关的因素是___
A. 肝脓肿
B. 病毒性肝炎
C. 肝硬化
D. 黄曲霉素
E. 酗酒
【单选题】
急性心肌梗死24小时内禁用的药物是___
A. β受体阻滞剂
B. 钙离子拮抗剂
C. 硝酸酯制剂
D. 洋地黄制剂
E. 镇痛剂
【单选题】
急性心肌梗死患者应绝对卧床休息至少达___
A. 一周
B. 48小时
C. 24小时
D. 2周
E. 3~5周
【单选题】
1型糖尿病患者的主要死亡原因是___
A. 酮症酸中毒
B. 感染
C. 心脑血管病变
D. 糖尿病肾病
E. 非酮症性糖尿病性高渗性昏迷
【单选题】
导致糖尿病患者失明的主要原因是___
A. 白内障
B. 角膜溃疡
C. 视神经炎
D. 视网膜微血管病变
E. 玻璃体积血
【单选题】
有机磷杀虫剂中毒引起昏迷时,最佳的解毒方案是___
A. 阿托品
B. 解磷定或氯解磷定
C. 解磷定+阿托品
D. 纳洛酮
E. 尼可刹米(可拉明)
【单选题】
扩张型心肌病第一阶段的临床表现为___
A. 无症状,X线检查可有心脏轻度增大
B. 极度疲劳、乏力症状
C. 气促、心悸等症状
D. 肝脏肿大、水肿
E. 腹水等充血性心力衰竭表现
【单选题】
对可疑糖尿病患者最有价值的检查是___
A. 空腹血糖
B. 饭后2小时尿糖
C. 24小时尿糖定量
D. 口服葡萄糖耐量试验
E. 糖化血红蛋白测定
【单选题】
糖尿痫患者控制饮食的目的是___
A. 减轻体重、防止肥胖
B. 控制血糖、减轻胰岛B细胞的负担
C. 减慢肠蠕动、防止腹泻
D. 减少胰液分泌
E. 延缓消化道吸收
【单选题】
有机磷中毒时,下列哪一项不符合毒蕈碱样表现___
A. 肌力减弱
B. 呕吐、腹痛、腹泻
C. 瞳孔针尖样缩小
D. 心率减慢
E. 多汗
【单选题】
急性心包炎患者当心影向两侧扩大,呈烧瓶样时提示心包积液量___
A. 大于50ml
B. 大于100ml
C. 大于150ml
D. 大于300ml
E. 大于250ml
【单选题】
下列哪项不是判断糖尿病治疗效果的指标___
A. 餐后血糖
B. 空腹血糖
C. 糖尿
D. 胰岛素释放试验
E. 糖化血红蛋白
【单选题】
乙型病毒性肝炎主要的传播途径是___
A. 粪-口传播
B. 血液传播
C. 垂直传播
D. 呼吸道传播
E. 蚊虫叮咬
【单选题】
肺气肿患者最具特征性的体征是___
A. 肋间隙饱满
B. 呼吸运动减弱
C. 触觉语颤减弱
D. 双肺叩诊呈过清音
E. 听诊呼吸音减弱,呼气延长
【单选题】
下面对于心绞痛患者的用药指导,不妥的是___
A. 坚持服用预防心绞痛发作的药物
B. 发生心动过缓时应暂停服用并到医院就诊
C. 随身携带硝酸甘油片
D. 硝酸甘油应避光保存,放置在固定地点
E. 每年更换一次药物
【单选题】
诊断早期肺心病的主要依据是___
A. 长期慢性胸、肺疾患病史
B. 胸廓呈桶状、语颤减弱
C. 肺动脉瓣区第二心音增强
D. 肺动脉高压及右心室增大征象
E. 三尖瓣区收缩期杂音
【单选题】
术后并发甲状腺危象的主要原因是___
A. 术前准备不充分
B. 术中出血过多
C. 甲状腺切除过少
D. 术后未服碘剂
E. 精神过度紧张
【单选题】
紧急胃镜检查应在消化道出血后___
A. <24小时
B. 24~48小时
C. 48~72小时
D. >72小时
E. 出血停止
【单选题】
心电图检查时红色导联线应连接在___
A. 右上肢
B. 右下肢
C. 左下肢
D. 胸前
E. 左上肢
【单选题】
腰椎穿刺的部位是___
A. 第1~2腰椎之间
B. 第1~3腰椎之间
C. 第2~3腰椎之间
D. 第5~6腰椎之间
E. 第4~5腰椎之间
【单选题】
下列哪个选项不属于肝性脑病的临床分期___
A. 前驱期
B. 昏迷前期
C. 昏睡期
D. 昏迷期
E. 昏迷后期
【单选题】
某女性患者,头昏、乏力、面色苍白1年余,体检除贫血貌外,无特殊发现。血象HB75g/L,RBC2.5×10[~12.gif]/L,WBC4.0×10/L,PLT120×10/L,网织红细胞0.06,肝肾功能正常,血清铁降低。追问病史,患者有月经过多,初步诊断为缺铁性贫血。下列哪项不支持该诊断___
A. 血清铁蛋白降低
B. 血象呈小细胞低色素性贫血
C. 骨髓缺乏可染铁
D. 血清总铁结合力
E. 骨髓红系下降增生为主,以中晚幼红细胞增生为主,粒系、巨核细胞系增生
【单选题】
急性肾盂肾炎护理措施正确的是___
A. 立即应用抗菌药物治疗,再留尿检查
B. 清淡富有营养的饮食且多饮水
C. 高热量、高维生素饮食且少饮水
D. 体温39℃时不需要物理降温
E. 高脂肪、高热量、高维生素饮食
推荐试题
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic