【单选题】
患者,男性,46岁,有嗜酒史。近2年来常感腹胀,食欲减退,齿龈出血,但仍坚持工作。最近1周来下肢水肿明显,昨晚呕血后进入昏迷状态。应考虑___
A. 肝性脑病
B. 乙醇(酒精)中毒性昏迷
C. 糖尿病酮症昏迷
D. 尿毒症性昏迷
E. 低血糖昏迷
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
患者,男性,52岁,中午饱餐1小时后突然出现中.上腹部剧烈的刀割样疼痛,且向腰背部放射,继而呕出胆汁,伴高热.面色苍白。急诊入院检查时全腹疼痛,腹肌强直。紧急处理措施不妥的是___
A. 静脉输液
B. CT检查
C. 检查
D. 解痉止痛
E. 鼻饲流质
【单选题】
肝穿刺的部位___
A. 右锁骨中线第2肋间
B. 右腋中线第8~9肋间
C. 右锁骨中线第9~10肋间
D. 右锁骨中线第5~6肋间
E. 右腋中线第9~10肋间
【单选题】
原发性肝癌早期诊断的主要血检指标是___
A. AFP
B. ALT
C. AST
D. LDHE
E. 血清铁蛋白
【单选题】
当前诊断小肝癌和微小肝癌的最佳检查方法是___
A. 超
B. T
C. 穿刺活检
D. 线肝血管造影
E. 射性核素肝显像
【单选题】
主细胞分泌___
A. 碱性黏液
B. 盐酸
C. 胃泌素
D. 胃蛋白酶原
E. 胃液
【单选题】
十二指肠溃疡发生的原因主要是___
A. 吸烟
B. 喝酒
C. 损害因素增强
D. 粘膜修复快
E. 胃液减少
【单选题】
幽门梗阻时呕吐特点___
A. 鲜血
B. 咖啡样
C. 喷射性
D. 隔夜食物
E. 食后即吐
【单选题】
腹泻时应观察患者以下何种表现___
A. 食欲不振
B. 恶心呕吐
C. 烦躁不安
D. 脱水或电解质紊乱
E. 头痛
【单选题】
急性胰腺炎患者为抑制或减少胰液分泌的措施是___
A. 补充液体
B. 吸氧
C. 胃肠减压
D. 纠正休克
E. 解痉镇痛
【单选题】
呈喷射状呕吐的是___
A. 急性胃炎
B. 胃溃疡
C. 慢性胃炎
D. 颅内高压症
E. 十二指肠溃疡
【单选题】
小肠病变引起的腹痛部位为___
A. 上腹正中
B. 左下腹
C. 右肋下
D. 右下腹
E. 脐周
【单选题】
早期胃癌是指___
A. 癌肿小于1cm,无淋巴结转移
B. 癌肿浸润不超过粘膜下层,不论有无局部淋巴结转移
C. 癌肿浸润超过肌层,不论有无局部淋巴结转移
D. 癌肿面积大于3cm
E. 癌肿浸润粘膜层.粘膜下层及肌层
【单选题】
黏液细胞分泌___
A. 盐酸
B. 胃蛋白酶原
C. 胃泌素
D. 胃液
E. 碱性黏液
【单选题】
胃溃疡的发生原因主要是___
A. 保护因素削弱
B. 氧自由基
C. 精神紧张
D. 胆汁反流
E. 胃壁血供减少
【单选题】
消化性溃疡的治疗原则是___
A. 采取综合性治疗的措施
B. 丰富胃壁血运
C. 增强粘膜更新
D. 消除精神紧张
E. 阻止胆汁反流
【单选题】
易导致癌变的胃炎是___
A. 肥厚性胃炎
B. 胃窦胃炎
C. 胃体胃炎
D. 萎缩性胃炎
E. 浅表性胃炎
【单选题】
即可杀灭幽门螺旋杆菌,又可保护胃粘膜的药物是___
A. 甲硝唑
B. 黄连素
C. 阿莫西林
D. 呋喃唑酮
E. 次枸橼酸铋
【单选题】
幽门螺旋杆菌阳性的慢性胃炎三联疗法包括___
A. 阿莫西林+甲硝唑+次枸橼酸铋
B. 利福平+甲硝唑+乙胺丁醇
C. 氯霉素+红霉素+链霉素
D. 黄连素+呋喃唑酮+链霉素
【单选题】
上消化道出血的临床表现最主要取决于___
A. 病变部位的高低
B. 出血量与出血速度
C. 出血前患者全身情况
D. 病变性质的良恶
E. 出血时患者的抵抗力
【单选题】
使用三腔二囊管压迫止血过程中,突然呼吸困难.发绀.应立即行何种处理___
A. 上呼吸机
B. 清除呼吸道分泌物
C. 高流量吸氧
D. 静脉注射呼吸兴奋剂
E. 抽出气囊气体,同时检查是否脱出
【单选题】
男性,急性腹痛发作10小时入院,下列哪项检查对诊断急性胰腺炎最有价值___
A. 血清谷丙转氨酶测定
B. 血清脂肪酶测定
C. 血电解质测定
D. 血清钙测定
E. 血清淀粉酶测定
【单选题】
原发性肝癌最早.最常见的转移方式是___
A. 直接蔓延
B. 肝内血行转移
C. 种植转移
D. 肝外血行转移
E. 淋巴转移
【单选题】
胃溃疡并发幽门梗阻不宜服用___
A. 氧化镁
B. 澳丙胺太林(普鲁本辛)
C. 钙铋镁(胃得乐)
D. 氢氧化铝凝胶
E. 硫糖铝
【单选题】
胃溃疡和十二指肠溃疡的确诊依据是___
A. 胃镜检查
B. 胃肠钡餐检查
C. 血常规
D. 幽门螺旋杆菌(Hp)检查
E. 胃液分析
【单选题】
溃疡病患者失去原有的节律性腹痛,大便隐血试验持续阳性,首要考虑___
A. 幽门梗阻
B. 溃疡出血
C. 溃疡癌变
D. 溃疡活动
E. 溃疡穿孔
【单选题】
肝脏的血液供应有3/4来自___
A. 肝动脉
B. 肺静脉
C. 上腔静脉
D. 腹主动脉
E. 门静脉
【单选题】
某胃溃疡患者服用西咪替丁后出现全身乏力.皮疹.腹泻,血白细胞计数为3.4×10_TagUpStart_9_TagUpEnd_/L,您将采取下列哪项措施___
A. 立即停药
B. 加服抗过敏药
C. 缩短疗程
D. 加倍服用
E. 剂量减半
【单选题】
有一肝硬化腹水患者,突然出现腹痛和发热,体温38.5℃,血白细胞计数为14.0×10_TagUpStart_9_TagUpEnd_/L,腹水混浊,经培养有大肠埃希菌生长。该患者可能并发___
A. 脓毒血症
B. 胆道感染
C. 自发性腹膜炎
D. 结核性腹膜炎
E. 败血症
【单选题】
下列哪一项不是肝硬化失代偿期肝功能减退的临床表现___
A. 侧支循环建立
B. 面色灰暗黝黑
C. 乏力
D. 出血倾向
E. 性欲减退
【单选题】
肝硬化患者血清白蛋白低于25g/L时会出现___
A. 感染
B. 出血
C. 腹水
D. 营养不良
E. 肝细胞坏死
【单选题】
三腔二囊管放置24小时后,需放气并放松牵引的目的是___
A. 防止胃受压
B. 避免胃扩张
C. 暂时解除胃底贲门受压
D. 证实出血是否停止
E. 预防囊壁和胃粘膜粘连
【单选题】
患者,男性,56岁,常于餐后3~4小时上腹部胀痛,进食后缓解。最近1周来中上腹部持续性胀痛,较以往严重,伴恶心.呕吐。2小时前呕血一次后十分紧张,气促明显,测血压为13.7/9.6kPa(103/72mmHg)。您认为该患者潜在的护理问题是下列哪一项___
A. 疼痛
B. 体液不足
C. 活动无耐力
D. 焦虑
E. 休克
【单选题】
患者,男性,28岁,5年来空腹胃痛.反酸,有出血史,伴恶心.呕吐。检查:腹软,中上腹部有轻度压痛。胃液分析最大酸分泌42mmol/h,胃镜示十二指肠球部溃疡。下列哪个护理问题不妥___
A. 溃疡病
B. 舒适的改变
C. 体液不足
D. 疼痛
E. 知识缺乏
【单选题】
三腔二囊管压迫止血的部位是___
A. 胃体部
B. 胃底贲门部
C. 胃大弯
D. 胃窦部
E. 胃小弯
【单选题】
三腔二囊管压迫过程中,若胃气囊阻塞咽喉时患者会出现___
A. 窒息
B. 胸闷
C. 恶心
D. 喉头水肿
E. 低氧血症
【单选题】
溃疡性结肠炎的临床表现一般不包含___
A. 腹痛
B. 腹泻与便秘
C. 便血
D. 黄疸
E. 贫血
【单选题】
诊断消化性溃疡不必要的检查是___
A. 血常规
B. 胃镜
C. X线钡餐
D. 胃粘膜活检
E. 幽门螺旋杆菌(Hp)
【单选题】
患者,男性,37岁,曾有乙型肝炎史,最近数月来常有牙龈.鼻出血,腹胀明显。为明确诊断,下列哪一项检查方法既快又准___
A. 肝功能
B. 甲胎蛋白
C. 凝血酶原时间测定
D. 放射性核素
E. B超
【单选题】
既能止血又能降低门静脉压力的药物是___
A. 维生素C
B. 垂体后叶素
C. 酚磺乙胺(止血敏)
D. 氨甲苯酸
E. 思他宁
【单选题】
女性患者,胃溃疡癌变后采用化学治疗,最近因受凉后出现全身乏力.呼吸困难。查体:体温39.2℃,脉率103次/分,呼吸率26次/分,血压14.7/10.6kPa(110/80mmHg)。血中白细胞计数为13.6×10_TagUpStart_9_TagUpEnd_/L。属于该患者护理诊断的是 ___
A. 血白细胞计数升高
B. 体温过高
C. 肺部感染
D. 化学治疗反应
E. 胃溃疡
推荐试题
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP