相关试题
【单选题】
穿脱隔离衣的操作步骤正确的是___
A. 双手伸入袖内后扣袖扣
B. 扣好领扣后系腰带
C. 将腰带交叉在背后打结
D. 消毒手后先解开领扣
E. 将隔离表内面向外,挂传染病室内
【单选题】
将物品上除芽孢以外的所有致病微生物杀灭的方法被称为___
A. 灭菌
B. 无菌
C. 消毒
D. 清洁
E. 抑菌
【单选题】
需要密切观察血压的病情是___
A. 急性感染
B. 哮喘
C. 腹泻
D. 休克
E. 恶心、呕吐
【单选题】
甲状腺功能亢进,需行碘治疗,你将如何对其进行饮食指导___
A. 治疗中忌食绿色蔬菜
B. 治疗前2个月禁食海带、紫菜类食物
C. 治疗前3天禁食含碘类食物
D. 告知病人治疗当日不用碘酊消毒
E. 治疗前1个月食用纤维素高的饮食
【单选题】
有关护理工作范畴不准确的叙述是___
A. 护理教育包括基础护理学教育、毕业后护理学教育、继续护理学教育
B. 护理管理仅是护理管理人员的责任
C. 护理科研意识是每一位护理人员应当具备的
D. 护理工作范围正由医院扩展到社区
E. 基础护理是临床各专科护理的基础
【单选题】
抢救溺水病人的首要步骤___
A. 抢救溺水病人的首要步骤
B. 松开领口、腰带
C. 俯卧人工呼吸
D. 给氧
E. 应用呼吸中枢兴奋剂
【单选题】
患者李某,60岁,心内膜炎,需混合注射红霉素和青霉素,皮试结果均为阴性,此时护士首先应考虑的是___
A. 药物有无配伍禁忌
B. 药物的有效期限
C. 各种药物的剂量
D. 药物的刺激性
E. 各种药物的浓度
【单选题】
关于排便性质异常,错误的描述是___
A. 上消化道出血为柏油样便
B. 胆道完全阻塞时粪便呈陶土色
C. 消化不良者大便呈腥臭味
D. 痔出血在排便后有鲜血滴出
E. 痢疾病人粪便呈黏液血便
【单选题】
我国第一所护士学校创办的时间和地点是___
A. 1887年福州
B. 1887年广东省
C. 1888年福州
D. 1888年广东省
E. 1835年广东省
【单选题】
符合罗伊对刺激理解的是___
A. 环境中对人产生影响的刺激可分为主要刺激、次要刺激和相关刺激
B. 相关刺激是指可观察到的,需立即进行适应的刺激
C. 固有刺激是指人直接面对的,需立即进行适应的刺激
D. 主要刺激是指人直接面对的,需立即进行适应的刺激
E. 主要刺激是指原有的,构成本人特性的,能对行为发生影响的不确定因素
【单选题】
老年护理措施指导思想正确的是___
A. 外出活动要陪伴,以防孤单
B. 进食不宜过快,以助消化
C. 洗澡水温40℃以下,洗得干净
D. 大小便宜坐位,以免便秘
E. 体位变换宜慢,防止体位性低血压
【单选题】
关于客观资料的记录,正确的是___
A. 每天排尿4~5次,量中等
B. 咳嗽剧烈,有大量黏痰
C. 每天饮白开水4~5次,每次约200ml
D. 每餐主食2碗,一日3餐
E. 发热2天,午后明显
【单选题】
下列的药物不是脱水利尿剂的是___
A. 20%甘露醇
B. 利尿酸钠
C. 速尿
D. 11.2%乳酸钠
E. 尿素
【单选题】
在治疗性沟通中和病人约定下次交谈时间和内容的阶段是___
A. 准备阶段
B. 计划阶段
C. 沟通开始阶段
D. 沟通进行阶段
E. 沟通结束阶段
【单选题】
导致输血发热反应的因素不包括___
A. 血液保养液被污染
B. 多次输血
C. 输血用具被污染
D. 输血前红细胞已变质溶解
E. 违反无菌操作原则,血制品被污染
【单选题】
下列与儿童类风湿病有关致病因素为___
A. 抗生素
B. 免疫抑制剂
C. 病毒感染
D. 类固醇激素
E. 抗风湿药
【单选题】
关于1岁小儿体格正常发育,描述正确的是___
A. 身长100cm
B. 体重8kg
C. 头围52cm
D. 乳牙4颗
E. 前囟门未闭
【单选题】
破伤风致病菌属于___
A. 革兰染色阴性厌氧芽胞梭菌
B. 革兰染色阴性需氧杆菌
C. 革兰染色阳性厌氧芽胞杆菌
D. 革兰染色阳性需氧芽胞杆菌
E. 革兰染色阴性厌氧杆菌
【单选题】
高压氧疗治疗一氧化碳中毒的主要机制是___
A. 增加血液中溶解氧量使易向细胞内弥散
B. 促进血液中碳氧血红蛋白解离
C. 保护主要脏器供氧
D. 加速体内血液循环
E. 增加椎动脉血容量
【单选题】
患者面容枯槁,面色灰白或发绀,表情淡漠为___
A. 肝病面容
B. 肾病面容
C. 危重病容
D. 甲状腺功能亢进病容
E. 二尖瓣病容
【单选题】
股疝易嵌顿,主要是因为___
A. 病人年龄大
B. 腹内压过高
C. 股管解剖特点
D. 病人多为女性
E. 骨盆窄小
【单选题】
胎头内旋转发生于___
A. 第二产程开始
B. 第二产程中
C. 第一产程末
D. 第一产程中
E. 第三产程开始
【单选题】
吸气性呼吸困难发生的机制是___
A. 上呼吸道狭窄
B. 细小支气管狭窄
C. 呼吸面积减少
D. 肺纤维化
E. 呼吸中枢受损
【单选题】
有关原发综合征叙述正确的是___
A. 钙化或硬结是其常见转归
B. 原发综合征病变由原发病灶及肿大的淋巴结组成
C. 原发综合征不会发生病变恶化
D. 原发综合征基本病变是坏死
E. 原发综合征病变由原发灶及发炎的淋巴管组成
【单选题】
男性,32岁。既往有胃病史,近1周来常感上腹疼痛,4h前突发上腹部剧烈疼痛,伴有恶心、呕吐。查体:腹部压痛、肌紧张,肝浊音界缩小。X线检查可见膈下游离气体,首先考虑的是___
A. 急性阑尾炎穿孔
B. 胆囊炎穿孔
C. 急性胰腺炎
D. 溃疡穿孔
E. 急性肠梗阻
【单选题】
肋骨骨折常见于___
A. 第12肋
B. 第10肋
C. 第8~9肋
D. 第4~7肋
E. 第2~3肋
【单选题】
关于粟粒型肺结核的描述不正确的是___
A. 血沉增快
B. PPD试验阳性对诊断起决定性作用
C. 多数起病急,有高热、盗汗、食欲缺乏等表现
D. X线检查两肺粟粒状阴影大小均匀、肺野分布均匀、阴影密度均匀
E. 多数患儿可并发结核性脑膜炎
【单选题】
容量依赖型高血压的主要发病原理是___
A. 肾血管扩张
B. 水、钠潴留
C. 肾血流量下降
D. 醛固酮增多
E. 高尿酸血症
【单选题】
前庭大腺炎的主要病原体为___
A. 葡萄球菌、大肠杆菌、链球菌、白念珠菌、淋病奈瑟菌、沙眼衣原体
B. 葡萄球菌、大肠杆菌、链球菌、棒状杆菌、淋病奈瑟菌、沙眼衣原体
C. 葡萄球菌、大肠杆菌、链球菌、肠球菌、淋病奈瑟菌、沙眼衣原体
D. 葡萄球菌、大肠杆菌、白念珠菌、肠球菌、淋病奈瑟菌、沙眼衣原体CC
E. 葡萄球菌、大肠杆菌、白念珠菌、肠球菌、棒状杆菌、沙眼衣原体
【单选题】
胎先露完成内旋转需依靠___
A. 子宫收缩力
B. 膈肌收缩力
C. 肛提肌收缩力
D. 腹压
E. 腰肌收缩力
【单选题】
慢性胃窦炎的主要病因是___
A. 幽门螺杆菌
B. 不规律饮食
C. 长期饮酒
D. 刺激性饮食
E. 胃酸分泌增多
【单选题】
患者,女性,32岁,出现了高渗性脱水的表现,其病理生理改变是以___
A. 丢失钠为主
B. 丢失水为主
C. 丢失钠和水为主
D. 丢失铁为主
E. 丢失钾为主
【单选题】
关于上呼吸道的描述错误的是___
A. 由鼻、咽、喉组成上呼吸道
B. 咽是呼吸系统和消化系统的共同通路
C. 咽在咳嗽中起重要作用
D. 鼻对吸入气体有过滤、保湿、加温作用
E. 吞咽时,会厌覆盖喉口,防止食物进入下呼吸道
【单选题】
产后出血的定义是___
A. 产程中阴道出血量超过500ml
B. 在胎儿娩出后24小时内阴道出血量超过500ml
C. 在胎儿娩出后2小时内阴道出血量超过500ml
D. 在胎儿娩出后3小时内阴道出血量超过500ml
E. 在胎儿娩出后7天内阴道出血量超过500ml
【单选题】
放置宫内节育器后出现腰酸腹胀的原因是___
A. 节育器与宫腔大小或形态不符
B. 宫腔感染
C. 肠痉挛
D. 节育器嵌顿
E. 节育器异位
【单选题】
患者女性,26岁。初孕妇,末次月经记不清,自觉3周前开始胎动,检查子宫长度为23cm,比较符合实际的妊娠周数应是___
A. 14~16周
B. 17~19周
C. 20~22周
D. 23~25周
E. 26~28周
【单选题】
继发性闭经指月经初潮后,因病理性原因导致停经在___
A. 6个月以上
B. 10个月以上
C. 12个月以上
D. 100天以上
E. 60天以上
【单选题】
以下因素中,属于甲状腺功能亢进主要原因的是___
A. 精神创伤
B. 病毒感染
C. 过度劳累
D. ,自身免疫
E. 外部创伤
【单选题】
初乳中含量较多的免疫因子是___
A. IgG
B. IgD
C. sIgA
D. IgM
E. IgD
【单选题】
婴儿补充维生素D的时间是___
A. 生后1周
B. 生后2周
C. 生后3周
D. 生后4周
E. 生后2个月
推荐试题
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC