相关试题
【单选题】
羊羊,6个月。因阵发性哭闹伴呕吐8h来诊,体格检查:体温36.5℃,腹部稍隆,右侧腹部可触及一腊肠样肿块,有触痛,直肠指检发现指套上染有果酱样黏液便。应首先考虑___
A. 急性肠炎
B. 小肠扭转
C. 急性肠套叠
D. 阑尾周围脓肿
E. 蛔虫性肠梗阻
【单选题】
血液病人继发感染如部位在泌尿系可见___
A. 血尿、尿频、尿痛、尿急
B. 咳嗽有痰带血
C. 大便有脓
D. 左下腹压痛
E. 呕血
【单选题】
某中年女性患者,中午服敌百虫农药半杯,晚7时被家人发现,随即送来就诊,检查:躁动不合作、流涎、出汗、心率64次/min、呼吸28次/min、瞳孔1.5mm,不宜采用___
A. 催吐
B. 1:5000高锰酸钾溶液洗胃
C. 吸氧
D. 灌入50%硫酸镁导泻
E. 按医嘱立即注射阿托品
【单选题】
支气管扩张患者的咳嗽特点为___
A. 晨起及晚间躺下时较重
B. 常出现刺激性干咳
C. 有时呈阵发性呛咳
D. 后期咳嗽加重并伴喘鸣声
E. 严重者出现呼气性呼吸困难
【单选题】
曹先生,38岁。6日前因溃疡穿孔行穿孔修补术,术后体温持续在38~39℃之间,今出现排便次数增多,伴里急后重。应考虑为___
A. 急性肠炎
B. 膈下脓肿
C. 盆腔脓肿
D. 肠襻间脓肿
E. 髂窝脓肿
【单选题】
已确诊为肺炎的病人,查血发现白细胞增多,且有核左移。说明___
A. 是克雷白杆菌所致
B. 是肺炎球菌所致
C. 病情较轻
D. 是幽门螺杆菌所致
E. 中毒严重
【单选题】
某慢性支气管炎病人合并慢性阻塞性肺气肿后,又发生Ⅱ型呼吸衰竭,最重要的护理措施是何项___
A. 通畅气道
B. 给抗生素
C. 给氧吸入
D. 给强心剂
E. 给祛痰剂
【单选题】
热射病的主要临床特征为___
A. 体温高达40~42℃
B. 面色潮红,皮肤灼热
C. 常发生弥散性血管内凝血
D. 大脑温度达40~42℃,体温并不一定增高
E. 谵妄、惊厥、昏迷
【单选题】
H受体拮抗剂为何要与饮食同进___
A. 避免吸收太快
B. 避免对胃刺激
C. 避免胃潴留
D. 避免心律失常
E. 避免胃酸降得太快
【单选题】
临床上可观察到黄疸时,血清总胆红素应超过___
A. 0.5mg/dL
B. 1.0mg/dL
C. 1.5mg/dL
D. 2.0mg/dL
E. 2.5mg/dL
【单选题】
以下哪一条不符合理化因素所致疾病的规律___
A. 病因易查明
B. 各病均有自己特点
C. 演变迅速
D. 病变缓慢
E. D.病变缓慢
【单选题】
两侧瞳孔大小不等常提示___
A. 颅内病变
B. 虹膜炎
C. 视神经萎缩
D. 阿托品中毒
E. 有机磷农药中毒
【单选题】
突然发生的短暂的意识丧失称为___
A. 昏睡
B. 昏厥
C. 浅昏迷
D. 深昏迷
E. 意识模糊
【单选题】
病人肢体可脱离床面,但不能对抗阻力,肌力为___
A. 0级
B. 1级
C. 2级
D. 3级
E. 4级
【单选题】
谢女士,患糖尿病,胰岛素治疗期间突然心悸、饥饿、出汗,随即意识不清首要的措施为___
A. 加大胰岛素剂量
B. 加用优降糖
C. 静脉注射50%葡萄糖
D. 静脉滴注碳酸氢钠
E. 应用呼吸兴奋剂
【单选题】
判断有机磷农药中毒程度的检查是___
A. 血清丙氨基转移酶
B. 碳氧血红蛋白测定
C. 残留农药测定
D. 神经靶酯酶
E. 胆碱脂酶活力测定
【单选题】
急性白血病病人需要实行保护性隔离的是___
A. 化疗期间
B. 发热的时候
C. 骨髓象增生活跃
D. 白细胞<1×10/L
E. 肝脾、淋巴结肿大
【单选题】
正常人心尖搏动的位置在___
A. 左第5肋间锁骨中线内侧0.5~1cm
B. 左第5肋间锁骨中线外侧0.5~1cm
C. 右第5肋间锁骨中线内侧0.5~1cm
D. 右第5肋间锁骨中线外侧0.5~1cm
E. 左第4肋间锁骨中线外1.0cm
【单选题】
理化因素所致疾病特点___
A. 临床表现多变
B. 病情急缓不定
C. 病因明确
D. 变化快慢不定
E. 处理急缓不等
【单选题】
头痛由脑血管扩张所致者可用以下哪种方法缓解___
A. 头部热敷
B. 拔火罐
C. 服止痛药
D. 头部冷敷
E. 平卧
【单选题】
沈小姐,25岁。上腹部疼痛伴恶心、呕吐已8日,考虑为"急性胰腺炎"。此时,最具诊断价值的实验室检查是___
A. 血清淀粉酶
B. 尿淀粉酶
C. 血清脂肪酶
D. 血钙
E. 血糖
【单选题】
甲状腺功能亢进病人服用抗甲状腺功能亢进药物为什么不能立即见效___
A. 药物是缓释型
B. 药量小需积累
C. 对已合成的甲状腺素无作用
D. 药物尚未分布全身各脏器
E. 逐渐解决不宜快
【单选题】
配制混合胰岛素时,必须先抽吸短效胰岛素是为了防止___
A. 发生中和反应
B. 加速胰岛素降解
C. 丧失短效胰岛素的速效特性
D. 降低鱼精蛋白锌胰岛素药效
E. 增加胰岛素的不良反应
【单选题】
左心衰竭后又出现右心衰竭,出现___
A. 发绀减轻
B. 呼吸困难加重
C. 咳泡沫痰增多
D. 双肺湿啰音减少
E. 腹腔积液消失
【单选题】
急性白血病化疗诱导缓解成功后体内仍有白血病细胞10[~8.gif]~10___
A. 肝内
B. 中枢神经系统处
C. 脾内
D. 胸骨内
E. 脊椎骨内
【单选题】
系统性红斑狼疮常见皮损是___
A. 紫癜
B. 蝶形红斑
C. 玫瑰疹
D. 荨麻疹
E. 血肿
【单选题】
门静脉高压时,腹壁静脉曲张的血流方向为___
A. 自上而下
B. 自下而上
C. 脐上向上,脐下向下
D. 脐上向下,脐下向上
E. 无一定规律
【单选题】
黄疸呈淡柠檬色的是___
A. 溶血性贫血
B. 肝炎
C. 肝硬化
D. 胆石症
E. 胰头癌
【单选题】
雷尼替丁抑制胃酸分泌的作用机制是___
A. 与溃疡面结合形成保护屏障
B. 抑制壁细胞分泌H-K-ATP酶
C. 与盐酸作用形成盐和水
D. 通过选择性竞争结合H受体,使壁细胞分泌胃酸减少
E. 可刺激局部内源性前列腺素的合成
【单选题】
正常人腹部常可触及的脏器是___
A. 胆囊
B. 脾脏
C. 肝脏
D. 胰脏
E. 肾脏
【单选题】
甲状腺功能亢进病人查血清促甲状腺激素降低何故___
A. 负反馈
B. 垂体功能不良
C. 血T低
D. 血T低
E. 下丘脑功能不良
【单选题】
热痉挛患者的突出表现是___
A. 骨骼痉挛
B. 全身四肢肌无力
C. 呼吸肌痉挛,呼吸麻痹
D. 胸大肌痉挛,胸痛
E. 肠道平滑肌痉挛,急腹痛
【单选题】
在严重创伤或感染时,最易受损的器官是___
【单选题】
关于肺结核的发病因素,下列哪项不正确___
A. 致病菌为结核杆菌
B. 主要通过呼吸道感染
C. 感染后是否发病与入侵细菌的数量和毒力关系密切
D. 机体的免疫力和过敏反应也是重要的发病因素
E. 过敏反应强烈可使细菌扩散
【单选题】
支气管扩张患者的病变部位在下叶后基底段,作体位引流应取哪种体位___
A. 平卧位
B. 俯卧位,腰臀部抬高
C. 仰卧位,腰部抬高
D. 左侧卧位,腰部抬高
E. 右侧卧位,腰部抬高
【单选题】
支气管扩张咳痰特点___
A. 体力劳动时咳痰
B. 晚间咳痰
C. 长期咳痰
D. 体位改变时痰多
E. 坐时咳痰
【单选题】
病人有黄疸应想到___
A. 多吃胡萝卜
B. 多吃核黄素
C. 多吃瘦肉
D. 血中有胆红素
E. 多吃蛋白质
【单选题】
慢性支气管炎何故并发肺气肿___
A. 气管黏膜肿胀致肺泡壁断裂
B. 慢性胸壁炎症致肺泡收缩无力
C. 肺间质炎症致肺泡萎缩
D. 气管病变致肺泡排气不畅
E. 心力衰竭致肺淤血肺泡壁肿胀
【单选题】
风湿性疾病首位护理诊断是___
A. 有感染的危险
B. 预感性悲哀
C. 皮肤完整性受损
D. 疼痛
E. 知识缺乏
【单选题】
急性心衰主要表现为___
A. 急性体循环静脉淤血
B. 急性上腔静脉淤血
C. 急性下腔静脉淤血
D. 急性肺水肿
E. 急性消化道淤血
推荐试题
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding