刷题
导入试题
【单选题】
哪项治疗可中和游离毒素___
A. 应用TAT
B. 应用青霉素
C. 应用甲硝唑
D. 给氧
E. 以上都不对
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
低血钾常发生于___
A. 钾离子摄入减少
B. 醛固酮分泌减少
C. 钾离子进入细胞内减少
D. 肾脏排钾减少
E. 代谢性酸中毒
【单选题】
有关高渗性脱水,下列说法错误的是___
A. 水分摄入不足
B. 多以失盐为主
C. 水分排出过多
D. 口渴为最早症状
E. 血清钠>145mmol/L
【单选题】
马某,36岁,昨天硬膜外麻醉下行疝修补术,体温38℃,脉搏88次/min,最可能的是___
A. 肺部感染
B. 泌尿道感染
C. 伤口感染
D. 吸收热
E. 切口感染
【单选题】
防止门静脉高压症分流术后出血,手术后卧床___
A. 1天
B. 3天
C. 1周
D. 半月
E. 1个月
【单选题】
关于心脏骤停的叙述,错误的是___
A. 可以是心室纤颤
B. 可以是心脏停搏
C. 可以是心电机械分离
D. 几种类型后果相同
E. 几种类型心电图完全相同
【单选题】
破伤风发病的直接原因是___
A. 破伤风杆菌侵入机体
B. 全身缺乏免疫力
C. 破伤风杆菌在体内迅速
D. 破伤风杆菌产生的外毒素作用
E. 破伤风杆菌的菌体蛋白作用
【单选题】
骨折现场急救的方法是___
A. 止痛
B. 固定
C. 复位
D. 恢复功能
E. 缝合开放伤口
【单选题】
急性包裹性脓胸,脓液有恶臭味,主要治疗方法是___
A. 消炎治疗
B. 胸腔穿刺排脓
C. 开放引流
D. 闭式引流
E. 以上都不是
【单选题】
胆固醇结石形成的最主要原因是___
A. 胆汁成分改变
B. 胆道感染
C. 葡萄糖醛酸酶增加
D. 胆道内蛔虫残体存留
E. 胆道梗阻
【单选题】
诊断肝脓肿首选的检查方法是___
A. 腹部透视
B. 肝动脉血管造影
C. 超声检查
D. 胆管逆行造影
E. 口服胆道造影
【单选题】
小而深的伤口多见于___
A. 刺伤
B. 切割伤
C. 擦伤
D. 撕脱伤
E. 裂伤
【单选题】
颅内高压的体征___
A. 头痛
B. 呕吐
C. 血压降低
D. 视乳头水肿
E. 脉搏增快
【单选题】
破伤风最早出现的临床表现是___
A. 高烧
B. 呼吸困难
C. 苦笑面容
D. 牙关紧闭
E. 颈项强直
【单选题】
正常人体液的pH平均值是___
A. 7.3
B. 7.7
C. 7.6
D. 7.5
E. 7.4
【单选题】
内痔的特点是___
A. 肛门部有异物感
B. 易形成血栓
C. 便血
D. 无明显自觉症状
E. 易引起便
【单选题】
胆道疾病的首选检查的方法___
A. CT检查
B. 口服胆囊造影
C. 静脉胆道造影
D. 经皮肝穿刺胆管造影
E. B超检查
【单选题】
男性,50岁,发热,咳嗽,胸痛,呼吸急促,可疑急性脓胸,最有确诊意义的是___
A. 肺部叩诊浊音
B. 肋间饱满
C. 呼吸音减弱
D. 胸片大片阴影
E. 胸穿抽出脓液
【单选题】
血钾正常值为___
A. 1~1.5mmol/L
B. 2~3mmol/L
C. 3.5~5.5mmol/L
D. 5.6~7.4mmol/L
E. 7.5~8mmol/L
【单选题】
女性,52岁,B型超声波检查发现肝占位1周,已查肝功能正常。下列哪项阳性有助于诊断原发性肝癌___
A. γ-GT
B. AFP
C. MRI
D. CT
E. B-US
【单选题】
腰椎间盘突出症最常发生于___
A. 腰1~2椎
B. 腰2~3椎
C. 腰3~4椎
D. 腰4~5椎
E. 腰5~骶1
【单选题】
颅脑损伤病人腰穿为血性脑脊液应考虑___
A. 头皮血肿
B. 硬脑膜外血肿
C. 脑震荡
D. 头皮撕裂伤
E. 脑挫裂伤
【单选题】
胆道疾病首选的诊断方法是___
A. 口服胆囊造影
B. 静脉胆道造影
C. B超
D. 经皮肝穿刺胆管造影(PTC)
E. 内窥镜逆行性腹胆管造影(ERCP)
【单选题】
结肠癌最应重视的早期症状是___
A. 腹痛
B. 贫血
C. 排便习惯和粪便性质改变
D. 消瘦
E. 肿块
【单选题】
闭合性气胸气管移向___
A. 健侧
B. 患侧
C. 上方
D. 下方
E. 不移位
【单选题】
在下列急诊患者中首先应处理___
A. 休克
B. 尿道断裂
C. 开放性气胸
D. 头皮撕脱伤
E. 开放性骨折
【单选题】
关于肛门坐浴,哪项是错误的___
A. 准备清洁坐浴盆
B. 年老体弱者须防止跌倒
C. 坐浴15~20min
D. 用1:5000高锰酸钾溶液
E. 水温在60℃左右
【单选题】
严重高渗性脱水的病人首选补液的液体是___
A. 生理盐水
B. 平衡盐溶液
C. 5%葡萄糖溶液
D. 5%碳酸氢钠溶液
E. 5%葡萄糖盐水
【单选题】
关于骨折的治疗,下列哪项不正确___
A. 止血是骨折治疗的原则之一
B. 固定是使骨折部位恢复正常或接近正常的解剖位
C. 大多数骨折可手法复位
D. 固定的目的是使骨折部位稳定
E. 功能锻炼应循序渐进
【单选题】
排尿过程中突然尿流中断,疼痛剧烈,改变体位后又可排尿的是___
A. 肾结石
B. 输尿管结石
C. 膀胱结石
D. 后尿道结石
E. 前尿道结石
【单选题】
关于冬眠疗法的护理,哪一项是错误的___
A. 不宜翻身和移动体位
B. 体温不低于32℃
C. 保持水、电解质平衡
D. 保持水、电解质平衡
E. 复温时先停冬眠,后撤降温
【单选题】
对休克失代偿阶段表现,不正确的是___
A. 血压下降
B. 尿少
C. 代谢性碱中毒
D. 表情淡漠
E. 皮肤黏膜由苍白转为紫绀
【单选题】
颈椎骨折进行颅骨牵引时,采取何种体位___
A. 端坐位
B. 半坐卧位
C. 头低足高位
D. 头高足低位
E. 俯卧位
【单选题】
胆总管结石的性质___
A. 胆固醇结石
B. 胆色素结石
C. 泥沙样结石
D. 以胆固醇为主的混合结石
E. 以上都不对
【单选题】
胰腺癌的症状一般是___
A. 上腹痛及上腹饱胀不适
B. 黄疸
C. 消瘦
D. 发热
E. 出血
【单选题】
分流术后发生肝性脑病的主要原因___
A. 氨中毒
B. 胃肠道出血
C. 饥饿
D. 感染
E. 摄入大量蛋白质
【单选题】
压缩性骨折常见于___
A. 股骨干骨折
B. 肱骨干骨折
C. 椎体骨折
D. 桡骨骨折
E. 肋骨骨折
【单选题】
有明显腹膜刺激征的疾病是___
A. 急性阑尾炎穿孔
B. 肾结石
C. 不完全性肠梗阻
D. 急性胆囊炎
E. 输尿管结石
【单选题】
男性,50岁,阑尾切除术后5天,伤口红肿,触之有波动感,穿刺抽到脓液,其最佳处理是___
A. 用雷夫奴尔纱布换药
B. 局部理疗
C. 全身应用抗生素
D. 拆去缝线,伤口敞开引流
E. 以上都不是
【单选题】
关于胰腺癌的病理,错误的是___
A. 以导管细胞腺癌最多见
B. 好发部位胰腺头颈部
C. 最多见淋巴转移和癌浸润
D. 早期血行转移
E. 可广泛转移至周围组织
【单选题】
炎性腹痛表现不包括___
A. 起病缓,由轻到重
B. 持续性疼痛
C. 突发剧烈腹痛
D. 体温升高
E. 固定压痛部位
推荐试题
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用