相关试题
【单选题】
从胎儿娩出到胎盘娩出,不应超过___
A. 15分钟
B. 20分钟
C. 30分钟
D. 45分钟
E. 60分钟
【单选题】
下列表述最能全面反映伦理学概念内涵的是___
A. 研究职业道德现象的科学
B. 研究政治道德现象的科学
C. 研究道德现象的科学
D. 研究婚姻家庭道德现象的科学
E. 研究社会公德的科学
【单选题】
支气管扩张最常见的病因是___
A. 肺脓肿
B. 慢性支气管炎反复发作
C. 婴幼儿期患麻疹、百日咳等
D. 气胸
E. 医院获得性肺炎
【单选题】
患者为慢性呼吸衰竭,近日因咳嗽、咳痰,气促明显,又出现神志不清,发绀、多汗,做血气分析PaO50mmHg,PaCO62mmHg。应给予患者___
A. 高浓度、高流量持续吸氧
B. 高浓度、高流量间歇吸氧
C. 低浓度、低流量持续吸氧
D. 低浓度、低流量间歇吸氧
E. 乙醇湿化吸氧
【单选题】
对宫内节育器避孕原理描述正确的是___
A. 抑制排卵
B. 阻止受精卵的运行
C. 改变宫颈黏液性质
D. 改变子宫内膜周期变化
E. 改变官腔内环境
【单选题】
麻疹的传播途径是___
A. 飞沫呼吸道传染
B. 虫媒传播
C. 垂直传播
D. 空气传播
E. 粪,口传播
【单选题】
污染伤口是指___
A. 伤后12小时以上处理的伤口
B. 切口感染的手术切口
C. 有异物存留24以上的伤口
D. 伤后8小时以内的处理伤口
E. 甲状腺手术的切口
【单选题】
局麻药中毒中期表现为肌肉震颤,其常见部位是___
A. 颈部肌肉
B. 腹部肌肉
C. 颜面肌肉
D. 肩颈部肌肉
E. 躯干肌肉
【单选题】
正常足月妊娠脐带的平均长度是___
A. 40cm
B. 30cm
C. 55cm
D. 60cm
E. 70cm
【单选题】
小儿听觉发育完善的年龄大约在___
A. 2个月
B. 6个月
C. 1岁
D. 2岁
E. 4岁
【单选题】
一氧化碳与血红蛋白的亲和力要比氧与血红蛋白的亲和力大___
A. 200~300倍
B. 350~400倍
C. 450~500倍
D. 550~600倍
E. 1000倍以上
【单选题】
患者,男性,67岁,2型糖尿病,未正规治疗,近1周来发现尿频、尿急、尿痛,伴腰痛、低热。可能的原因是___
A. 急性肾炎
B. 肾盂肾炎
C. 慢性肾炎
D. 输尿管结石
E. 肾病综合征
【单选题】
初产妇,23岁,第二产程破膜后突然呛咳,烦躁,呼吸困难,随即昏迷,血压50/30mmHg。该产妇可能发生了___
A. 先兆子宫破裂
B. 胎盘早剥
C. 产时子痫
D. 羊水栓塞
E. 左心衰竭
【单选题】
患者,女性,29岁,甲状腺功能亢进行甲状腺大部切除术,术后2小时突然窒息,面部青紫,颈部切口下肿胀,其原因是___
A. 出血
B. 舌后坠
C. 甲状腺危象
D. 气管塌陷
E. 喉下神经损伤
【单选题】
氨中毒学说:肝性脑病主要发病机制是氨干扰大脑的___
A. 血液循环
B. 电解质平衡
C. 血氧供给
D. 水盐代谢
E. 能量代谢
【单选题】
患者,女性,46岁,腰麻下行阑尾切除术,术后发生尿潴留,其主要原因是___
A. 手术部位疼痛
B. 尿路结石
C. 不习惯卧床排尿
D. 神经损伤
E. 麻醉反应
【单选题】
正常新生儿应在出生后多长时间内排尿___
A. 8小时
B. 10小时
C. 24小时
D. 32小时
E. 48小时
【单选题】
发生心肌梗死的主要病理基础是___
A. 心肌需血量增加
B. 冠状动脉供血不足
C. 冠状动脉严重狭窄
D. 血氧供给不足
E. 劳累
【单选题】
妊娠期贫血最常见为___
A. 妊娠期贫血
B. 缺铁性贫血
C. 低色素性贫血
D. 巨幼细胞贫血
E. 再生障碍性贫血
【单选题】
下列临床表现中,甲亢和糖尿病共有的是___
A. 多食消瘦
B. 大便次数增多
C. 幻觉和燥狂
D. 四肢麻木感
E. 收缩压增高
【单选题】
以下叙述错误的是___
A. 原发性痛经生殖器官无器质性病变
B. 痛经可能与前列腺素分泌有关
C. 痛经可持续1~2天
D. 痛经多发于无排卵型功血
E. 痛经者可用解痉药
【单选题】
继发性腹膜炎最常见的致病菌是___
A. 白色念珠菌
B. 拟杆菌
C. 溶血性链球菌
D. 大肠埃希菌
E. 铜绿假单胞菌
【单选题】
急性肾功能衰竭少尿或无尿期常见的致死原因是___
A. 高磷血症与低钙血症
B. 低钠血症
C. 低氯血症
D. 高镁血症
E. 高钾血症
【单选题】
第一产程潜伏期延长指超___
A. 4小时
B. 8小时
C. 10小时
D. 12小时
E. 16小时
【单选题】
鹅口疮的病原体为___
A. 大肠埃希菌
B. 铜绿假单胞菌
C. 肺炎双球菌
D. 白色念珠菌
E. 溶血性链球菌
【单选题】
慢性肺炎的病程为___
A. <3个月
B. >1个月
C. <1个月
D. >3个月
E. 1~3个月
【单选题】
对热衰竭发生机制描述正确的是___
A. 体温调节中枢受损
B. 大量出汗致血容量不足
C. 散热不足
D. 脑组织充血水肿
E. 电解质紊乱
【单选题】
下列关于低血钾的病因不正确的是___
A. 长期不能进食
B. 急性肾功能衰竭
C. 严重呕吐,持续胃肠减压
D. 大量注射葡萄糖并与胰岛素合用
E. 碱中毒
【单选题】
正常新生儿每日共需热能量约___
A. 318~410kJ/kg
B. 358~420kJ/kg
C. 378~442kJ/kg
D. 418~502kJ/kg
E. 458~552kJ/kg
【单选题】
胚胎期造血最早出现在___
A. 卵黄囊
B. 淋巴结
C. 胸腺
D. 肝脾
E. 骨髓
【单选题】
损伤平面以下同侧肢体的运动和深感觉丧失,对侧肢体的痛觉和温度觉丧失称为___
A. 脊髓断裂
B. 脊髓挫伤
C. 脊髓休克
D. 脊髓圆锥损伤
E. 脊髓半切征
【单选题】
不属肺癌的分类为___
A. 鳞癌
B. 腺癌
C. 大细胞癌
D. 未分化的小细胞癌
E. 鳞腺癌
【单选题】
胆汁内的主要成分为___
A. 胆盐、磷脂酰胆碱、胆红素
B. 胆盐、磷脂酰胆碱、胆固醇
C. 胆盐、胆红素、胆固醇
D. 磷脂酰胆碱、胆红素、钙盐
E. 磷脂酰胆碱、胆固醇、钙盐
【单选题】
气性坏疽是属于___
A. 毒血症
B. 菌血症
C. 脓血症
D. 败血症
E. 脓毒败血症
【单选题】
脑干损伤瞳孔表现常是___
A. 一侧瞳孔散大,对光反射减弱
B. 双侧瞳孔散大,对光反射减弱或消失
C. 双侧瞳孔时大时小,对光反射消失,伴眼球运动障碍
D. 一侧瞳孔缩小,对光反射减弱或消失
E. 双侧瞳孔缩小,对光反射正常
【单选题】
新生儿排胎便的时间为___
A. 生后1~2天
B. 生后6小时内
C. 生后24小时内
D. 生后2~3天
E. 生后12小时内
【单选题】
有关急性胰腺炎患者尿淀粉酶与血清淀粉酶描述正确的是___
A. 两者同时下降
B. 尿淀粉酶先增高
C. 血清淀粉酶先增高
D. 尿淀粉酶下降
E. 尿淀粉酶持续下降
【单选题】
初乳的颜色为___
A. 淡黄色
B. 混浊淡白色
C. 混浊淡黄色
D. 黄色
E. 白色
【单选题】
门静脉和腔静脉之间的交通支不包括___
A. 食道胃底静脉交通支
B. 直肠下段、肛管交通支
C. 前腹壁交通支
D. 腹膜后交通支
E. 下腔静脉交通支
【单选题】
白细胞计数的正常值是___
A. 3.0×10~9.0×10/L
B. 4.0×10~10.0×10/L
C. 4.0×10~9.0×10/L
D. 3.0×10~10.0×10/L
E. 40×10~110×10/L
推荐试题
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image