相关试题
【单选题】
下列哪一项是慢性肾衰竭出现在皮肤的症状___
A. 皮肤溃疡
B. 皮肤瘙痒
C. 皮肤粘膜弥漫性黑色素沉着
D. 皮肤.粘膜易感染
E. 皮肤粗糙,易皲裂
【单选题】
关于急性肾盂肾炎表现描述错误的是___
A. 发热
B. 头痛
C. 恶心呕吐
D. 尿路刺激征
E. 高血压
【单选题】
慢性肾衰竭患者,常见的早期的症状是___
A. 贫血
B. 食欲不振
C. 心血管症状
D. 神经症状
E. 皮肤症状
【单选题】
尿毒症患者出现下列哪一种病症最为危及患者生命___
A. 心律失常
B. 心力衰竭
C. 高钾血症
D. 高血压
E. 严重贫血
【单选题】
尿毒症患者出现厌食.恶心呕吐和腹泻的最主要原因是___
A. 严重贫血
B. 高磷低钙
C. 水钠潴留
D. 低蛋白血症
E. 氮质代谢产物经消化道排出
【单选题】
尿毒症患者发生肾性骨病的主要原因是___
A. 营养不良
B. 贫血
C. 尿钙排泄增多
D. 继发性甲状旁腺功能亢进
E. 长期厌食和腹泻
【单选题】
尿毒症患者最具有特征性的表现是___
A. 厌食与呕吐
B. 呼气有尿臭味
C. 水肿
D. 呼吸深而大
E. 贫血
【单选题】
尿路结石所致少尿属于何种肾损害___
A. 肾前性
B. 肾后性
C. 肾实质性
D. 肾炎性E.混合性
E. 混合性
【单选题】
临床表现为膀胱炎的患者有1/3为___
A. 亚临床肾盂肾炎
B. 肾小球肾炎
C. 慢性肾炎
D. 隐匿性肾炎
E. 肾病综合征
【单选题】
下列哪项不是肾病综合征的典型临床表现___
A. 大量蛋白尿
B. 低蛋白血症
C. 高度水肿
D. 血尿
E. 高脂血症
【单选题】
我国目前慢性肾衰竭的主要病因居首位的是___
A. 原发性肾小球肾炎
B. 高血压肾病
C. 糖尿病肾病
D. 多囊肾
E. 狼疮性肾炎
【单选题】
健存肾单位学说描述的是下列哪项无法代偿时便会出现肾衰竭的症状___
A. 受损肾单位
B. 健存肾单位
C. 代偿肾单位
D. 储存肾单位
E. 衰竭肾单位
【单选题】
低血容量性休克所致肾损害属于何种肾损害___
A. 肾前性
B. 肾后性
C. 肾实质性
D. 混合性
E. 肾小管性损害
【单选题】
某一慢性肾衰竭患者,因存在中度酸中毒,给予5%碳酸氢钠纠酸,却出现了手足抽搐。处理应是___
A. 立即停止纠正酸中毒
B. 加快纠正酸速度
C. 立即静脉补钙
D. 一过性手足抽搐,不需处理
E. 立即注射地西泮
【单选题】
肾脏的主要生理功能不包括下列哪一项___
A. 调节免疫功能
B. 排泄代谢产物
C. 调节体液及酸碱平衡
D. 内分泌功能
E. 维持机体内环境的稳态
【单选题】
下列关于肾性水肿护理措施中哪一项不正确___
A. 肾性水肿患者应记录出入液量,尤应准确记录尿量
B. 一律给予低盐.低蛋白饮食
C. 定时测体重
D. 密切观察患者的生命体征的变化,尤其是血压变化情况
E. 向患者及家属解释限制水钠对水肿消退的重要性
【单选题】
蛋白尿按其发生机制分为五种,不包括___
A. 肾小球性蛋白尿
B. 小管性蛋白尿
C. 组织性蛋白尿
D. 混合性蛋白尿
E. 生理性蛋白尿
【单选题】
对于有明显全身感染症状,肋脊角疼痛.压痛和叩击痛,血白细胞增高的尿路感染患者应首先考虑___
A. 肾盂肾炎
B. 肾小球肾炎
C. 膀胱炎
D. 肋间神经炎
E. 尿道炎
【单选题】
下列哪项不是尿路刺激征的表现___
A. 尿频.尿急
B. 血尿.蛋白尿
C. 尿痛.排尿不尽感
D. 下腹坠痛
E. 肾区叩击痛伴尿痛
【单选题】
以下哪一项是肾小球疾病的始发机制___
A. 感染机制
B. 非炎性机制
C. 免疫机制
D. 炎性机制
E. 遗传机制
【单选题】
多数肾小球疾病是属于下列哪种炎症疾病___
A. 细胞介导性
B. 活性酶介导性
C. 免疫介导性
D. 内毒素介导性
E. 外毒素介导性
【单选题】
急性肾炎患者做尿常规检查,具有特征性的项目是___
A. 蛋白尿
B. 白细胞
C. 颗粒管型
D. 红细胞
E. 红细胞管型
【单选题】
肾脏哪一个部位分泌肾素___
A. 肾小球基膜
B. 肾髓质
C. 肾小管
D. 肾小球系膜
E. 肾小球旁器
【单选题】
下列哪一项改变为主是肾素依赖型高血压___
A. 水钠潴留
B. 血容量扩张
C. 肾素-血管紧张素-醛固酮系统被激活
D. 肾素分泌增加
E. 继发性醛固酮增多症
【单选题】
1L尿液含多少血液即呈肉眼血尿___
A. 1ml
B. 2ml
C. 3ml
D. 4ml
E. 5ml
【单选题】
原发性肾小球疾病的临床分型不包括下列哪项___
A. 急性肾小球肾炎
B. 慢性肾小球肾炎
C. 隐匿型肾小球肾炎
D. 新月体肾小球肾炎
E. 急进性肾小球肾炎
【单选题】
动静脉内瘘是以下哪一种血液透析通路___
A. 临时性
B. 永久性
C. 非创伤性
D. 快速性
E. 直接性
【单选题】
局灶性节段性肾小球肾炎和局灶性硬化性肾小球肾炎均属于___
A. 局灶性节段性肾小球病变
B. 坏死性肾小球肾炎
C. 增生性肾炎
D. 硬化性肾炎
E. 弥漫性肾小球肾炎
【单选题】
肾病综合征低蛋白血症可导致多腔积液,下列哪项不常见___
A. 胸腔积液
B. 腹腔积液
C. 心包积液
D. 脑积液
E. 左侧胸水
【单选题】
肾病综合征患者饮食指导错误的是___
A. 正常蛋白饮食
B. 高蛋白饮食
C. 低胆固醇饮食
D. 低盐饮食
E. 低磷饮食
【单选题】
下列哪项并发症是造成肾病综合征治疗效果不佳和复发的原因___
A. 反复感染
B. 急性肾衰竭
C. 血栓.栓塞
D. 动脉硬化
E. 急性心力衰竭
【单选题】
下列慢性肾炎健康教育内容中描述,错误的是___
A. 避免劳累,受凉
B. 高蛋白饮食.高维生素.低磷饮食
C. 按时测量血压,调整降压药量
D. 禁用肾毒性药物
E. 育龄妇女注意避孕
【单选题】
慢性肾炎肾病型的水肿发生机制是由于___
A. 继发性醛固酮增多
B. 肾小管重吸收功能增强
C. 肾小球滤过率降低
D. 血管升压素分泌增多
E. 大量蛋白尿导致低蛋白血症
【单选题】
慢性肾小球肾炎氮质血症的患者应限制蛋白质的摄入,一般要求为___
A. 0.4~0.6g/(kg.d)
B. 0.3~0.6g/(kg.d)
C. 0.2~0.4g/(kg.d)
D. 0.5~0.8g/(kg.d)
E. 其余选项都可以
【单选题】
肾性高血压是引起哪种高血压的常见原因___
A. 原发性
B. 继发性
C. 神经性
D. 遗传性
E. 混合性
【单选题】
下列哪项不引起血尿___
A. 泌尿系统结石
B. 泌尿系统结核
C. 泌尿系统肿瘤
D. 肾病综合征
E. 急性肾炎
【单选题】
关于慢性肾炎的描述,下列哪项不正确___
A. 本病以青.中年男性居多
B. 绝大多数并非急性肾炎发展而致
C. 常见病理类型是系膜增生性肾炎
D. 常见病理类型是轻微病变性肾小球肾炎
E. 肾活检病理检查对确诊有重要意义
【单选题】
急进性肾小球肾炎的病理特点是___
A. 肾小球上皮细胞足突消失
B. 内皮细胞增生
C. 形成新月体
D. 局灶硬化
E. 系膜增生
【单选题】
治疗急性肾炎患者降压应首选___
A. 利尿剂
B. β受体阻滞剂
C. 钙离子拮抗剂
D. 血管扩张剂
E. 血管紧张素转化酶抑制剂
【单选题】
急性肾小球肾炎急性期,一般每日进盐量应低于多少___
A. 1g
B. 2g
C. 3g
D. 4g
E. 5g
推荐试题
【单选题】
The___ is the primary device for entering information into the computer
A. :disk
B. :printer
C. :keyboard
D. :memory
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames