相关试题
【单选题】
能杀死一切微生物的化学消毒剂是___
A. 二溴海因
B. 碘附
C. 氯己定
D. 戊二醛
E. 苯扎溴铵
【单选题】
下列属医护人员手上常住细菌的是___
A. 金黄色葡萄球菌
B. 乙型溶血性链球菌
C. 表皮葡萄球菌
D. 支原体
E. 沙门氏菌
【单选题】
下列属于封闭式提问的问题是___
A. 经过这两天的治疗,您今天感觉好多了吧?
B. 您是河北人吧?
C. 悠为什么不愿意选择手术治疗呢
D. 您是在哪里做的检查?检查结果如何
E. 您愿意和我谈谈自己手术后的感受吗?
【单选题】
规划是指___
A. 时间一般在5年以上,由中层管理者制订
B. 时间一般在5年以上,由高层管理者制订
C. 时间一般在10年以上,由高层管理者制订
D. 时间一般在1~5年,由中层管理者制订
E. 时间一般在1~5年,由高层管理者制订
【单选题】
患者,男,63岁,糖尿病、高血脂,护士对其进行戒烟及减肥训练,这些健康教育的内容属于___
A. 一般卫生知识宣教
B. 心理卫生教育
C. 健康相关行为干预
D. 疾病防治知识宣教
E. 自我保健知识宣教
【单选题】
用0.5%氯己定酒精溶液进行手消毒时,可保持手的清洁在2小时左右,这种作用称为___
A. 拮抗作用
B. 后效作用
C. 吸附作用
D. 分解作用
E. 增强作用
【单选题】
某社区医院口腔科准备在9月20日"全国爱牙日"这天进行一次关于正确刷牙方法的普及活动,以使所在社区居民了解并掌握科学刷牙方法,养成良好的刷牙习惯。在此次健康传播活动中,社区医院的医护人员是___
A. 传播者
B. 受传者
C. 既是传播者又是受传者
D. 信息的载体
E. 信息本身
【单选题】
青霉素类药物使用方法错误的是___
A. 可采用静脉滴注法
B. 静脉滴注时采用间歇给药的方法
C. 每次药物溶于100ml生理盐水中
D. 每次给药时间为1~2小时
E. 现用现配
【单选题】
主持小组讨论时播放短小录像片常用于___
A. 讨论开场
B. 引起兴趣
C. 打破僵局
D. 建立融洽关系
E. 引出讨论问题
【单选题】
关于实施教育计划的注意事项,以下表述错误的是___
A. 注重信息的双向传播
B. 适当重复重点内容
C. 采取多种教育方法和方式
D. 注重教育者的态度
E. 教育场所可依医务人员的方便而定
【单选题】
下列关于流行性出血热的叙述错误的是___
A. 主要传染源是患病的家畜
B. 可通过蚊子叮咬传播
C. 可经呼吸道传播
D. 可经消化道传播
E. 伤口接触感染动物的排泄物后也可感染
【单选题】
护士长在管理过程中,遇到问题时经常发动护士们共同讨论,共同商量,集思广益,然后决策,并要求病房护士每个人各尽所能,各施其长,分工合作,这种领导作风属于___
A. 专权型领导作风
B. 命令型领导作风
C. 权威型领导作风
D. 民主参与型领导作风
E. 自由放任型领导作风
【单选题】
下列叙述正确的是___
A. 为了防止术后感染,术前应给患者使用广谱抗生素,力图达到"绝对无菌"
B. 去污染是指人为地将外来致病菌部分或全部去除的方法
C. 排列
D. 选择性去污染治疗对使用大量免疫抑制剂患者疗效不佳
E. 全部去污染的术后感染率低于选择去污染
【单选题】
属于时间管理基本程序的是___
A. 记录
B. 评价
C. 排列
D. 分配
E. 预算
【单选题】
王某,男,78岁,患大叶性肺炎,高热昏迷10天,10天内给予大量广谱抗生素抗感染治疗。近日护士做口腔护理时发现其口腔黏膜破溃,创面上附着白色膜状物。该患者最可能发生___
A. 原位菌群一度失调
B. 原位菌群二度失调
C. 移位菌群失调
D. 菌群交替症
E. 无菌群失调
【单选题】
以下属于医院感染的是___
A. 患者皮肤黏膜开放性伤口有细菌定植,但尚未有炎症表现
B. 新生儿在院内经产道感染链球菌
C. 新生儿在院内经胎盘感染单纯疱疹
D. 新生儿在分娩过程中误吸未被污染的羊水形成肺炎
E. 术后三日内患者体温升高,三日后恢复正常
【单选题】
以下属于医院感染的是___
A. 患者皮肤黏膜开放性伤口有细菌定植,但尚未有炎症表现
B. 新生儿在院内经产道感染链球菌
C. 新生儿在院内经胎盘感染单纯疱疹
D. 新生儿在分娩过程中误吸未被污染的羊水形成肺炎
E. 术后三日内患者体温升高,三日后恢复正常
【单选题】
对于"大众传播"的描述,正确的是___
A. 是最基本的传播形式
B. 是建立人际关系的基础
C. 是非组织群体的传播活动
D. 以职业性传播机构为传播者
E. 是组织以外群体的传播活动
【单选题】
对传播的定义描述正确的是___
A. 传播是一种个人化传递信息的行为
B. 是个人之间交换传递、新闻、事实、意见的信息过程
C. 是集体之间交换传递、新闻、事实、意见的信息过程
D. 是个人与集体之间交换传递、新闻、事实、意见的信息过程
E. 是个人之间、集体之间以及个人与集体之间交换、传递新闻、事实、意见的信息过程
【单选题】
属于控制基本过程的关键是___
A. 制定预算
B. 衡量绩效
C. 纠正偏差
D. 建立标准
E. 预测过程
【单选题】
护理管理的对象不包括___
A. 人
B. 财
C. 法律
D. 时间
E. 信息
【单选题】
人类行为的主要特征是___
A. 随意的
B. 独立的
C. 有目的性的
D. 先天遗传的
E. 不可改变的
【单选题】
使用紫外线灯管进行消毒时,下列叙述错误的是___
A. 新灯管的照射强度不得低于90~100uW/cm
B. 使用中灯管照射强度不得低于90uWcm
C. 照射强度监测应每6个月一次
D. 经消毒后的空气中自然菌应减少90%以上
E. 经消毒后的物品上自然菌应减少90%以上
【单选题】
当计划为下属提供了明确的工作目标及实现目标的最佳途径,表明此计划有利于___
A. 减少工作中的失误
B. 明确工作目标
C. 提高经济效益
D. 控制工作
E. 人员的管理
【单选题】
某医院外科护士长张洋为本科学历,掌握丰富的医学护理基础知识和技术专长,护士们遇到专业上的问题都愿意请教张护士长,护士长都能给他们满意的解答。因此护士们都很信任护士长,愿意接受护士长的领导做好病房的护理工作。张洋护士长对护士的这种影响力起作用的因素是___
A. 职位因素
B. 才能因素
C. 知识因素
D. 资历因素
E. 品格因素
【单选题】
下列属于医院感染的是___
A. 新生儿出生后48小时内出现的水痘
B. 非生物因子刺激产生的炎症表现
C. 创伤产生的炎症表现
D. 原有的慢性感染在医院内急性发作
E. 自入院时起超过平均潜伏期后发生的感染
【单选题】
根据健康教育评价的影响因素的分类方法,评定错误属于___
A. 选择因素
B. 历史因素
C. 观察因素
D. 回归因素
E. 失访因素
【单选题】
个人接受外界信息后,在头脑中进行信息加工处理的过程可称为___
A. 人际传播
B. 群体传播
C. 大众传播
D. 组织传播
E. 自我传播
【单选题】
S-O-R行为表示式中的“S”指___
A. see看见
B. seeing看见
C. sense感觉
D. stimulus刺激
E. stimtIlate刺激
【单选题】
中国古代充分体现战略管理思想的书是___
A. 《论语》
B. 《管子》
C. 《诸子百家》
D. 《史记》
E. 《孙子兵法》
【单选题】
某私营医院聘任了大量兼职护士,护士在排班上有很大的自主性,可自己选择是否上夜班,这种排班方式称为___
A. 集权式排班
B. 分权式排班
C. 自我排班
D. 自由排班
E. 民主排班
【单选题】
对感染危险指数高的患者,应采取___
A. 传染性隔离
B. 保护性隔离
C. 全部去污染
D. 使用广谱抗生素
E. 降低正常菌群抗定植能力
【单选题】
欲配制1%过氧乙酸1000ml,需要20%的过氧乙酸原液和灭菌蒸馏水的ml数分别为___
A. 50ml,950m1
B. 100m1,900ml
C. 150ml,850ml
D. 200ml,800ml
E. 250ml,750ml
【单选题】
使用化学灭菌或消毒时,错误的是___
A. 根据需要选择合适的消毒剂
B. 了解化学消毒剂的性能和作用
C. 配制时注意有效浓度
D. 按规定定期监测
E. 更换灭菌剂时对用于浸泡灭菌物品的容器进行消毒
【单选题】
无术前预防性应用抗生素指征的手术是___
A. 胃切除术
B. 小肠切除术
C. 胆囊切除术
D. 膝软骨摘除术
E. 子宫切除术
【单选题】
管理职能循环中最后的一环是___
A. 计划工作
B. 控制工作
C. 领导工作
D. 组织工作
E. 协调工作
【单选题】
判断是否属于医院感染的主要依据是___
A. 疾病的临床表现
B. 病程的长短
C. 发病的缓急
D. 疾病的潜伏期
E. 抗生素的使用期限
【单选题】
根据健康信念模式,人们要采取某种促进健康行为的时候,对自身采取某种行为能力的自信程度称为___
A. 自我效能
B. 自我觉察
C. 自觉行为
D. 自我完善
E. 自我否定
【单选题】
下列哪项不属于健康教育诊断中对社会环境的诊断___
A. 经济指标
B. 文化指标
C. 卫生服务指标
D. 社区资源
E. 目标人群生活环境的物理状况
【单选题】
护理质量控制中的"压疮发生率"属于___
A. 同期控制的统计指标
B. 反馈控制的统计指标
C. 定期控制的统计指标
D. 前馈控制的统计指标
E. 日常控制的统计指标
推荐试题
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode