【单选题】
急性肺水肿患者吸氧时在湿化瓶中加乙醇(酒精),其目的是___
A. 增强痰液的稀释作用
B. 扩张肺泡毛细血管床
C. 抑制肺泡内细菌生长
D. 降低肺泡表面张力
E. 兴奋呼吸中枢
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
患者,男性,50岁,突感胸骨后压榨性疼痛,伴出汗.恶心,含服硝酸甘油休息后仍不能缓解。该患者最可能的诊断是___
A. 高血压性心脏病
B. 心绞痛
C. 心肌炎
D. 急性心肌梗死
E. 充血性心力衰竭
【单选题】
导致急性心肌梗死患者24小时内死亡的最常见原因是___
A. 心律失常
B. 心源性休克
C. 心脏破裂
D. 脑部栓塞
E. 心力衰竭
【单选题】
决定心肌梗死患者预后的最主要因素为___
A. 心律失常
B. 心功能
C. 冠心病危险因素控制的程度
D. 年龄及病程
E. 心肌坏死的数量
【单选题】
下列哪项情况适合于尿激酶溶血栓治疗___
A. 急性心肌梗死发生后4~6小时
B. AMI伴高血压病,血压为26B.6/18B.8kPa(220/140mmHg)
C. 不稳定型心绞痛反复发作
D. AMI患者合并甲型血友病
E. AMI合并糖尿病视网膜病变
【单选题】
一位急性前壁心肌梗死患者突然发生心室颤动,护士首先采取的措施是___
A. 立即准备临时起博器
B. 立即准备静脉注射利多卡因
C. 立即准备除颤器选择同步电复律
D. 立即准备除颤器选择非同步电复律
E. 立即准备除颤器
【单选题】
急性心肌梗死最常发生在___
A. 用力排便
B. 精神紧张
C. 安静或睡眠时
D. 重体力活动时
E. 大量脂肪餐后
【单选题】
高血压患者的饮食原则中,应___
A. 低盐
B. 低脂
C. 低糖
D. 高维生素
E. 高热量
【单选题】
关于慢性心功能不全的护理措施,下列不正确的是___
A. 低盐.易消化清淡饮食
B. 对严重心功能不全患者采用半坐卧位
C. 一般采用低流量间断给氧
D. 对心功能Ⅲ级患者,应限制日常活动
E. 观察心律和心率
【单选题】
下列心律失常中哪一项最严重___
A. 心室颤动
B. 室上性心动过速
C. 偶发室性期前收缩
D. 窦性心动过速
E. 心房颤动
【单选题】
一位长期接受治疗的心力衰竭患者,再次出现乏力.腹胀.心慌等症状,心率120次/分,心电图见明显U波,正确的处理措施是___
A. 加大洋地黄用量
B. 立即停用洋地黄
C. 静脉滴注碳酸氢钠
D. 补充氯化钾
E. 肌注硫酸镁
【单选题】
患者,男性,70岁,慢性肺源性心脏病晚期,经吸氧.抗感染.利尿及洋地黄类药物治疗后,呼吸困难减轻,但出现昼睡夜醒,恍惚多言。您认为最可能的是___
A. 肺性脑病
B. 洋地黄中毒
C. 并发神经官能症
D. 痰液堵塞
E. 并发脑卒中(脑血管意外)
【单选题】
监护心脏患者时,突见患者突意识全无,荧光屏上突然出现完全不规则的波浪曲线,而看不到QRS波与T波,对此作以下判断中哪一项是不对的___
A. 患者发生室颤,为最严重的心律失常
B. 立即静脉推注利多卡因60mg
C. 可施行电极除颤
D. 应立即作胸外心脏按压和口对口人工呼吸
E. 患者发生猝死,无需再做抢救
【单选题】
经皮腔内冠状动脉成形术(PTCA)后,拔除血管导管鞘的正确护理措施是___
A. 至少保留24~48小时后方可拔除
B. 拔除前应停用肝素至少8~12小时
C. 拔除后须局部压迫止血15~20分钟
D. 止血后扎压力绷带,沙袋压迫1小时
E. 拔除后平卧2小时方可下地活动
【单选题】
一般心绞痛的心电图必能见到___
A. 深而宽的Q波
B. S-T段持续性抬高
C. T波增宽
D. S-T段压低
E. T波高耸
【单选题】
胸外按压的部位是___
A. 心前区
B. 心尖区
C. 胸骨柄
D. 胸骨角与锁骨中线交汇处的心前区
E. 剑突上方二横指的胸骨正中部位
【单选题】
某风湿性心脏病患者,心功能IV级,24小时尿量380ml,对该患者的治疗护理中应慎重的措施是___
A. 半卧位休息
B. 吸氧
C. 应用强心剂
D. 应用安体舒通
E. 应用血管扩张剂
【单选题】
某女性为风湿性心脏病心力衰竭患者,长期接受低盐饮食及利尿剂.洋地黄等药物治疗,心功能恢复满意。近日发现有疲乏软弱.淡漠迟钝,尿少,偶有肌痉挛。体格检查:体温36.8℃,脉率104次/分,呼吸20次/分,血压11/7.5kPa(80/65mmHg),肺部无啰音,下肢无水肿。您考虑该患者的情况可能是___
A. 洋地黄中毒
B. 心力衰竭加重
C. 低钾血症
D. 低钠血症
E. 高钾血症
【单选题】
室性心律失常首选下列哪种药物___
A. 西地兰
B. 奎尼丁
C. 地高辛
D. 利多卡因
E. 阿托品
【单选题】
冠心病猝死的最主要原因是___
A. 严重心律失常
B. 心脏破裂
C. 肺梗死
D. 脑梗死
【单选题】
目前原发性高血压急症的首选降压药多为___
A. 硝普钠
B. 硝酸甘油
C. 卡托普利
D. 阿替洛尔
E. 利舍平(利血平)
【单选题】
有一心脏病患者,休息时无呼吸困难及水肿,日常生活如扫地.洗衣时感心悸.气促,休息片刻后好转,对该患者的活动应如何限定___
A. 日常生活照常
B. 起床稍微活动,增加睡眠时间
C. 卧床休息,限制活动量
D. 绝对卧床休息
E. 坐位或半卧位,日常活动均需他人照顾
【单选题】
夜班护士接班后巡视病房,发现一左心衰竭患者的心力衰竭情况尚未完全控制,为预防阵发性夜间呼吸困难的发生您应采取的最重要护理措施是___
A. 保持病房安适
B. 给予地西泮一片
C. 继续氧气吸入
D. 置其半卧位睡眠
E. 投给小剂量地西泮
【单选题】
典型心绞痛的疼痛性质为___
A. 针刺样疼痛
B. 持久的剧痛
C. 牵涉痛
D. 钝痛
E. 压迫.发闷.紧缩性或窒息感
【单选题】
患者,女性,50岁,咳嗽,咳血性泡沫痰伴极度呼吸困难,大汗淋漓,心率120次/分,并可闻及舒张期奔马律,两肺底广泛湿啰音,应诊断为___
A. 肺气肿
B. 急性右心衰竭
C. 急性左心衰竭
D. 肺梗死
E. 急性心肌炎
【单选题】
急性心肌梗死发生后24小时内应尽量避免使用洋地黄类的药物,最主要原因是防止___
A. 洋地黄中毒
B. 脏器动脉栓塞
C. 室性心律失常
D. 房室传导阻滞
E. 心室膨胀瘤
【单选题】
患者,男性,56岁,突起呼吸困难,咳粉红色泡沫痰,测其血压为200/105mmHg,应选何药___
A. 硝普钠
B. 异丙肾上腺素
C. 肾上腺素
D. 尼可刹米
E. 利血平
【单选题】
患者,女性,72岁,突起胸闷.气促.烦躁不安。查体示:血压180/100mmHg,呼吸30次/分,脉搏130次/分,肺底部直至布满全肺可闻及湿啰音,心律齐。患者最有可能发生了___
A. 左心衰竭
B. 右心衰竭
C. 全心衰竭
D. 呼吸衰竭
E. 高血压脑病
【单选题】
某休克患者进行扩容疗法快速输液时,监测CVP为15cmH2O,血压80/60mmHg,应采取的措施是___
A. 大量输液,加快速度
B. 控制速度,减慢愉液
C. 减慢输液,加用强心剂
D. 暂停输液
E. 用升压药
【单选题】
患者,女性,48岁,被诊断为前间壁心肌梗死,其绝对卧床3天来未解大便。在下列促进排便的护理措施中您选择___
A. 加强被动活动增进肠蠕动
B. 做腹部加压按摩促进排便
C. 硫酸镁120g口服导泄
D. 开塞露肛内注入
E. 温盐水高位灌肠
【单选题】
严重左心功能不全时,患者常取___
A. 侧卧位
B. 端坐位
C. 仰卧位
D. 头高脚低位
E. 头低脚高位
【单选题】
体力活动明显受限,平时一般活动可引起呼吸困难的为___
A. 心功能Ⅰ级
B. 心功能Ⅱ级
C. 心功能Ⅲ级
D. 心功能Ⅳ级
E. 心功能代偿期
【单选题】
患者出现右心功能不全最早出现的体征是___
A. 肝颈静脉返流征呈阳性
B. 腹水
C. 胸水
D. 双下肢浮肿
E. 发绀
【单选题】
心功能不全的呼吸困难患者,夜间睡眠应采取___
A. 左侧卧位
B.
C. 仰卧位
D. 半卧位或坐位
E. 侧卧位或仰卧
【单选题】
去病房实施静脉输液操作时,见病床上一位长期卧床的男性54岁慢性充血性心力衰竭患者,突然呼叫剧烈疼痛,即作护理体检,发现其呼吸急促,面色发绀,时有咳嗽,咳出鲜红色血痰。体温36.8℃,脉搏120次/分。你考虑患者可能时发生___
A. 急性左心衰竭
B. 急性肺水肿
C. 急性肺部感染
D. 心肌梗死
E. 肺栓塞
【单选题】
某急性广泛前壁心肌梗死患者,发病6小时之内应首选下列哪项治疗___
A. 口服疏甲丙脯酸
B. 口服美托洛尔
C. 静脉注射西地兰
D. 尿激酶溶栓治疗
E. 静脉滴注低分子右旋糖苷
【单选题】
左心功能不全失代偿的早期依据是___
A. 心动过速
B. 心脏扩大
C. 心肌肥厚
D. 夜尿增多
E. 劳力性呼吸困难
【单选题】
急性心肌梗死患者若无并发症,卧床休息多少时间___
A. 12小时
B. 24小时
C. 48小时
D. 72小时
E. 1周
【单选题】
奇脉见于下列哪种疾病___
A. 肺源性心脏病
B. 心包积液
C. 冠心病
D. 缩窄性心包炎
E. 心肌病
【单选题】
某急性心肌梗死患者突然出现心尖区收缩期杂音,无震颤,心力衰竭明显加重。最可能的原因是___
A. 左室扩大,引起二尖辫关闭不全
B. 心率增快
C. 合并亚急性细菌性心内膜炎
D. 室间隔穿孔
E. 乳头肌功能失调或断裂
【单选题】
某急性心肌梗死的患者两小时后心电图随访Ⅱ.Ⅲ.avF导联出现病理性Q波,提示心肌梗死的部位可能是___
A. 后壁
B. 前壁
C. 下壁
D. 右侧壁
E. 左侧壁
推荐试题
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack