相关试题
【单选题】
9.相对密度检查,其检查温度除另有规定外,是指
A. 15℃
B. 20℃
C. 25℃
D. 30℃
【单选题】
10.比重瓶法测定相对密度,操作顺序为
A. 空比重瓶重→(比重瓶+供试品)称重→(比重瓶+水)称重
B. (比重瓶+水)称重→(比重瓶+供试品)称重→空比重瓶重
C. (比重瓶+供试品)称重→(比重瓶+水)称重→空比重瓶重
D. 空比重瓶重→(比重瓶+水)称重→(比重瓶+供试品)称重
【单选题】
11.比重瓶法测定药品相对密度采用新煮沸数分钟并冷却的水,其目的是
A. 除去少量的空气
B. 保证水的纯净程度
C. 保证水的密度为1
D. 使水的质量恒定
【单选题】
12.酸度计常用的参比电极是
A. 饱和甘汞电极
B. 银-氯化银电极
C. 玻璃电极
D. 金属-金属难溶盐电极
【单选题】
13.酸度计测定pH值时,校正用两种标准缓冲液应相差( )个pH单位
【单选题】
14.《中国药典》规定甲醇量检查限量为每1L供试品中含甲醇量不得超过( )(ml/ml)
A. 0.10%
B. 0.01%
C. 0.05%
D. 0.02%
【单选题】
15.气相色谱法测定乙醇量,校正因子的相对标准偏差不得大于
A. 1.5%
B. 1.0%
C. 2.0%
D. 2.5%
【单选题】
1.薄层扫描最常用的定量方法是
A. 内标法
B. 外标法
C. 追加法
D. 回归曲线定量法
【单选题】
2.薄层扫描定量时均采用随行标准法,即标准溶液与供试品溶液交叉点在同一块薄层板上,这是为了
A. 防止边缘效应
B. 消除点样量不准的影响
C. 克服薄层板厚薄不均匀而带来的影响
D. 消除展开剂挥发的影响
【单选题】
3.GC法和HPLC法用于中药制剂的含量测定时,定量的参数是
A. 峰面积
B. 保留时间
C. 分离度
D. 理论板数
【单选题】
4.GC法主要适用于( )的分析
A. 含挥发油成分及其它挥发性成分的制剂
B. 含酸类成分的制剂
C. 含苷类成分的制剂
D. 含生物碱类成分的制剂
【单选题】
5.GC法应用最广泛的检测器是
A. TCD
B. FID
C. NPD
D. ECD
【单选题】
6.麝香中麝香酮的定量方法最常用的是
A. 紫外-可见分光光度法
B. 薄层扫描法
C. 高效液相色谱法
D. 气相色谱法
【单选题】
7.反相HPLC法主要适用于
A. 脂溶性成分
B. 水溶性成分
C. 酸性成分
D. 碱性成分
【单选题】
8.中药制剂中采用HPLC法进行含量测定,最常用的色谱柱是
A. C18柱
B. C8柱
C. 氨基柱
D. 氰基柱
【单选题】
9.中药制剂分析中下列哪些成分的含量最适合采用HPLC法测定
A. 冰片
B. 炽灼残渣
C. 重金属元素
D. 黄芩苷、葛根素等单体成分
【单选题】
10.乙法测定挥发油时,挥发油测定管中加入的试剂为
A. 乙醚
B. 二甲苯
C. 甲苯
D. 石油醚
【单选题】
12.总生物碱测定多采用
A. 络合滴定法
B. 酸碱滴定法
C. 碘量法
D. 沉淀滴定法
【单选题】
13.总氮测定法中采用( )吸收氨蒸气
A. 稀盐酸
B. 稀硫酸
C. 硼酸
D. 醋酸
【单选题】
14.冰片的含量测定,常采用( )方法
A. UV-Vis
B. HPLC
C. GC
D. TLC
【单选题】
15.挥发性醚浸出物的测定采用( )作为提取溶剂
【单选题】
1.药物的鉴别是
A. 判断药物的纯度
B. 判断已知药物的真伪
C. 判断药物的均一性
D. 判断药物的有效性
【单选题】
2.检查药物品中的氯化物杂质,所用的显色试剂是
A. 硝酸银
B. 硫化氢
C. 硫氰酸铵
D. 氯化钡
【单选题】
3.对于药物中的氯化物杂质检查,溶液应呈
【单选题】
4.下列不属于一般杂质的是
A. 氯化物
B. 重金属
C. 2-甲基-5-硝基咪唑
D. 硫酸盐
【单选题】
5.含量均匀度系指单剂量的固体、半固体和非均相液体制剂的每片(个)含量符合( )的程度
A. 标示量
B. 平均含量
C. 平均片(丸)重
D. 含量均匀度
【单选题】
6.取乙酰水杨酸1.5040g,准确加入氢氧化钠滴定液(0.5mol/L)50.0ml,水浴上煮沸15分钟,放冷后以酚酞为指示剂,用硫酸滴定液(0.25mol/L,F=1.004)滴定,并将滴定结果用空白实验校正,每1ml氢氧化钠滴定液(0.5mol/L)相当于45.04mg乙酰水杨酸。样品消耗硫酸滴定液(0.25mol/L,F=1.004)17.05 ml,空白消耗49.95ml,本品含量为( )
A. 49.46%
B. 51.11%
C. 95.9%
D. 98.9%
【单选题】
7.以下药物属于生物制品的是
A. 阿司匹林片
B. 人用狂犬疫苗
C. 牛黄解毒丸
D. 地西泮
【单选题】
8.每1ml规定浓度的滴定液所相当的被测药物的质量,被称为
A. 摩尔当量
B. 摩尔质量
C. 摩尔浓度
D. 滴定度
【单选题】
9.不属于溶出度测定方法的是
A. 转筒法
B. 桨碟法
C. 吊篮法
D. 篮法
【单选题】
10.转篮法检查溶出度时,取样位置应在( )处
A. 转篮或至液面的中点,距溶出杯内壁25mm处
B. 转篮或至液面的中点,距溶出杯内壁10mm处
C. 桨叶顶端至液面的中点,距溶出杯内壁6mm处
D. 桨叶顶端至液面的中点,距溶出杯内壁10mm处
【单选题】
证券是用来证明___有权取得相应权益的凭证。
A. 证券持有人
B. 证券承销商
C. 证券发行人
D. 证券托管人
【单选题】
在公司证券中,通常将银行及非银行金融机构发行的证券称为___。
A. 金融证券
B. 银行本票
C. 基金证券
D. 股票
【单选题】
将有价证券分为上市证券与非上市证券的依据是___。
A. 是否在证券交易所挂牌交易
B. 证券发行主体的不同
C. 证券所代表的权利性质
D. 募集方式
【单选题】
新中国证券交易市场的建立始于___。
A. 1986年
B. 1988年
C. 1990年
D. 1992年
【单选题】
股票实质上代表了股东对股份公司的___。
【单选题】
发行人通过中介机构向不特定的社会公众投资者公开发行的证券是___。
A. 商品证券
B. 公募证券
C. 私募证券
D. 货币证券
【单选题】
证券持有者在不造成资金损失的前提下,可以用证券换取现金。这表明证券具有___。
A. 期限性
B. 流动性
C. 安全性
D. 收益性
【单选题】
___是指证券是权利的一种物化的外在形式,它是权利的载体,权利是已经存在的。
A. 资本证券
B. 证权证券
C. 要式证券
D. 有价证券
推荐试题
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别
【单选题】
5.熔断器的作用是___。
A. 短路保护
B. 过载保护
C. 失压保护
D. 零压保护
【单选题】
6.热继电器的作用是___。
A. 短路保护
B. 过载保护
C. 失压保护
D. 零压保护
【单选题】
7.交流接触器的作用是可以___接通和断开负载。
【单选题】
8.三相异步电动机的启停控制线路由电源开关、熔断器、___、热继电器、按钮等组成。
A. 时间继电器
B. 速度继电器
C. 交流接触器
D. 漏电保护器