【单选题】
婴儿饮食中,三大营养素(蛋白质:脂肪:碳水化合物)所需热量的百分比正确的是___
A. 15:50:35
B. 15:35:50
C. 25:40:35
D. 25:35:40
E. 25:25:50
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
刺激性呛咳或带金属音的咳嗽应首先考虑___
A. 上呼吸道感染
B. 肺部病变早期
C. 左心功能不全
D. 支气管扩张
E. 支气管肺癌
【单选题】
现代医学模式为___
A. 生物一社会医学模式
B. 生物一心理医学模式
C. 生物一生理医学模式
D. 生物一生理一社会医学模式
E. 生物一心理一社会医学模式
【单选题】
儿科护理工作的中心是___
A. 儿童及其家庭
B. 病儿
C. 疾病
D. 病儿及其家属
E. 儿童预防保健
【单选题】
关于子宫肌瘤的正确说法是___
A. 是妇科最常见的恶性肿瘤
B. 多发生于绝经期妇女
C. 肌壁间肌瘤少见
D. 黏膜下肌瘤多见
E. 黏膜下肌瘤易发生月经过多
【单选题】
自我照顾模式是由谁提出的___
A. 纽曼
B. 佩普劳
C. 汉斯席尔
D. 马斯洛
E. 奥瑞姆
【单选题】
预防阵发性夜间呼吸困难发作,最主要的护理措施是___
A. 保持安静,减少声、光的刺激
B. 夜间持续吸氧
C. 夜间睡眠应保持半卧位
D. 睡前给少量镇静剂
E. 注意保暖
【单选题】
新生儿颅内出血的诊断依据应除外___
A. 缺氧史
B. 尖叫
C. 产伤史
D. 嗜睡、拒乳
E. 感染病灶
【单选题】
斜疝修补术后,预防阴囊血肿的措施是___
A. 平卧位,膝下垫软枕
B. 预防便秘、尿潴留
C. 切口处用沙袋压迫并托起阴囊
D. 咳嗽时用手按压伤口
E. 不宜过早下床活动
【单选题】
小儿受结核菌感染致PPD试验阳性的时间为___
A. 2~4周
B. 4~8周
C. 8~10周
D. 10~12周
E. 12~16周
【单选题】
慢性胃炎临床表现一般不包括___
A. 食欲不振
B. 餐后腹胀
C. 恶心、呕吐
D. 反酸、嗳气
E. 规律性上腹痛
【单选题】
有关新生儿窒息。下述哪项正确___
A. 胎儿只有心跳无呼吸称新生儿窒息
B. 产时使用麻醉剂不可能造成新生儿窒息
C. 青紫窒息为重度窒息
D. 苍白窒息为轻度窒息
E. 苍白窒息时,全身皮肤苍白,仅口唇呈暗紫色
【单选题】
骑跨伤易引起尿道损伤的部位是___
A. 尿道口
B. 尿道球部
C. 尿道膜部
D. 前列腺部
E. 尿道中段
【单选题】
为病人保暧解痉最简便的方法是___
A. 热水袋
B. 热坐浴
C. 热湿敷
D. 温水浴
E. 红外线照射
【单选题】
婴儿手足搐搦症主要死亡原因是___
A. 无热惊厥
B. 心力衰竭
C. 喉痉挛
D. 呼吸衰竭
E. 手足搐搦
【单选题】
风湿性心脏病心房颤动病人突然抽搐、偏瘫。首先考虑___
A. 心力衰竭加重
B. 洋地黄中毒
C. 低钾血症
D. 脑栓塞
E. 蛛网膜下腔出血
【单选题】
外敷疖肿用___
A. 0.02%呋喃西林溶液
B. 0.1%雷佛奴尔溶液
C. 氧化锌软膏
D. 10%鱼石脂软膏
E. 0.75%碘伏
【单选题】
对一位需住院的心力衰竭病人,住院处的护理人员首先应___
A. 卫生处置
B. 介绍医院的规章制度
C. 立即护送病人人病区
D. 通知医生作术前准备
E. 了解病人有何护理问题
【单选题】
一个肾病综合征患儿,有胸腔积液,全身水肿较重,护理该患儿时不应采用的方法是___
A. 避免皮肤擦伤及受压
B. 保持皮肤清洁干燥
C. 阴囊部用吊带托起
D. 让患儿卧于橡胶单上以利清理床单位
E. 静脉穿刺时选好血管,争取一次穿刺成功
【单选题】
新生儿败血症出生后感染的主要途径是___
A. 口腔黏膜
B. 呼吸道
C. 脐部和皮肤
D. 泌尿道
E. 消化道
【单选题】
阑尾周围脓肿消退后作阑尾切除的最佳时间是___
A. 立即手术切除
B. 两周后手术切除
C. 3个月后手术切除
D. 数年后手术切除
E. 无须手术切除
【单选题】
糖尿病酮症酸中毒患者经注射胰岛素及静滴生理盐水后。血糖降低、失水纠正、尿量增多。此时最应注意防止___
A. 低钠血症
B. 低钾血症
C. 低钙血症
D. 低血糖
E. 低血压
【单选题】
硬膜外麻醉最严重的并发症是___
A. 血压下降
B. 血管扩张
C. 尿潴留
D. 全脊髓麻醉
E. 呼吸变慢
【单选题】
新生儿青紫窒息的临床表现,错误的是___
A. 皮肤苍白,口唇青紫
B. 呼吸浅或不规则
C. 心率80-120次/分
D. 肌张力好
E. 对外界刺激有反应
【单选题】
肾结核患者在手术前进行正规抗结核药物治疗。其中全肾切除术前至少抗结核药物治疗时间为___
A. 5周
B. 3~6个月
C. 2周
D. 3~6周
E. 10周
【单选题】
肠套叠最易发生的套叠方式是___
A. 回肠套入盲肠、结肠
B. 盲肠套入结肠
C. 小肠套入小肠
D. 结肠套入结肠
E. 单纯回肠套人结肠
【单选题】
全身麻醉非消化道手术进食时间为___
A. 术后6h
B. 术后8h
C. 术后12h
D. 术后24h
E. 术后4h
【单选题】
体重(kg)=年龄×2+8,此公式适用于___
A. 1周岁时
B. 2~12岁
C. 13~15岁
D. 16~18岁
E. 18岁以上
【单选题】
急性乳房炎的主要病因是___
A. 乳头破损
B. 乳头皲裂
C. 乳管堵塞
D. 乳头发育不良
E. 乳汁淤积
【单选题】
重症肺炎因二氧化碳潴留导致酸碱平衡紊乱,可发生___
A. 代谢性酸中毒
B. 呼吸性酸中毒
C. 代谢性碱中毒
D. 呼吸性碱中毒
E. 混合性酸中毒
【单选题】
关于小儿各期体重的指标。下列陈述哪项是错误的___
A. 正常产新生儿出生时体重约为3kg
B. 出生前半年平均每月增加0.7kg;后半年平均每月增加0.4kg
C. 1周岁时体重平均约为出生体重的2倍
D. 2周岁时体重平均约为出生体重的4倍
E. 2~12岁期间的体重推算公式是:年龄×2+R
【单选题】
对孕妇进行雌三醇测定的目的是了解___
A. 胎儿胎盘功能
B. 胎儿宫内发育情况
C. 胎儿肝脏成熟情况
D. 胎儿皮肤成熟情况
E. 胎儿肾脏成熟情况
【单选题】
急性白血病病人容易发生感染的主要原因是___
A. 白细胞增多
B. 继发性营养不良
C. 成熟粒细胞缺乏
D. 长期贫血导致机体抵抗力下降
E. 化疗药副作用
【单选题】
诊断肝癌最重要的化验是___
A. 乳酸脱氢酶
B. 丙氨酸氨基转移酶
C. 三酰甘油
D. 甲胎蛋白
E. 磷酸酶
【单选题】
前置胎盘患者进行产科检查,。错误的是___
A. 胎方位清楚
B. 先露高浮
C. 胎心正常
D. 子宫大小与停经月份一致
E. 宫颈抬举痛明显
【单选题】
小儿从母体获得的抗体从何时起日渐消失___
A. 生后1~2个月
B. 生后3~4个月
C. 生后5~6个月
D. 生后7~8个月
E. 生后10~12个月
【单选题】
下列插管长度不妥的是___
A. 大量不保留灌肠:7~10Cm
B. 小量不保留灌肠:7~l0Cm
C. 保留灌肠:10~15Cm
D. 肛管排气:7~10Cm
E. 男患者导尿:22~24Cm
【单选题】
患者大咯血。给予的止血药首选为___
A. 止血敏
B. 垂体后叶素
C. 安络血
D. 维生素K
E. 抗血纤溶芳酸
【单选题】
头皮静脉不包括___
A. 额静脉
B. 颞浅静脉
C. 头静脉
D. 枕静脉
E. 耳后静脉
【单选题】
与患者交谈过程中,可引起沟通障碍的是___
A. 与交谈者经常保持目光接触
B. 交谈过程中适当沉默
C. 用复述强调患者陈述的关键内容
D. 交谈过程中随意改换话题
E. 适时轻轻抚摸患者
【单选题】
插置双气囊三腔管适用于哪种疾病出血___
A. 胃溃疡
B. 十二指肠溃疡
C. 慢性胃炎
D. 胃癌
E. 食管胃底静脉曲张破裂
推荐试题
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network