【单选题】
遇一男性老年患者,疑发生急性左心衰竭,表现有如下特征,您认为其中哪一项可作为区别于慢性肺源性心脏病右心衰竭的依据___
A. 咳嗽.气喘
B. 发绀.烦躁
C. 咳粉红色泡沫状痰
D. 端坐呼吸.闻哮鸣音
E. 夜间不能平卧
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
某心脏病患者,男性,32岁。在家生活如常,每于外出骑车及上楼梯时即感气促.心悸,停下休息片刻后可逐渐减轻。体格检查:94次/分,心界扩大,肝脏肋下1cm触及,下肢未见水肿。您认为其心脏功能可分级为___
A. 心功能Ⅰ级
B. 心功能Ⅱ级
C. 心功能Ⅲ级
D. 心功能Ⅳ级
E. 心力衰竭
【单选题】
对呼吸困难的患者,您一时难以分清心源性哮喘或支气管哮喘,药房有以下静脉用药配售,您应选择___
A. 阿托品
B. 氨茶碱
C. 呋噻米(速尿)
D. 肾上腺素
E. 毒毛花苷K(毒K)
【单选题】
发绀的原因是___
A. 血液中还原血红蛋白增多
B. 血红细胞大量破坏
C. 局部瘀血
D. 毛细血管通透性增加
E. 其余选项都是
【单选题】
急性心肌梗死时,下列血清学检查中,升高最早.恢复最快的是___
A. r-谷酰基磷酸转肽酶(r-GTP)
B. 天冬氨酸氨基转移酶(AST)
C. 肌酸磷酸激酶(CPK)
D. 乳酸脱氢酶(LDH)
E. 肌红蛋白
【单选题】
下列哪一项可采用兴奋迷走神经的方法处理___
A. 频发房性期前收缩
B. 阵发性室上性心动过速
C. 阵发性室性心动过速
D. 心室颤动
E. 心房颤动
【单选题】
急性心肌梗死易并发脏器及四肢动脉栓塞的时间多在发病后___
A. 24小时内
B. 48小时内
C. 1~2周
D. 1~4周
E. 1~2个月
【单选题】
某心脏患者休息时无呼吸困难.心慌及水肿等,但是日常生活如洗衣.扫地均可感到疲乏.心慌,休息后很快缓解,表示患者心功能情况为___
A. 心功能Ⅰ级
B. 心功能Ⅱ级
C. 心功能Ⅲ级
D. 心功能Ⅳ级
E. 该患者应严格卧床休息
【单选题】
急性心肌梗死时应用链激酶或尿激酶,其作用在于___
A. 调节离子代谢
B. 疏通心肌微循环
C. 溶解冠状动脉内粥样硬斑块
D. 减少心律失常
E. 溶解冠状动脉内的血栓
【单选题】
典型心绞痛常有以下特点,哪一项除外___
A. 剧烈活动后易发生
B. 疼痛部位常见中段胸骨后
C. 多含硝酸甘油片3分钟内缓解
D. 每次持续都不超过15分钟
E. 疼痛可放射至右肩右臂
【单选题】
下列哪种疾病不会引起阿-斯综合征___
A. 风湿性主动脉瓣狭窄
B. 高血压病
C. 急性心肌梗死
D. 完全性房室传导阻滞
E. 原发性心肌病
【单选题】
监护急性心肌梗死是发现下列哪种情况最危急___
A. 体温上升至39℃
B. 呕吐伴出冷汗
C. 收缩压<10C.7kPa
D. 室性期前收缩落在前面T波上
E. 室性期前收缩6~7次/分
【单选题】
一般急性心肌梗死患者,发病后几天可转出冠心病监护病房___
A. 2~5天
B. 5~7天
C. 7~10天
D. 10~14天
E. 至少2周以上
【单选题】
阵发性心动过速由几个连续发生的期前收缩形成___
A. 2个
B. 3个
C. 3个或3个以上
D. 5个
E. 4个
【单选题】
下列哪项不是急性心肌梗死溶栓治疗的指征___
A. 年龄在65岁以下
B. 发病在6小时以内
C. 胸痛持续30分钟以上
D. 出现病理性Q波
E. 相邻2个以上导联ST段抬高大于2mm
【单选题】
急性心肌梗死患者,早期出现的症状是___
A. 剧烈而持久的胸骨后疼痛
B. 心源性休克
C. 心力衰竭
D. 胃肠道反应
E. 发热
【单选题】
患者,女性,60岁,诊断为冠心病.心力衰竭,服用地高辛.双氢克尿塞1周后症状加重,心电图示有多发性室性早搏。下列处理哪项是错误的___
A. 吸氧
B. 补钾
C. 利多卡因
D. 静脉补钾
E. 使用双氢克尿塞改用速尿
【单选题】
患者,男性,65岁,因胸骨后闷痛1小时入院,心电图示急性广泛前壁心肌梗死。住院当夜,您发现其反应迟钝.面色苍白.皮肤湿冷.脉搏细弱,应考虑___
A. 心源性休克
B. 急性肺水肿
C. 并发脑血栓
D. 心室颤动征象
E. 心肌梗死后综合征
【单选题】
关于心肌梗死的治疗,下列能使闭塞的冠状动脉再通的治疗是___
A. 吗啡皮下注射
B. 尿激酶静脉滴注
C. 利多卡因静脉注射
D. 硝酸甘油含服
E. 安装起搏器
【单选题】
某高血压患者,胸痛反复发作,心电图见ST段短暂上抬,并有室性早搏,心率为54次/分,持续15分钟后均恢复正常。最好选用以下何种药物治疗___
A. 利多卡因
B. 维拉帕米
C. 心律平
D. 硝苯地平
E. 异山梨酯
【单选题】
长期高血压易导致下列哪些脏器出现并发症___
A. 心.肺.脑
B. 肝.肺.肾
C. 心.肝.肾
D. 肝.肾.脑
E. 心.脑.肾
【单选题】
主动脉粥样硬化形成的主动脉瘤最常见于___
A. 冠状动脉开口处
B. 升主动脉
C. 腹主动脉
D. 肾动脉开口处
E. 主动脉弓
【单选题】
要判断刘女士服用的抗凝剂药物用量是否合适,护士应注意评估下面哪项指标___
A. 凝血酶原时间
B. 血清钾含量
C. 出入量
D. 血小板
E. 白细胞
【单选题】
临床最常用下列哪项检查诊断隐性冠心病___
A. X线及临床化验
B. 超声心动图
C. 选择性冠状动脉造影及心向量图
D. 心电图及心电图负荷试验
E. 心功能检查与放射性核素检查
【单选题】
下列原发性高血压的主要并发症,哪一项除外___
A. 高血压性心脏病
B. 糖尿病
C. 急性心血管疾病
D. 慢性肾功能衰竭
E. 冠心病
【单选题】
导致心肌病猝死的直接原因是___
A. 急性左心衰竭
B. 突发呼吸衰竭
C. 心内膜炎
D. 恶性心律失常
E. 脑动脉栓塞
【单选题】
患者,女性,20岁,发热.心悸.乏力2天,晕厥1次。平素体健,两周前曾因着凉感冒。体检:体温38℃,咽部充血;心率116次/分,心律尚齐,偶闻及期前收缩5~6次/分,余无特殊发现。血白细胞计数为12×10_TagUpStart_9_TagUpEnd_/升,红细胞沉降率(ESR)为28mm/h。心电图见S-T段压低,T波低平或倒置,窦性心动过速,室性期前收缩频发(7~8次/分)。您认为最可能是患有___
A. 上呼吸道感染
B. 风湿热
C. 柯萨奇病毒性心肌炎
D. 流感病毒性心肌炎
E. 风湿性心肌炎
【单选题】
某患者半小时前急起气短,咳粉红色泡沫痰。查体示:心率120次/分,血压170/100mmHg,双肺可闻及散在湿啰音和哮鸣音。下列治疗用药哪组最为合理___
A. 哌替啶.西地兰.氨茶碱.硝普钠
B. 吗啡.速尿.地塞米松.西地兰
C. 哌替啶.西地兰.速尿.硝普钠
D. 西地兰.速尿.氨茶碱.多巴酚丁胺
E. 千胺哇琳.多巴酚丁胺.西地兰.氨茶碱
【单选题】
患者,女性,46岁,反复心慌.气促15年,再发加重伴双下肢浮肿1周,既往有风湿活动史,现诊断为风湿性心脏病合并___
A. 风湿活动
B. 肺气肿
C. 肝硬化
D. 周围循环衰竭
E. 充血性心力衰竭
【单选题】
某患者服用地高辛0.25mg,每日1次,共2周,出现何种情况下应停药___
A. 血钾降低
B. BUN升高
C. 心尖区收缩期杂音增强
D. 心率40次/分,心尖区闻及大泡音
E. 心房颤动,心率由120次/分降至80次/分
【单选题】
患者,女学生,16岁,平素体健,学校体检时心率96次/分,律齐,心尖区闻及舒张期隆隆样杂音,心界增大不明显。恰当的保健指导是___
A. 保持卧床休息
B. 及早洋地黄治疗
C. 宜口服利尿剂
D. 避免重体力活动,防止感染,经常随访
【单选题】
高血压最常见的死因是___
A. 心功能不全
B. 心律失常
C. 脑血管意外
D. 肾功能衰竭
E. 眼底动脉硬化
【单选题】
患者突然心脏停搏,护士独自发现首选措施是___
A. 尽快招呼医师来抢救
B. 推抢救车行电极除颤
C. 心肺基础复苏术
D. 给予吸氧,作好气管插管准备
E. 建立静脉通路,保证静脉给药途径
【单选题】
电极复律前正确的准备措施是___
A. 停服洋地黄3~5天
B. 暂时拔除吸氧导管
C. 禁食4小时,排空大.小便
D. 忌用镇静剂
E. 褥垫保证松软无硬物
【单选题】
窦性心动过速的特点是___
A. 静脉推注利多卡因后停止发作
B. 心电图无室性融合波
C. 心率大于100次/分
D. 按压颈动脉窦能停止发作
E. 静脉推注强心药后停止发作
【单选题】
风湿性心瓣膜病最常见的并发症是___
A. 亚急性感染性心内膜炎
B. 充血性心力衰竭
C. 栓塞
D. 心律失常
E. 肺部感染
【单选题】
低温疗法一般肛温以保持什么温度为宜___
A. 22℃
B. 30℃
C. 32℃
D. 34℃
E. 36℃
【单选题】
有症状的病态窦房结综合征患者,最宜选择的治疗方法是___
A. 阿托品
B. 普萘洛尔
C. 异丙肾上腺素
D. 麻黄碱
E. 人工心脏起搏器
【单选题】
急性心肌梗死常发生左心衰竭的主要原因是___
A. 频发性室性心动过速
B. 房室传导阻滞
C. 心脏负荷加重
D. 心肌收缩力不协调
E. 心肌收缩力下降
【单选题】
某中年女教师晨起锻炼时,发生心绞痛,即用硝酸甘油1片(0.5mg)舌下含服,1分多钟后感眼前发黑.恶心,手心发凉。此时应嘱患者___
A. 马上吃些点心
B. 立即躺下平卧
C. 再服一片硝酸甘油
D. 站立勿动待自行恢复
E. 急去医院心电图室检查
【单选题】
高血压患者不宜选用下列哪种食物油___
A. 菜油
B. 花生油
C. 玉米油
D. 大豆油
E. 茶油
推荐试题
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability