刷题
导入试题
【单选题】
患者,男性,65岁,因胸骨后闷痛1小时入院,心电图示急性广泛前壁心肌梗死。住院当夜,您发现其反应迟钝.面色苍白.皮肤湿冷.脉搏细弱,应考虑___
A. 心源性休克
B. 急性肺水肿
C. 并发脑血栓
D. 心室颤动征象
E. 心肌梗死后综合征
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
关于心肌梗死的治疗,下列能使闭塞的冠状动脉再通的治疗是___
A. 吗啡皮下注射
B. 尿激酶静脉滴注
C. 利多卡因静脉注射
D. 硝酸甘油含服
E. 安装起搏器
【单选题】
某高血压患者,胸痛反复发作,心电图见ST段短暂上抬,并有室性早搏,心率为54次/分,持续15分钟后均恢复正常。最好选用以下何种药物治疗___
A. 利多卡因
B. 维拉帕米
C. 心律平
D. 硝苯地平
E. 异山梨酯
【单选题】
长期高血压易导致下列哪些脏器出现并发症___
A. 心.肺.脑
B. 肝.肺.肾
C. 心.肝.肾
D. 肝.肾.脑
E. 心.脑.肾
【单选题】
主动脉粥样硬化形成的主动脉瘤最常见于___
A. 冠状动脉开口处
B. 升主动脉
C. 腹主动脉
D. 肾动脉开口处
E. 主动脉弓
【单选题】
要判断刘女士服用的抗凝剂药物用量是否合适,护士应注意评估下面哪项指标___
A. 凝血酶原时间
B. 血清钾含量
C. 出入量
D. 血小板
E. 白细胞
【单选题】
临床最常用下列哪项检查诊断隐性冠心病___
A. X线及临床化验
B. 超声心动图
C. 选择性冠状动脉造影及心向量图
D. 心电图及心电图负荷试验
E. 心功能检查与放射性核素检查
【单选题】
下列原发性高血压的主要并发症,哪一项除外___
A. 高血压性心脏病
B. 糖尿病
C. 急性心血管疾病
D. 慢性肾功能衰竭
E. 冠心病
【单选题】
导致心肌病猝死的直接原因是___
A. 急性左心衰竭
B. 突发呼吸衰竭
C. 心内膜炎
D. 恶性心律失常
E. 脑动脉栓塞
【单选题】
患者,女性,20岁,发热.心悸.乏力2天,晕厥1次。平素体健,两周前曾因着凉感冒。体检:体温38℃,咽部充血;心率116次/分,心律尚齐,偶闻及期前收缩5~6次/分,余无特殊发现。血白细胞计数为12×10_TagUpStart_9_TagUpEnd_/升,红细胞沉降率(ESR)为28mm/h。心电图见S-T段压低,T波低平或倒置,窦性心动过速,室性期前收缩频发(7~8次/分)。您认为最可能是患有___
A. 上呼吸道感染
B. 风湿热
C. 柯萨奇病毒性心肌炎
D. 流感病毒性心肌炎
E. 风湿性心肌炎
【单选题】
某患者半小时前急起气短,咳粉红色泡沫痰。查体示:心率120次/分,血压170/100mmHg,双肺可闻及散在湿啰音和哮鸣音。下列治疗用药哪组最为合理___
A. 哌替啶.西地兰.氨茶碱.硝普钠
B. 吗啡.速尿.地塞米松.西地兰
C. 哌替啶.西地兰.速尿.硝普钠
D. 西地兰.速尿.氨茶碱.多巴酚丁胺
E. 千胺哇琳.多巴酚丁胺.西地兰.氨茶碱
【单选题】
患者,女性,46岁,反复心慌.气促15年,再发加重伴双下肢浮肿1周,既往有风湿活动史,现诊断为风湿性心脏病合并___
A. 风湿活动
B. 肺气肿
C. 肝硬化
D. 周围循环衰竭
E. 充血性心力衰竭
【单选题】
某患者服用地高辛0.25mg,每日1次,共2周,出现何种情况下应停药___
A. 血钾降低
B. BUN升高
C. 心尖区收缩期杂音增强
D. 心率40次/分,心尖区闻及大泡音
E. 心房颤动,心率由120次/分降至80次/分
【单选题】
患者,女学生,16岁,平素体健,学校体检时心率96次/分,律齐,心尖区闻及舒张期隆隆样杂音,心界增大不明显。恰当的保健指导是___
A. 保持卧床休息
B. 及早洋地黄治疗
C. 宜口服利尿剂
D. 避免重体力活动,防止感染,经常随访
【单选题】
高血压最常见的死因是___
A. 心功能不全
B. 心律失常
C. 脑血管意外
D. 肾功能衰竭
E. 眼底动脉硬化
【单选题】
患者突然心脏停搏,护士独自发现首选措施是___
A. 尽快招呼医师来抢救
B. 推抢救车行电极除颤
C. 心肺基础复苏术
D. 给予吸氧,作好气管插管准备
E. 建立静脉通路,保证静脉给药途径
【单选题】
电极复律前正确的准备措施是___
A. 停服洋地黄3~5天
B. 暂时拔除吸氧导管
C. 禁食4小时,排空大.小便
D. 忌用镇静剂
E. 褥垫保证松软无硬物
【单选题】
窦性心动过速的特点是___
A. 静脉推注利多卡因后停止发作
B. 心电图无室性融合波
C. 心率大于100次/分
D. 按压颈动脉窦能停止发作
E. 静脉推注强心药后停止发作
【单选题】
风湿性心瓣膜病最常见的并发症是___
A. 亚急性感染性心内膜炎
B. 充血性心力衰竭
C. 栓塞
D. 心律失常
E. 肺部感染
【单选题】
低温疗法一般肛温以保持什么温度为宜___
A. 22℃
B. 30℃
C. 32℃
D. 34℃
E. 36℃
【单选题】
有症状的病态窦房结综合征患者,最宜选择的治疗方法是___
A. 阿托品
B. 普萘洛尔
C. 异丙肾上腺素
D. 麻黄碱
E. 人工心脏起搏器
【单选题】
急性心肌梗死常发生左心衰竭的主要原因是___
A. 频发性室性心动过速
B. 房室传导阻滞
C. 心脏负荷加重
D. 心肌收缩力不协调
E. 心肌收缩力下降
【单选题】
某中年女教师晨起锻炼时,发生心绞痛,即用硝酸甘油1片(0.5mg)舌下含服,1分多钟后感眼前发黑.恶心,手心发凉。此时应嘱患者___
A. 马上吃些点心
B. 立即躺下平卧
C. 再服一片硝酸甘油
D. 站立勿动待自行恢复
E. 急去医院心电图室检查
【单选题】
高血压患者不宜选用下列哪种食物油___
A. 菜油
B. 花生油
C. 玉米油
D. 大豆油
E. 茶油
【单选题】
最常见的诱发心力衰竭的因素是___
A. 呼吸道感染
B. 发生快速性心律失常
C. 过度体力活动或情绪激动
D. 钠盐摄入过多
E. 输液(血)过量及过快
【单选题】
右心衰竭与肝硬化的区别是___
A. 肝颈静脉返流征阳性
B. 食欲减退
C. 肝脏肿大
D. 腹水形成
E. 下肢水肿
【单选题】
心力衰竭临床表现的基本原理是___
A. 动脉系供血不足,静脉系瘀血
B. 肺循环充血,体循环缺血
C. 微循环血流灌注不足
D. 急性肺水肿致组织缺氧
E. 体液潴留致细胞水肿
【单选题】
对心力衰竭患者输液,应严格限制滴速在每分钟___
A. 20~30滴
B. 30~40滴
C. 40~50滴
D. 50~60滴
E. 60~80滴
【单选题】
下列哪项症状区分心源性哮喘和支气管哮喘最有价值___
A. 端坐呼吸
B. 咳粉红色泡沫痰
C. 突发夜间呼吸困难
D. 冬.春季发病多见
E. 喘息
【单选题】
某慢性心功能不全患者表现为夜间阵发性呼吸困难.尿量减少等症状,给予药物治疗后,上述症状好转,但是出现心慌.恶心.呕吐.食欲不振.头晕头痛.黄视.视物模糊等,应考虑为___
A. 慢性心功能不全症状反复
B. 利尿剂的副作用
C. 洋地黄药物中毒
D. 扩血管药物的不良反应
E. 洋地黄药物用量不足
【单选题】
左心功能不全的主要症状为___
A. 肝大
B. 咳嗽.咳痰
C. 少尿
D. 呼吸困难
E. 颈静脉怒张
【单选题】
下列各项中不属洋地黄中毒表现的是___
A. 恶心呕吐
B. 室性早搏
C. 心律不齐
D. 色视幻觉
E. 震颤抽搐
【单选题】
急性肺水肿患者吸氧时在湿化瓶中加乙醇(酒精),其目的是___
A. 增强痰液的稀释作用
B. 扩张肺泡毛细血管床
C. 抑制肺泡内细菌生长
D. 降低肺泡表面张力
E. 兴奋呼吸中枢
【单选题】
患者,男性,50岁,突感胸骨后压榨性疼痛,伴出汗.恶心,含服硝酸甘油休息后仍不能缓解。该患者最可能的诊断是___
A. 高血压性心脏病
B. 心绞痛
C. 心肌炎
D. 急性心肌梗死
E. 充血性心力衰竭
【单选题】
导致急性心肌梗死患者24小时内死亡的最常见原因是___
A. 心律失常
B. 心源性休克
C. 心脏破裂
D. 脑部栓塞
E. 心力衰竭
【单选题】
决定心肌梗死患者预后的最主要因素为___
A. 心律失常
B. 心功能
C. 冠心病危险因素控制的程度
D. 年龄及病程
E. 心肌坏死的数量
【单选题】
下列哪项情况适合于尿激酶溶血栓治疗___
A. 急性心肌梗死发生后4~6小时
B. AMI伴高血压病,血压为26B.6/18B.8kPa(220/140mmHg)
C. 不稳定型心绞痛反复发作
D. AMI患者合并甲型血友病
E. AMI合并糖尿病视网膜病变
【单选题】
一位急性前壁心肌梗死患者突然发生心室颤动,护士首先采取的措施是___
A. 立即准备临时起博器
B. 立即准备静脉注射利多卡因
C. 立即准备除颤器选择同步电复律
D. 立即准备除颤器选择非同步电复律
E. 立即准备除颤器
【单选题】
急性心肌梗死最常发生在___
A. 用力排便
B. 精神紧张
C. 安静或睡眠时
D. 重体力活动时
E. 大量脂肪餐后
【单选题】
高血压患者的饮食原则中,应___
A. 低盐
B. 低脂
C. 低糖
D. 高维生素
E. 高热量
【单选题】
关于慢性心功能不全的护理措施,下列不正确的是___
A. 低盐.易消化清淡饮食
B. 对严重心功能不全患者采用半坐卧位
C. 一般采用低流量间断给氧
D. 对心功能Ⅲ级患者,应限制日常活动
E. 观察心律和心率
推荐试题
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用