【单选题】
慢性肾衰竭患者需严格记录出入液量是因为患者有___
A. 脱水
B. 水肿
C. 脱水或水肿
D. 低钾血症
E. 低钠血症
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
风湿性心脏病主动脉瓣狭窄的典型体征是___
A. 周围血管征阳性
B. 主动脉瓣区舒张期喷射样杂音
C. 主动脉瓣区收缩期隆隆样杂音
D. 主动脉瓣区舒张期隆隆样杂音
E. 主动脉瓣区收缩期喷射样杂音
【单选题】
确诊一氧化碳中毒的主要依据是___
A. 血液中还原血红蛋白量大于50g/L
B. 血液中还原血红蛋白量大于70g/L
C. 血液胆碱酯酶活性降低
D. 血液检查碳氧血红蛋白定性阳性
E. 血液中氧分压降低
【单选题】
预防慢性风湿性心脏瓣膜病患者风湿活动复发的根本措施是___
A. 积极锻炼身体
B. 较长时间卧床休息
C. 积极预防与治疗链球菌感染
D. 积极治疗心功能不全
E. 合理饮食,保持良好的情绪
【单选题】
急性肾炎的发病机制是___
A. 抗基底膜抗体介导
B. 沉积的循环免疫复合物介导
C. 细胞免疫介导
D. 其他D炎症介导
E. 以上都不是
【单选题】
肝性脑病的护理措施中,最重要的环节是___
A. 加强基础护理
B. 消除诱发因素
C. 做好知识宣教
D. 注意休息保暖
E. 严密观察病情
【单选题】
消化性溃疡最重要的护理诊断是___
A. 疼痛
B. 焦虑
C. 知识缺乏
D. 活动无耐力
E. 营养失调
【单选题】
肥厚型心肌病的临床表现不包括___
A. 肝脏肿大、水肿
B. 频发的一过性晕厥
C. 心悸、乏力
D. 劳力性呼吸困难
E. 非典型心绞痛
【单选题】
胃壁分为黏膜、黏膜下层、肌层、浆膜层4层,其中黏膜层主要由下列哪几种细胞组成___
A. 主细胞
B. 壁细胞
C. 粘液细胞
D. B细胞
E. 主细胞,壁细胞和粘液细胞
【单选题】
女,31岁,便秘多年,反复发作尿路感染,多次尿培养为大肠杆菌生长,夜尿增多。尿检蛋白(±),白细胞5~15个/HP,红细胞3~5个/HP,临床诊断慢性肾盂肾炎,已实施正规治疗。下列护理指导中哪项对预防复发无意义___
A. 继续抗菌治疗
B. 禁用肾毒性抗生素
C. 保持大便通畅
D. 多饮水
E. 注意经期卫生
【单选题】
成年男性的血红蛋白正常值范围为___
A. 110~150g/L
B. 110~160g/L
C. 120~160g/L
D. 120~170g/L
E. 170~200g/L
【单选题】
关于急性肾衰竭高钾血症的描述错误的是___
A. 需要紧急处理
B. 心电图可表现为QRS波增宽
C. 透析治疗有效
D. 补充钙剂的速度要慢
E. 常合并碱中毒
【单选题】
颅内压增高的主要表现为___
A. 头痛、抽搐、偏瘫
B. 头痛、呕吐、感觉障碍
C. 头痛、恶心、食欲下降
D. 头痛、呕吐、视盘水肿
E. 头痛、抽搐、血压增高
【单选题】
诊断原发性下肢深静脉瓣膜功能不全最可靠的检查方法为___
A. 波氏试验
B. 下肢深静脉造影
C. 屈氏试验
D. Pratt试验
E. 电阻抗血流测定
【单选题】
肾结石患者的重要症状是___
A. 尿失禁
B. 排尿困难
C. 尿频、尿急
D. 活动后镜下血尿
E. 无痛性血尿
【单选题】
下肢静脉曲张的主要原因是___
A. 心脏功能不全
B. 皮下脂肪减少
C. 静脉瓣膜破坏
D. 下肢肌肉收缩减退
E. 胸腔负压作用减低
【单选题】
下列哪个部位的肿瘤可出现精神障碍___
A. 中央前回肿瘤
B. 额叶前部肿瘤
C. 枕叶肿瘤
D. 听神经肿瘤
E. 脑干肿瘤
【单选题】
破伤风治疗最重要的环节是___
A. 镇静,解痉
B. 局部创口处理
C. 注射破伤风抗毒素
D. 全身支持疗法
E. 病室安静,减少刺激
【单选题】
冠状动脉发生粥样硬化易患因素或危险因素中下列哪项不妥___
A. 高血压
B. 高脂血症
C. 吸烟
D. 糖尿病
E. 与苯接触
【单选题】
张某,男性,70岁,排尿困难5年。夜尿5~6次;直肠指检:前列腺Ⅲ度;B超:残余尿220ml,双肾中度积水;血Cr:3601μmol/L;尿常规:白细胞20~30个/HP。此患者目前最佳的治疗方法是___
A. 药物治疗
B. 留置导尿
C. 膀胱造瘘术
D. 经膀胱前列腺切除术
E. 经耻骨后前列腺切除术
【单选题】
输尿管结石的主要症状为___
A. 无痛性全程血尿
B. 肾绞痛+镜下血尿
C. 尿痛、尿频
D. 排尿困难
E. 尿失禁
【单选题】
门脉高压症最危急的并发症是___
A. 肝功能障碍
B. 食管、胃底静脉曲张破裂
C. 脾功能亢进
D. 严重顽固性腹水
E. 肝性脑病
【单选题】
不符合体外循环后低心排血量综合征的表现是___
A. 血压下降
B. 脉压小
C. 中心静脉压降低
D. 心率快
E. 中枢性高热
【单选题】
外伤性高位截瘫患者发病早期应___
A. 自行排尿
B. 间歇导尿
C. 每天膀胱冲洗
D. 持续开放导尿
E. 留置导尿管,定时开放
【单选题】
长期胃肠外营养的患者置管的部位是___
A. 足部静脉
B. 手部静脉
C. 股静脉
D. 上腔静脉
E. 下腔静脉
【单选题】
患者,男性,31岁。因尿频、尿急、尿痛症状及尿常规白细胞20~30个/HP,诊断为"尿路感染",给予左氧氟沙星、头孢氨苄等药物口服治疗,症状不能缓解,这时首先考虑___
A. 慢性膀胱炎
B. 膀胱炎伴发结石
C. 肾盂肾炎
D. 肾结核
E. 膀胱憩室
【单选题】
前列腺增生最主要的症状是___
A. 尿频
B. 进行性排尿困难
C. 尿潴留
D. 尿失禁
E. 尿流中断
【单选题】
不属于全胃肠外营养并发症的是___
A. 气胸
B. 血胸
C. 液胸
D. 高血糖症
E. 肠道感染
【单选题】
某颅脑损伤患者,神志丧失,呼之不醒,压其眶上神经,出现皱眉、上肢活动。其意识障碍属于___
A. 昏睡
B. 嗜睡
C. 浅昏迷
D. 昏迷
E. 深昏迷
【单选题】
全身麻醉患者清醒前最危险的意外及并发症是___
A. 引流管脱落
B. 体温过低
C. 坠床
D. 呕吐物窒息
E. 意外损伤
【单选题】
3岁以内的小儿股骨干骨折采用___
A. 手法复位,外固定
B. 手法复位,内固定
C. 双下肢皮肤悬吊牵引
D. 切开复位,内外固定
E. 切开复位,牵引固定
【单选题】
破伤风发生的原因是___
A. 破伤风杆菌迅速在体内繁殖
B. 全身缺乏免疫
C. 破伤风杆菌产生的外毒素作用
D. 破伤风杆菌侵入人体
E. 破伤风杆菌的菌体蛋白作用
【单选题】
截瘫的并发症是___
A. 排尿障碍
B. 泌尿系感染
C. 肺部感染
D. 压疮
E. 以上都是
【单选题】
以下关于股骨颈骨折叙述错误的是___
A. 常发生于老年妇女
B. 患者可有内收外旋畸形
C. 易发生股骨头缺血坏死
D. 叩打足跟部时有髋部疼痛
E. 股骨头置换术后应坐低矮沙发
【单选题】
胸腰椎压缩性骨折,压缩程度在1/3以内的应采取___
A. 平卧硬板床,骨折处垫枕,数日后腰背肌后伸锻炼
B. 平卧硬板床,数日后背肌锻炼
C. 平卧硬板床
D. 牵引治疗
E. 以上都不对
【单选题】
肺癌患者出现声音嘶哑,常表示肿瘤压迫___
A. 喉返神经
B. 膈神经
C. 颈交感神经
D. 臂丛神经
E. 喉上神经
【单选题】
早期食管癌的症状是___
A. 食欲减退
B. 恶心、呕吐
C. 食物停滞感或异物感
D. 进行性吞咽困难
E. 持续性胸痛或背痛
【单选题】
上尿路结石最常见的类型是___
A. 胱氨酸结石
B. 碳酸钙结石
C. 磷酸镁结石
D. 尿酸结石
E. 草酸钙结石
【单选题】
最常见的腹外疝是___
A. 切口疝
B. 脐疝
C. 股疝
D. 腹股沟直疝
E. 腹股沟斜疝
【单选题】
急性胰腺炎患者不可使用的止痛药是___
A. 吗啡
B. 东莨菪碱
C. 山莨菪碱
D. 阿托品
E. 哌替啶
【单选题】
膀胱癌血尿特点是___
A. 无痛持续肉眼血尿
B. 疼痛间歇肉眼血尿
C. 无痛间歇肉眼血尿
D. 疼痛间歇终末血尿
E. 无痛间歇镜下血尿
推荐试题
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption