刷题
导入试题
【单选题】
关于环境安全以下叙述正确的是___
A. 婴幼儿不需要比成人更好的安全协助和保护
B. 文化程度影响个人自我保护的能力
C. 失明患者更容易发生意外伤害
D. 患病并不使人容易发生意外和受伤害
E. 人在陌生环境里更容易和他人沟通
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
股骨干骨折用石膏绷带固定的患者需要采用___
A. 平车1人搬运法
B. 平车2人搬运法
C. 平车3人搬运法
D. 平车4人搬运法
E. 轮椅运送法
【单选题】
患者男,70岁,高血压治疗2周今晨起上厕所不慎滑倒造成颈椎骨折,及转科至骨科治疗,平车运送时采用___
A. 1人搬运法
B. 2人搬运法
C. 3人搬运法
D. 4人搬运法
E. 挪动法
【单选题】
急性肺水肿患者采取端坐位的目的是___
A. 减轻心脏负担,改善呼吸
B. 减轻头面部水肿
C. 改善颈部血液循环
D. 预防颅内压发生
E. 改善血液粘稠度
【单选题】
患者急性胃穿孔入院,脉搏110次/分,血压80/50mmHg。该患者应选择哪种卧位___
A. 去枕仰卧位
B. 端坐位
C. 中凹仰卧位
D. 平卧位
E. 屈膝仰卧位
【单选题】
心包积液患者采取___
A. 主动卧位
B. 被迫卧位
C. 被动卧位
D. 稳定卧位
E. 不稳定卧位
【单选题】
预防压疮的关键是___
A. 间歇性解除皮肤的压力
B. 受压处的皮肤按摩
C. 保持床单位干燥平整
D. 增进营养
E. 及时清洁患者皮肤
【单选题】
下列哪项不是手术消毒的指征___
A. 接触未经消毒的仪器和设备后
B. 检查、治疗护理或处理免疫功能低下的病人前
C. 接触具有传染性的血液、体液和分泌物之后
D. 保持双手较长时间抗菌活性,需戴无菌手套时
E. 戴清洁手套前
【单选题】
在身体空隙处垫以软枕的作用是___
A. 架空受压部位
B. 固定体位
C. 减少皮肤手摩擦的刺激
D. 降低局部皮肤所承受的压力
E. 安全防护,防止坠床
【单选题】
不是皮肤的功能___
A. 排泄功能
B. 感觉功能
C. 分泌功能
D. 调节酸碱平衡
E. 调节体温
【单选题】
最自然的休息方式是___
A. 听音乐
B. 散步
C. 看电视
D. 旅游
E. 睡眠
【单选题】
下列哪项措施不能帮助患者入睡___
A. 睡前热水泡脚
B. 睡前剧烈运动
C. 睡前喝杯热牛奶
D. 减轻心理上的紧张和焦虑
E. 规律的就寝习惯
【单选题】
属于非特异性感染的是___
A. 结核
B. 破伤风
C. 丹毒
D. 气性坏疽
E. 念珠菌病
【单选题】
属于特异性感染的是___
A. 疖痈
B. 丹毒
C. 急性阑尾炎
D. 急性乳腺炎
E. 结核
【单选题】
属于特异性感染的是___
A. 疖
B. 痈
C. 破伤风
D. 急性乳腺炎
E. 急性阑尾炎
【单选题】
中医的“四诊”是指___
A. 望诊、问诊、切诊、触诊
B. 望诊、闻诊、问诊、切诊
C. 视诊、触诊、叩诊、切诊
D. 视诊、触诊、听诊、叩诊
E. 望诊、闻诊、叩诊、听诊
【单选题】
2岁男童,进食时哭闹不止,突然出现剧烈呛咳、喉鸣、呼吸困难,该患儿可能是___
A. 高热惊厥
B. 急性脑炎
C. 气管异物
D. 肺炎
E. 支气管炎
【单选题】
中医的“五志”是指___
A. 喜、怒、思、忧、恐
B. 喜、怒、忧、思、悲
C. 忧、思、悲、恐、惊
D. 怒、忧、悲、思、惊
E. 喜、思、悲、恐、惊
【单选题】
遇到灾难事故,护理人员主动提出到救灾第一线去,体现护理人员的___
A. 良好的科学文化素质
B. 扎实的专业理论知识
C. 规范的实践操作能力
D. 崇高的职业道德素质
E. 具备评判性思维能力
【单选题】
患者男性,22岁,手术后麻醉未清醒,手足厥冷,全身发抖,欲用热水袋取暖,下列不恰当的是___
A. 热水袋水温应控制在60℃以内
B. 热水袋外再包裹毛巾
C. 密切观察局部皮肤情况
D. 及时更换热水
E. 重点交班
【单选题】
某患儿,出生一天,诊断为“新生儿窒息”入暖箱治疗,该新生儿室的湿度波动为___
A. 20-30%
B. 30-40%
C. 40-50%
D. 50-60%
E. 60-70%
【单选题】
某二甲医院ICU,共有10张床位,按照国家卫计委对ICU护士与床位比的要求,该科室配备的护士人数应不少于___
A. 10名
B. 15名
C. 20名
D. 25名
E. 30名
【单选题】
下列疾病需采取严密隔离的是___
A. 疟疾
B. 破伤风
C. 新生儿脓疱疹
D. 霍乱
E. 肺结核
【单选题】
医疗废物的处理原则错误的是___
A. 防止污染扩散
B. 分类收集
C. 分类处理
D. 少量医疗垃圾可与生活垃圾一同处理
E. 尽可能采用焚烧处理
【单选题】
防止医院内感染的重要措施是___
A. 隔离
B. 清洁
C. 消毒
D. 灭菌
E. 无菌技术
【单选题】
洗手时不符合手卫生要求的是___
A. 洗手时应注意清洁指甲、指尖、指甲缝和关节
B. 手拧式开关,应采用防止手部再污染的方法关闭水龙头
C. 冲洗时,手指朝上,让污水从指尖流至前臂
D. 防止水溅到衣服和地面
E. 冲洗至皂液洗净为止
【单选题】
符合老年人用药原则的用药方式是___
A. 从小剂量开始用药,尽量减少用药种类
B. 合理选药,足量给药
C. 首次剂量加倍,进行血药浓度监测
D. 联合用药,进行血药浓度监测
E. 足量给药,尽量减少用药种类
【单选题】
急性胰腺炎患者应慎用的药物是___
A. 钙剂
B. 奥曲肽
C. 吗啡
D. 生长抑素
E. 洛赛克
【单选题】
某护士在抽吸药液的过程中,不慎被掰开的安剖划伤了手指,不妥的处理方法是___
A. 用0.5%碘伏消毒伤口,并包扎
B. 用75%酒精消毒伤口,并包扎
C. 从伤口的远心端向近心端挤压
D. 及时填写锐器伤登记表
E. 用肥皂水彻底清洗伤口
【单选题】
判断心脏骤停最主要指征是___
A. 面色苍白
B. 瞳孔散大
C. 皮肤发绀
D. 尿量减少
E. 大动脉波动消失
【单选题】
患者女,40岁,近一个月自觉疲乏无力,头晕,遵医嘱硫酸亚铁口服,为减少不良反应正确的给药指导是___
A. 饭前服用
B. 直接喝取
C. 茶水送服
D. 牛奶送服
E. 服药后及时漱口
【单选题】
扁桃体手术后预防出血最好的方法是___
A. 病人取半坐位
B. 颈部用冰敷
C. 应用止血药
D. 嘱病人喝温开水
E. 头部置于冰槽内
【单选题】
呼吸中带有刺激性大蒜味的现象见于___
A. 支气管扩张
B. 肺脓肿
C. 尿毒症
D. 痛症酸中毒
E. 有机磷农药中毒
【单选题】
各种类型的休克基本病理变化是___
A. 血压下降
B. 中心静脉压降低
C. 脉压减少
D. 尿量减少
E. 有效循环血量锐减
【单选题】
使用化学消毒剂的注意事项中,下列哪一项是错误的___
A. 严格掌握消毒剂的有效时间和浓度
B. 浸泡前要打开器械的轴节
C. 物品应全部浸没在消毒液中
D. 消毒液容器要盖严
E. 使用前用纯净水冲净,以免消毒液成绩组织
【单选题】
代谢性酸中毒患者的呼吸表现为___
A. 吸气性呼吸困难
B. 呼吸性呼吸困难
C. 间断呼吸
D. 呼吸深大而规则
E. 呼吸浅表而不规则
【单选题】
大便隐血试验前,饮食中可选择___
A. 肉类
B. 肝类
C. 动物血
D. 豆制品、冬瓜
E. 绿色蔬菜
【单选题】
一患者的吸氧流量为4L/min,其吸氧浓度为___
A. 25%
B. 30%
C. 33%
D. 37%
E. 40%
【单选题】
癫痫大发作会出现神经系统病理征___
A. 对
B. 错
C.
D.
E.
【单选题】
妄想是指大脑对客观事物整体属性的歪曲感知___
A. 对
B. 错
C.
D.
E.
【单选题】
中医护理应遵循因人、因时、因地制宜的原则___
A. 对
B. 错
C.
D.
E.
推荐试题
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用