【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
推荐试题
【单选题】
患者,男性,78岁。因呼吸道疾病入院,有数颗牙齿缺失,宜采用___
A. 软质饮食
B. 半流质饮食
C. 普通饮食
D. 流质饮食
E. 要素饮食
【单选题】
患者,郑某,7年前被诊断为慢性心力衰竭,则其宜采用的饮食是___
A. 高热量、高蛋白、高维生素、低纤维素饮食
B. 低热量、低糖低脂、高纤维素饮食
C. 低脂、低热量、高盐、粗纤维饮食
D. 高蛋白、高维生素、高铁饮食
E. 高蛋白、低盐、高维生素饮食
【单选题】
患者王某,女性,74岁,遵医嘱给予插胃管,检查胃管在胃内最可靠的方法是___
A. 注射器接胃管抽吸,有胃液抽出
B. 注射器接胃管注入10 ml温开水,畅通
C. 注射器接胃管注入10 ml空气,能听到气过水声
D. 插入胃管后患者无仓咳
E. 将胃管末端放入水中,无气泡溢出
【单选题】
患者男性,40岁。体温39℃,口腔手术后1天,据病情应给予___
A. 普通饮食
B. 软质饮食
C. 半流质饮食
D. 流质饮食
E. 要素饮食
【单选题】
患者女性,30岁。胃溃疡出血人院,经治疗病情缓解,现需做潜血试验,适宜的食谱是___
A. 洋葱炒猪肝、青菜、榨菜肉丝汤
B. 鱼、菠菜、豆腐汤
C. 芹菜炒肉丝、青椒豆腐干、蛋汤
D. 鲶鱼烧豆腐、土豆丝、豆腐汤
E. 红烧肉、西红柿鸡蛋、蛋汤
【单选题】
患者女性、74岁。因胆囊炎胆石症人院,查体:体温38℃,脉搏90次/分,呼吸21次/分,血压180/100mmHg,应给予___
A. 低蛋白、低脂肪饮食
B. 低盐、低脂肪饮食
C. 低盐、低蛋白饮食
D. 高蛋白、低脂肪饮食
E. 高蛋白、低盐饮食
【单选题】
患者女性,30岁。低热3个月余,咳嗽、盗汗、消瘦,人院诊断为肺结核,为配合治疗应给予___
A. 高热量、高脂肪饮食
B. 高热量、高蛋白饮食
C. 高热量、低脂肪饮食
D. 低脂肪、高蛋白饮食
E. 高脂肪、高蛋白饮食
【单选题】
患者男性,35岁、因”急性肾炎”入院,应给___
A. 低蛋白饮食
B. 要素饮食
C. 低脂饮食
D. 低胆固醇饮食
E. 少渣饮食
【单选题】
138患者,张某,男性,60岁。食管气道瘘,为补充营养给予鼻饲饮食,护士在护理时哪一项不妥 ___
A. 插管时动作要轻柔
B. 每次鼻饲量不超过300m1
C. 每天协助患者做好口腔护理
D. 新鲜果汁与牛奶应分别灌入
E. 每次鼻饲完毕注入少量温开水
【单选题】
患者,女性,28岁。产后一周出现便秘,应鼓励患者多进食___
A. 芹菜
B. 牛奶
C. 鸡蛋
D. 肉类
E. 蛋糕
【单选题】
大手术后的患者宜采用的饮食是___
A. 高热量,低蛋白饮食
B. 高蛋白,高维生素饮食
C. 高维生素,低蛋白饮食
D. 高脂肪,高蛋白饮食
E. 低脂肪,高热量饮食
【单选题】
患者,男性,21岁。因打篮球时踝关节扭伤半小时来院就诊,采取的处理措施正确的是___
A. 热纱布湿敷
B. 冷敷
C. 冷、热敷交替
D. 红外线灯照射伤处
E. 热水袋置于伤侧踝关节
【单选题】
患者,男性,50岁。鼻唇沟处有一疖,表现为红、肿、热、痛,护士告诉患者禁忌用热的原因是___
A. 加重局部疼痛
B. 加重局部功能障碍
C. 掩盖病情
D. 防止出血
E. 防止颅内感染
【单选题】
患者,女性,62岁,风湿性关节炎,每日红外线照射20分钟,现照射中患者局部皮肤出现桃红色均匀红斑,说明___
A. 照射剂量过小
B. 照射剂量过大
C. 照射剂量合适
D. 应立即停止照射
E. 应延长照射时间
【单选题】
患者,男性,45岁。突然腹痛,面色苍白,大汗淋漓,护士不应采取的措施是___
A. 询问病史
B. 通知医生
C. 给热水袋以缓解疼痛
D. 测生命体征
E. 安慰患者
【单选题】
患者,女性,17岁,行扁桃体摘除术,术后应将冰袋置于___
A. 前额
B. 头顶部
C. 颈前颌下
D. 胸部
E. 腋窝处
【单选题】
患者,女性,28岁。分娩时会阴部侧切,现切口部位出现红、肿、热、痛,给予红外灯局部照射,照射时间宜控制在___
A. 5分钟
B. 10分钟
C. 10~20分钟
D. 20~30分钟
E. 40分钟
【单选题】
患儿,男性,9岁。高热3天,行温水或乙醇拭浴时,禁忌擦浴的部位是___
A. 面部、腹部、足部
B. 胸前区、腹部、足底
C. 面部、背部、腋窝
D. 胭窝、腋窝、腹股沟
E. 肘窝、手心、腹股沟
【单选题】
患者,男性,35岁。因关节疼痛,需每日红外线照射一次,照射过程中局部皮肤出现紫红色提示___
A. 改用小功率灯头
B. 改用大功率灯头
C. 为适宜剂量,继续照射
D. 停止照射,局部涂凡士林
E. 停止照射,立即改用热敷
【单选题】
患者,男性,45岁。因高热中暑T40.2℃,降温措施不妥的是___
A. 头部用冰槽
B. 前额部置冰袋
C. 温水拭浴
D. 乙醇拭浴
E. 胸腹置冰袋
【单选题】
患者,女性,32岁。因高热遵医嘱给予乙醇拭浴,乙醇拭浴后应间隔多久测量体温 ___
A. 10分钟
B. 15分钟
C. 20分钟
D. 25分钟
E. 30分钟
【单选题】
患者,女,72岁。全麻未清醒,四肢冰凉,给予热水袋水温应调至 ___
A. 40度
B. 50度
C. 60度
D. 70度
E. 80度
【单选题】
患者,男性,50岁。因高热遵医嘱给予冷疗,持续用冷1h后局部皮肤由白转红为___
A. 局部效应
B. 继发效应
C. 远处效应
D. 后续效应
E. 生理效应
【单选题】
患者,男性,46岁。已10余小时未排尿,腹胀,为非尿路阻塞引起的尿潴留,用温水冲洗会阴的目的是___
A. 分散注意力,减轻紧张心理
B. 利用条件反射促进排尿
C. 清洁会阴防止尿路感染
D. 利用温热作用预防感染
E. 使患者感觉舒适
【单选题】
患者,女,55岁。5天未解大便,医嘱用0.2%肥皂液500ml进行大量不保留灌肠。进行灌肠时,护士应为患者安置 ___
A. 平卧位
B. 屈膝仰卧位
C. 左侧卧位
D. 右侧卧位
E. 俯卧位
【单选题】
患者,男性,88岁。被诊断为尿失禁,尿失禁患者的护理不妥的是___
A. 给予患者安慰与鼓励
B. 作好皮肤护理防止压疮
C. 控制饮水,减少尿量
D. 酌情留置导尿管
E. 指导患者锻炼盆底肌肉
【单选题】
患者,女性,67岁。昨日入院被诊断为膀胱肿瘤,遵医嘱给予患者采用导尿术,下列关于导尿操作方法错误的是 ___
A. 患者取仰卧屈膝位
B. 保护患者的隐私
C. 由内向外自上而下消毒外阴
D. 导尿管插入尿道4~6cm
E. 误入阴道应拔管重插
【单选题】
患者,男性,81岁。因尿潴留急诊入院,给患者导尿时,首次放出尿量不应超过___
A. 500ml
B. 800ml
C. 1000ml
D. 1500ml
E. 2000ml
【单选题】
患者,男性,68岁。因阿米巴痢疾需作保留灌肠,置右侧卧位的目的是___
A. 便于护士操作
B. 患者感觉舒适
C. 促进灌肠液排出
D. 减轻不良反应
E. 提高治疗效果
【单选题】
患者,男性,65岁。遵医嘱给予导尿,护理留置导尿患者的措施错误的是___
A. 集尿袋需每两天更换一次
B. 每日定时消毒尿道口
C. 每周更换导尿管一次
D. 观察和记录尿液的情况
E. 集尿袋位置应低于耻骨联合
【单选题】
患者,女性,39岁。遵医嘱给予保留灌肠,则其保留灌肠的溶液量不宜超过___
A. 50ml
B. 100ml
C. 150ml
D. 200ml
E. 500ml
【单选题】
患者,男性,65岁。遵医嘱给予导尿,由于长期留置导尿管患者尿液出现浑浊、沉淀或结晶ying___
A. 多饮水,膀胱冲洗
B. 经常更换卧位
C. 膀胱内滴药
D. 热敷下腹部
E. 经常清洁尿道口
【单选题】
患者,女性,39岁,遵医嘱给予保留灌肠,保留灌肠液应保留的时间是 ___
A. 10min
B. 20min
C. 30min
D. 40min
E. 60min以上
【单选题】
患者,女性,47岁。肝昏迷,为患者灌肠时不宜用肥皂水,其原因是___
A. 防止发生腹胀
B. 防止发生酸中毒
C. 院止对肠黏膜的刺激
D. 减少氨的产生与吸收
E. 避免引起顽固性腹泻
【单选题】
患者,男性,45岁,膀胱高度膨胀且极度虚弱,一次放尿过多可导致血尿,其原因是 ___
A. 腹压急剧下降,致大量血液滞留于腹腔血管内
B. 膀胱内压突然降低,导致膀胱黏膜急剧充血
C. 操作过程中损伤尿道内口
D. 尿道黏膜发生损伤
E. 操作中损伤输尿管
【单选题】
患者,女,30岁。确诊为无尿,无尿是指24小时尿量少于___
A. 80ml
B. 100ml
C. 70ml
D. 50ml
E. 17ml
【单选题】
患者,男性,66岁。因直肠癌将于次日手术,手术前做肠道清洁准备,护士正确的做法是 ___
A. 行大量不保留灌肠一次,排出粪便
B. 行小量不保留灌肠一次,排出粪便
C. 行保留灌肠一次、刺激肠蠕动,促进排便
D. 反复多次行大量不保留灌肠,至排出澄清液
E. 采用开塞露通便法,排出粪便及气体
【单选题】
排便失禁的患者的护理重点是___
A. 保护臀部,防止发生压疮
B. 给予患者高蛋白饮食
C. 认真观察排便时的心理反应当
D. 鼓励患者多饮水
E. 观察记录粪便性质、颜色和量
【单选题】
患者,女性,32岁。不慎割破手指,医嘱TAT肌内注射,立刻执行。患者行TAT过敏试验,结果阳性,正确的做法是___
A. 禁用TAT注射
B. 备好抢救物品,直接注射TAT
C. 注射肾上腺素等药物抗过敏
D. 采用脱敏疗法注射TAT
E. 再做过敏试验并用生理盐水做对照试验
【单选题】
患者,男,36岁,结核病,医嘱链霉素治疗,该患者在治疗过程中出现全身麻木、无力、抽搐、听力下降,此时可选用的药物是___
A. 10%葡萄糖酸钙
B. 0.1%肾上腺素
C. 新斯的明
D. 山梗茶碱