【判断题】
病人的呼吸温度是影响测量呼吸末二氧化碳的因素之一,因此在测量装置中设有温度传感器和加热器,保证待测气体的温度恒定。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
多参数监护仪对于无创血压的测量大多采用柯氏音法。
【判断题】
血氧饱和度测量探头中的发光元件,能交替发射波长为 660nm 的红光和 940nm 的近红外光。其中红光对 HbO2 的吸收系数较大。
【判断题】
对于同相并联前置放大电路,第一级放大电路的共模抑制能力取决于其两个运放器件本身的共模抑制比的差异,差异越小,第一级放大电路的共模抑制比就越高。
【判断题】
如果有电流直接通过心脏,将引起心室纤颤,这种电击称为宏电击。
【判断题】
脑电图机中的平均导联只使用头皮上的两个作用电极而不使用参考电极,记录的波形是两个电极部位脑部变化的电位差值。
【判断题】
实现电气隔离通常有两种方案:电磁耦合和光电耦合。其中电磁耦合法可以直接传递低频、直流信号。
【判断题】
多参数病人监护仪中的呼吸测量大多利用人体在呼吸过程中的胸廓运动会造成人体电阻的变化,即阻抗法来进行。
【判断题】
心电图机的输入电路有高压保护部分,其作用是防止高频噪声干扰。
【判断题】
医疗器械不良事件,是指已上市的医疗器械,在正常使用情况下发生的,导致或者可能导致人体伤害的各种有害事件。
【判断题】
群体医疗器械不良事件,是指同一医疗器械在使用过程中,在相对集中的时间、区域内发生,对一定数量人群的身体健康或者生命安全造成损害或者威胁的事件。
【判断题】
医疗器械再评价,是指对未上市销售的医疗器械的安全性、有效性进行重新评价,并采取相应措施的过程。
【判断题】
国家药品监督管理局指定的监测机构负责对收集到的医疗器械不良事件信息进行统一管理,并向相关监测机构、持有人、经营企业或使用单位反馈医疗器械不良事件监测相关信息。
【判断题】
医疗器械召回是指医疗器械生产企业按照规定的程序对其已上市销售的某一类别、型号或者批次的存在缺陷的医疗器械产品,采取警示、检查、修理、重新标签、修改并完善说明书、软件更新、替换、收回、销毁等方式进行处理的行为。
【判断题】
报告医疗器械不良事件应当遵循确认即报的原则,即确定某事件为医疗器械不良事件时,按照医疗器械不良事件进行报告。
【判断题】
导致或者可能导致严重伤害或者死亡的可疑医疗器械不良事件可以不报告。
【判断题】
医疗器械生产企业在实施召回的过程中,应当根据召回计划定期向所在地省、自治区、直辖市食品药品监督管理部门提交召回计划实施情况报告。
【判断题】
医疗器械使用单位应当对医疗器械采购实行统一管理,由其指定的部门或者人员统一采购医疗器械,其他部门或者人员不得自行采购。
【判断题】
企业质量负责人负责医疗器械质量管理工作,应当独立履行职责,在企业内部对医疗器械质量管理具有裁决权,承担相应的质量管理责任。
【判断题】
根据法规要求,经营第二类医疗器械实行许可管理。
【判断题】
从事第三类医疗器械经营的,经营企业应当向所在地省级药品监督管理部门提出申请。
【判断题】
企业应当按照国家有关规定,对温湿度监测设备等计量器具定期进行校准或者检定,并保存校准或者检定记录。
【判断题】
《医疗器械经营许可证》事项的变更分为许可事项变更和登记事项变更。许可事项变更包括法定负责人、经营方式、经营范围、库房地址的变更。
【判断题】
从事医疗器械零售业务的企业,应当给消费者开具销售凭据。
【判断题】
医疗器械临床试验,是指在经资质认定的医疗器械临床试验机构中,对拟申请注册的医疗器械在正常使用条件下的安全性和有效性进行确认或者验证的过程。
【判断题】
研究者接到申办者或者伦理委员会需要暂停或者终止临床试验的通知时,应当及时通知受试者,并保证受试者得到适当治疗和随访。
【判断题】
对显著偏离临床试验方案或者在临床可接受范围以外的数据应当加以核实,不过,研究者无需说明。
【判断题】
多中心临床试验中,各分中心临床试验小结应当由该中心的研究者签名并注明日期,经该中心的医疗器械临床试验管理部门审核、注明日期并加盖临床试验机构印章后交牵头单位。
【判断题】
医疗器械临床试验应当在三个或者三个以上医疗器械临床试验机构中进行。
【判断题】
医疗器械临床试验质量管理规范不适用于按照医疗器械管理的体外诊断试剂。
【判断题】
验证是指通过提供客观证据表明规定要求已经满足的确认。(风险管理中)
【判断题】
《医疗器械生产质量管理办法》不适用于体外诊断试剂。
【判断题】
生产用细胞应当建立原始细胞库、主代细胞库、工作细胞库。
【判断题】
与血型、组织配型、血源筛查相关的试剂。
【判断题】
体外诊断试剂产品技术要求可以低于国家强制性标准。
【判断题】
变更体外诊断试剂的主要原材料供应商都属于许可事项变更。
【判断题】
体外诊断试剂可以分为定量检测和定性检测。
【判断题】
在医疗器械延续注册申报中,如医疗器械强制性标准没有变化,申请人无需递交产品检验报告。
【判断题】
产品技术要求中的性能指标较多时,可以以“见随附资料”等形式提供。
【判断题】
进口医疗器械在我国注册时需提供境外政府医疗器械主管部门批准该产品上市的证明文件,还需提供境外政府医疗器械主管部门批准该产品上市时的临床评价资料。
【判断题】
国内首创且具有显著临床应用价值的医疗器械可认定为创新医疗器械。
推荐试题
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking