刷题
导入试题
【单选题】
下列不属于同一类别医疗机构的是____。___
A. 卫生所
B. 医务室
C. 卫生保健所
D. 村卫生室
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
原料血浆经复检不合格的,不得投料生产,并必须在____监督下按照规定程序和方法予以销毁,并作记录。___
A. 省级卫生监督员
B. 县级以上卫生监督员
C. 省级药品监督员
D. 县级以上药品监督员
【单选题】
医疗机构需要使用麻醉药品和第一类精神药品的,应当经所在地____级人民政府卫生主管部门批准,取得购用印鉴卡。___
A. 乡
B. 县
C. 市
D. 省
【单选题】
供血浆者的年龄不超过____。___
A. 50岁
B. 55岁
C. 60岁
D. 65岁
【单选题】
开具处方时,药品用法不得使用“遵医嘱”、“自用”等含糊不清字句,可用规范的下列哪种文字书写。___
A. 英文
B. 拉丁文
C. 中文
D. 以上都可以
【单选题】
产前诊断报告应由____名以上经资格认定的医师签发。___
A. 1
B. 2
C. 3
D. 4
【单选题】
国家赔偿义务机关在规定期限内未作出是否赔偿的决定,赔偿请求人可以自期限届满之日起____内,向人民法院提起诉讼。___
A. 2个月
B. 3个月
C. 6个月
D. 9个月
【单选题】
医疗卫生机构在对医疗废物进行登记时,可以不登记内容是____。___
A. 医疗废物种类
B. 医疗废物运行路线
C. 医疗废物交接时间
D. 医疗废物的数量
【多选题】
流动人口在现居住地享受的计划生育服务和奖励、优待包括____。___
A. 免费参加有关人口与计划生育法律知识和生殖健康知识普及活动
B. 依法免费获得避孕药具,免费享受国家规定的其他基本项目的计划生育技术服务
C. 晚婚晚育或者在现居住地施行计划生育手术的,按照现居住地省、自治区、直辖市或者较大的市的规定,享受休假等
D. 实行计划生育的,按照流动人口现居住地省、自治区、直辖市或者较大的市的规定,在生产经营等方面获得支持、优惠,在社会救济等方面享受优先照顾
【多选题】
当事人有____ 情形之一的,应当依法从轻或者减轻行政处罚。___
A. 主动消除或者减轻违法行为危害后果的
B. 受他人胁迫有违法行为的
C. 配合行政机关查处违法行为有立功表现的D.违法行为轻微并及时纠正,没有造成危害后果的
【多选题】
下列关于执业许可证校验期正确的是____。___
A. 开展产前技术诊断的《母婴保健服务执业许可证》每三年校验一次
B. 人类辅助生殖技术批准证书每2年校验一次
C. 妇幼保健院校验期为3年D.中外合资合作医疗机构检验期为2年
【多选题】
下列哪些情形行政机关应当及时作出解除查封、扣押决定?___
A. 当事人没有违法行为
B. 查封、扣押的场所、设施或者财物与违法行为无关
C. 行政机关对违法行为已经作出处理决定,不再需要查封、扣押
D. 查封、扣押期限已经届满
【多选题】
某医院医生上班时发现,本单位治疗用放射性同位素被盗,该单位应当立即启动本单位的应急方案,采取应急措施,并立即向当地____部门报告。___
A. 环境保护主管部门
B. 公安部门
C. 卫生计生主管部门
D. 财政部门
【多选题】
公共场所卫生管理档案应记载的内容包括____。___
A. 顾客用品用具的清洗、消毒、更换及检测情况
B. 公共卫生用品进货索证管理情况
C. 集中空调通风系统的清洗、消毒情况
D. 安排从业人员健康检查情况和培训考核情况
【多选题】
职业健康检查机关主检医师的职责是____。___
A. 负责确定职业健康检查项目和周期
B. 对职业健康检查过程进行质量控制
C. 审核职业健康检查报告
D. 确诊职业病例
【多选题】
下列哪些人员不得从事医师执业活动。___
A. 仅取得执业医师资格或者执业助理医师资格证的医务人员
B. 未经医师注册的医务人员
C. 注册后取得执业证书的人员
D. 取得护士资格证书人员
【多选题】
中华人民共和国公民的人格尊严不受侵犯,禁止用任何方法对公民进行____。___
A. 侮辱
B. 诽谤和诬告陷害
C. 批评
D. 控告
【单选题】
计算机病毒是一种( )。___
A. 生物病菌
B. 具有破坏性的程序
C. 有害文字
D. 有毒物质
E.
【单选题】
以( )将网络划分为广域网(WAN)、城域网(MAN)和局域网(LAN)。___
A. 接入的计算机多少
B. 接入的计算机类型
C. 拓扑类型
D. 地理范围
E.
【单选题】
局域网是将小区域范围内的计算机及各种通信设备连接在一起的通信网络。下列关于局域网特性的描述中正确的是( )___
A. 局域网具有大范围、高数据率、高误码率的特性
B. 局域网具有大范围、低数据率、低误码率的特性
C. 局域网具有小范围、高数据率、高误码率的特性
D. 局域网具有小范围、高数据率、低误码率的特性
E.
【单选题】
用户电脑的DNS设置,需进入电脑的()___
A. 网络连接
B. 宽带连接
C. 网上邻居
D. 本地连接
E.
【单选题】
常见的网络测速方法错误的()___
A. 第三方测速软件测速(如360测速)
B. http下载测速
C. 专业网站测速
D. 打开网页的时间
E.
【单选题】
关于PC防火墙的功能,以下()描述是错误的___
A. 防火墙可以检查进出内部网的通信量
B. 防火墙可以应用网关技术应用层上建立协议过滤和转发功能
C. 防火墙可以使用过滤技术在网络层对数据包进行选择
D. 防火墙可以阻止来自内部的威胁和攻击
E.
【单选题】
Internet实现了分布在世界各地的各类网络的互联,其最基础和核心的协议是( )。___
A. TCP/IP
B. FTP
C. HTML
D. HTTP
E.
【单选题】
在OSI参考模型中,传输层为( )___
A. 第2层
B. 第3层
C. 第4层
D. 第5层
E.
【单选题】
将域名转换为IP地址是由( )服务器完成的。___
A. WINS
B. DHCP
C. DNS
D. IOS
E.
【单选题】
HUB有4个端口,它的广播域和冲突域的个数分别是( )。___
A. 1和4
B. 4和4
C. 1和1
D. 4和1
E.
【单选题】
LAN Switch 工作在ISO/OSI参考模型的( )___
A. 物理层
B. 数据链路层
C. 网络层
D. 传输层
E.
【单选题】
交换机在转发数据时,主要是依据交换机内的()___
A. MAC表
B. 路由表
C. IP表
D. LLID
E.
【单选题】
桥接作用于OSI参考模型的( )。___
A. 传输层
B. 网络层
C. 数据链路层
D. 物理层
E.
【单选题】
路由器作用于OSI参考模型的( )。___
A. 传输层
B. 网络层
C. 数据链路层
D. 物理层
E.
【单选题】
路由器包装盒上的300M代表的是( );___
A. 最大无线速率
B. 最大RAM
C. 最大ROM
D. 最大有线速率
E.
【单选题】
网关比较路由器和网桥,主要区别在于( )。___
A. 网关对协议不进行转换
B. 网关的结构太复杂,不适合一般的互联网络
C. 网关能在网络高层实现各层协议转换
D. 网关不是一种硬件设备
E.
【单选题】
下列组网设备中,工作在物理层的是( )。___
A. POE交换机
B. 无线放大器
C. 分布式路由器
D. AP面板
E.
【单选题】
下列属于计算机网络协议的是( ) 。___
A. TCP/IP
B. MAP
C. V.24
D. V.35
E.
【单选题】
OSI 七层模型中,IP协议位于模型的( )___
A. 物理层
B. 网络层
C. 传输层
D. 应用层
E.
【单选题】
TeInet 在OSI参考模型( )层运作。___
A. 传输
B. 网络
C. 会话
D. 应用
E.
【单选题】
帧在OSI七层模型里,属于( )层的数据格式。___
A. 应用
B. 传输
C. 表示
D. 数据链路
E.
【单选题】
DHCP协议的功能是( )___
A. 为客户自动进行注册
B. 为客户机自动配置IP地址
C. 使DNS名字自动登录
D. 为WINS提供路由
E.
【单选题】
DNS的作用是( )___
A. 为客户机分配IP地址
B. 访问HTTP的应用程序
C. 将计算机域名翻译为IP地址
D. 将MAC地址翻译为IP地址
E.
【单选题】
ARP协议的作用是( )___
A. 将端口号映射到IP地址
B. 将MAC地址映射到IP地址
C. 广播IP地址
D. 将IP地址映射到MAC地址
E.
推荐试题
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用