相关试题
【单选题】
含有布氏姜片吸虫囊蚴的水生植物称为:___
A. 第一中间宿主
B. 第二中间宿主
C. 转续宿主
D. 媒介植物
E. 保虫宿主
【单选题】
下列有关并殖吸虫生活史的描述哪项是错误的:___
A. 虫体寄居于人体的肺及多个脏器组织
B. 需二个中间宿主
C. 第二中间宿主是溪蟹,蝲蛄
D. 感染阶段是尾蚴
E. 有多种保虫宿主
【单选题】
某农场发生暴发性钩虫性哮喘,可能与他们进行下列哪种活动有关?___
A. 水田耕作
B. 玉米地除草
C. 下河捕鱼
D. 生食菱角
E. 食用未煮熟的淡水鱼
【单选题】
蛔虫病患者如得不到彻底治疗,可能发生下列并发症,其中哪一条除外?___
A. 胆道蛔虫病
B. 蛔虫性肠梗阻
C. 蛔虫性阑尾炎
D. 肠穿孔
E. 蛔虫性哮喘
【单选题】
稻田皮炎是由于感染了:___
A. 丝虫感染性幼虫
B. 钩虫感染性幼虫
C. 日本血吸虫尾蚴
D. 犬钩虫幼虫
E. 禽类或畜类血吸虫尾蚴
【单选题】
下列哪项不是钩虫引起宿主贫血的原因:___
A. 虫体活动造成的组织或血管损伤
B. 钩虫吸血时分泌抗凝血物质
C. 宿主脾功能亢进
D. 频繁更换咬附部位,使伤口慢性失血
E. 钩虫吸血后血液又迅速经其消化道排出
【单选题】
蛔虫卵对外界环境抵抗力强的原因是:___
A. 卵壳厚
B. 具有蛋白质膜
C. 具有受精膜
D. 具有壳质层
E. 具有蛔甙层
【单选题】
下列线虫寄生人体时,除哪项外都有血内移行阶段:___
A. 蛔虫
B. 钩虫
C. 鞭虫
D. 丝虫
E. 旋毛虫
【单选题】
人误食新鲜粪便污染了的食物可能感染:___
A. 蛔虫
B. 溶组织内阿米巴
C. 丝虫
D. 钩虫
E. 鞭虫
【单选题】
线虫生长发育最显著的特征是:___
A. 生殖器官发育成熟
B. 蜕皮
C. 子宫产卵
D. 幼虫移行后发育为成虫
E. 需氧代谢转变为厌氧代谢
【单选题】
可引起眼部病变的寄生虫是:___
A. 丝虫
B. 杜氏利什曼原虫
C. 结膜吸吮线虫
D. 钩虫
E. 蓝氏贾第鞭毛虫
【单选题】
下列不属于虫媒病的是:___
A. 丝虫病
B. 疟疾
C. 疥疮
D. 登革热
E. 鼠疫
【单选题】
幼虫期不侵犯人体肺部的寄生虫是:___
A. 钩虫
B. 肺吸虫
C. 蛔虫
D. 姜片虫
E. 血吸虫
【单选题】
需在夜间取材进行病原学检查的寄生虫是:___
A. 蛲虫
B. 肝吸虫
C. 鞭虫
D. 丝虫
E. 杜氏利什曼原虫
【单选题】
下列哪种寄生虫感染引起的腹泻常被称为“旅游者腹泻”?___
A. 杜氏利什曼原虫
B. 姜片虫
C. 蓝氏贾第鞭毛虫
D. 溶组织阿米巴
E. 血吸虫
【单选题】
下列寄生虫的感染方式哪项是错误的? ___
A. 姜片吸虫---生食或半生食淡水螺类
B. 血吸虫---接触疫水
C. 蛔虫---误食感染期卵
D. 旋毛虫---生食或半生食含幼虫的动物肉类
E. 蛲虫---食入或吸入感染期卵
【单选题】
对寄生部位描述正确的是:___
A. 杜氏利什曼原虫无鞭毛体-红细胞
B. 溶组织内阿米巴滋养体-巨噬细胞
C. 曼氏裂头蚴-肠道
D. 旋毛虫幼虫-淋巴液
E. 蛲虫成虫-盲肠
【单选题】
需在清晨起床后立即取材进行病原学检查的是:___
A. 丝虫病
B. 血吸虫病
C. 蛲虫病
D. 疟疾
E. 弓形虫病
【单选题】
人既可以作为终宿主,又可作为中间宿主的寄生虫是:___
A. 曼氏迭宫绦虫
B. 牛带绦虫
C. 肝片形吸虫
D. 卫氏并殖吸虫
E. 肝吸虫
【单选题】
只能以人为终宿主的寄生虫是:___
A. 弓形虫
B. 猪带绦虫
C. 曼氏迭宫绦虫
D. 细粒棘球绦虫
E. 丝虫
【单选题】
下列不属食源性寄生虫的是:___
A. 血吸虫
B. 旋毛虫
C. 曼氏迭宫绦虫
D. 弓形虫
E. 肺吸虫
【单选题】
下列哪项不是寄生虫病的特点:___
A. 隐性感染
B. 中性粒细胞升高
C. 多寄生现象
D. 异位寄生
E. 慢性感染
【单选题】
在粪便中可查到幼虫的寄生虫是:___
A. 旋毛虫
B. 粪内圆线虫
C. 钩虫
D. 蛔虫
E. 蛲虫
【单选题】
日本血吸虫在人体常见的异位损害部位为:___
A. 肺和脑
B. 肝和肾
C. 肠壁和肾
D. 肝和肠壁
E. 皮肤和眼
【单选题】
广州管圆线虫的中间宿主为:___
A. 钉螺或拟钉螺
B. 纹召螺和川卷螺
C. 扁卷螺和豆螺
D. 褐云玛瑙螺、福寿螺和蛞蝓
E. 以上种类都可
【单选题】
结膜吸吮线虫病的确诊依据是患者的:___
A. 症状和体征
B. 眼分泌物涂片检查虫卵
C. 眼分泌物涂片检查虫体
D. 检测血清抗体
E. 检测血清抗原
【单选题】
患者系输血感染疟疾,治疗宜服用:___
A. 氯喹
B. 伯氨喹啉
C. 伯氨喹啉+氯喹
D. 乙胺嘧啶
E. 伯氨喹啉+青蒿素
【单选题】
治疗黑热病的特效药是:___
A. 抗生素
B. 氯喹
C. 吡喹酮
D. 乙胺嘧啶
E. 葡萄糖酸锑钠
【单选题】
我国长江以北地区没有血吸虫病的流行主要是因为___
A. 河流少
B. 无传染源
C. 人群抵抗力强
D. 无钉螺
【单选题】
疟原虫的主要致病时期是___
A. 红细胞外期裂殖体
B. 红细胞内期无性体
C. 红细胞内期配子体
D. 子孢子
【单选题】
在人体肝胆管内寄生的寄生虫是___
A. 丝虫
B. 旋毛虫
C. 华支睾吸虫
D. 钩虫
【单选题】
目前,治疗阿米巴病的首选药物是___
A. 海群生
B. 丙硫咪唑
C. 吡喹酮
D. 甲硝唑
【单选题】
蛔虫感染人体的主要途径是___
A. 经皮肤
B. 经口
C. 经呼吸道
D. 经媒介昆虫叮咬
【单选题】
生活史中只有滋养体期的寄生原虫是___
A. 阴道毛滴虫
B. 蓝氏贾地鞭毛虫
C. 弓形虫
D. 杜氏利什曼原虫
【单选题】
在外界环境中,虫卵抵抗力最强的寄生虫是___
A. 蛔虫
B. 猪带绦虫
C. 鞭虫
D. 血吸虫
【单选题】
感染期的定义是___
A. 寄生虫感染宿主的阶段
B. 寄生虫感染终宿主的阶段
C. 寄生虫感染人体的阶段
【单选题】
寄生虫的幼虫阶段疟原虫在人体内发育繁殖,经何种生殖方式:___
A. 二分裂法
B. 裂体增殖
C. 孢子增殖
D. 配子生殖
E. 接合生殖
【单选题】
疟疾的传染源是:___
A. 血中有裂殖体的人
B. 血中有配子体的人
C. 肝中有迟发型子孢子的人
D. 肝中有速发型子孢子的人
E. 以上都不是
【单选题】
人体感染猪囊虫病是由于误食了:___
A. 似囊尾蚴
B. 囊尾蚴
C. 裂头蚴
D. 原尾蚴
E. 虫卵
【单选题】
某些寄生虫的感染期,被非正常宿主吞食后,孵出的幼虫虽可在这种非正常宿主体内长期生活,但不能发育为成虫,这种非正常宿主称为:___
A. 终宿主
B. 中间宿主
C. 保虫宿主
D. 转续宿主
E. 贮存宿主
推荐试题
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion