刷题
导入试题
【单选题】
二尖瓣面容的典型临床表现是:___
A. 双颊紫红,口唇轻度发绀
B. 面色苍白,颜面浮肿
C. 面色潮红,鼻翼扇动
D. 面色潮红,口唇苍白
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
临床上对于婴幼儿及神志不清者,常选择以下哪种体温测量法 ?___
A. 肛测法或腋测法
B. 口测法或腋测法
C. 口测法
D. 肛测法
【单选题】
有关体温测定下列哪项不正确 ?___
A. 正常肛温比口温高0.3 ~ 0.5℃
B. 腋温应测10分钟
C. 正常腋温36 ~ 37℃
D. 正常口腔温度36.5 ~ 37.5℃
【单选题】
皮下出血直径1 mm 称为:___
A. 瘀斑
B. 斑疹
C. 瘀点
D. 丘疹
【单选题】
皮下出血直径4 mm 称为:___
A. 瘀斑
B. 丘疹
C. 瘀点
D. 紫癜
【单选题】
某青年女性,双下肢散在的暗红色或鲜红色点状改变,压之不腿色,直径2mm左右,不凸出皮面,应诊断为___
A. 瘀斑
B. 紫癜
C. 红痣
D. 瘀点
【单选题】
发热的机理是:___
A. 最常见的是外源性致热源与细菌共同作用与体温调节中枢的结果
B. 最常见的是内源性致热源所致
C. 最常见的是外源性致热源所致
D. 是细菌或病毒产生的内源性致热源所致
【单选题】
慢性进行性头痛伴有呕吐,提示:___
A. 神经官能症
B. 蛛网膜下腔出血
C. 颅内占位
D. 血管性头痛
【单选题】
患者,38岁,男性,突然出现剧烈头痛、呕吐及抽搐,查体:体温、血压正常,脑膜刺激征(+),该患者最可能的诊断是:___
A. 脑血栓形成
B. 高血压脑病
C. 蛛网膜下腔出血
D. 偏头痛
【单选题】
下列哪项是引起头痛的颅外病变 ? ___
A. 脑震荡
B. 颅骨肿瘤
C. 脑栓塞
D. 脑膜炎
【单选题】
下列关于腹泻的定义,错误的是:___
A. 腹泻指粪便稀薄
B. 腹泻是指粪便稀薄并常有不消化的食物
C. 是指排便次数增加
D. 腹泻是指每天排便超过两次
【单选题】
关于便秘的发生机制,下列说法错误的是:___
A. 肠道内肌肉张力减低
B. 肠蠕动受阻碍
C. 膈肌收缩力增强
D. 摄入食物过少或纤维水分不足
【单选题】
粪便外带鲜血,表示出血可能在:___
A. 回盲部
B. 上消化道
C. 小肠
D. 乙状结肠
【单选题】
阿米巴痢疾的大便性状为:___
A. 暗红色果酱样脓血便
B. 粘液性脓性鲜血便
C. 柏油样便
D. 洗肉水样血便
【单选题】
下列疾病引起的便秘属于功能性便秘的是:___
A. 尿毒症
B. 应用吗啡类药物
C. 血卟啉病
D. 甲状腺功能低下
【单选题】
上消化道大出血的特点,不正确的是:___
A. 呕血常为咖啡色
B. 出血后可有发热及氮质血症
C. 定有呕血
D. 定有黑便
【单选题】
恶心时是由于:___
A. 十二指肠张力减弱
B. 胃窦部持续收缩
C. 胃张力增高
D. 胃张力和蠕动减弱
【单选题】
以下哪个选项引起的呕吐属于中枢性呕吐 ?___
A. 幽门梗阻
B. 急性腹膜炎
C. 剧烈咳嗽
D. 抗癌药物
【单选题】
食管癌时的主要症状是:___
A. 主要是动力性咽下困难,可伴随机械性咽下困难
B. 只存在动力性咽下困难
C. 只存在机械性咽下困难
D. 主要是机械性咽下困难,可伴随动力性咽下困难
【单选题】
血尿伴剧烈腹痛最常见于:___
A. 膀胱结石
B. 肾小球肾炎
C. 泌尿系结石
D. 肾肿瘤
【单选题】
少尿是指24小时尿量小于:___
A. 1200 ml
B. 800 ml
C. 400 ml
D. 100 ml
【单选题】
对慢性腰肌劳损描述不正确的是:___
A. 伸腰时疼痛加剧
B. 体查无特殊阳性体征
C. 长时间弯腰劳动腰痛加重
D. 腰部酸痛长期存在
【单选题】
对脊柱结核描述错误的是:___
A. 起病隐匿,腰背痛活动时加重,休息后减轻,夜间痛加重
B. 不合并脊柱畸形
C. 疼痛可沿脊柱神经放射至下腹部、臀部、大腿前方等部位
D. 同时伴有低热、倦怠无力、盗汗、消瘦等全身中毒症状
【单选题】
关节痛呈游走性,伴心脏炎、舞蹈病见于:___
A. 系统性红斑狼疮
B. 结核
C. 风湿热
D. 类风湿
【单选题】
腰背痛伴发热、气促、咳嗽时加重等,最可能的疾病是:___
A. 急性胆囊炎
B. 胸膜炎
C. 支气管扩张
D. 肺结核
【单选题】
下列哪项不是椎间盘突出的临床特点 ?___
A. 仅有腰痛无坐骨神经痛
B. 可突发和缓解起病
C. 青壮年多见
D. 腰骶多发
【单选题】
患者,女性,38岁,双手小关节疼痛5年,检查发现双手指间关节肿胀,呈梭形状,关节活动受限。该患者最可能患有:___
A. 指间关节积液
B. 指骨结核
C. 进行性肌萎缩
D. 类风湿关节炎
【单选题】
关于呼吸困难的描述哪项是错误的?___
A. 严重的吸气性呼吸困难时患者会出现“三凹征”
B. 慢性阻塞性肺气肿病人常出现呼气性呼吸困难
C. 吸气性呼吸困难时出现哮鸣音
D. 呼气性呼吸困难表现为呼气时间延长
【单选题】
咳嗽与咳痰疾病中,下列最常见的疾病是:___
A. 呼吸道疾病
B. 中枢神经系统疾病
C. 消化系统疾病
D. 心血管疾病
【单选题】
慢性支气管炎患者的痰液常为:___
A. 棕红色
B. 分层现象
C. 有恶臭味
D. 白色粘痰
【单选题】
下列哪种疾病最可能出现呼气性呼吸困难 ?___
A. 吗啡中毒
B. 主支气管狭窄
C. 支气管哮喘
D. 一氧化碳中毒
【单选题】
咳嗽与咳痰中,下列错误的是:___
A. 咳痰是一种病态现象
B. 咳嗽也属于一种病理现象
C. 咳嗽是一种保护性反射动作
D. 胸膜疾病和心血管疾病不会出现咳嗽现象
【单选题】
患者咳嗽,咳大量脓痰,静置后痰液出现分层,应首先考虑:___
A. 肺水肿
B. 肺炎
C. 肺梗死
D. 肺脓肿
【单选题】
下列关于咯血的概念正确的是:___
A. 经口腔排出的血,必须鉴别是咯血还是呕血
B. 牙龈、口腔粘膜出血,不属于咯血
C. 鼻腔后部出血,经后鼻孔沿咽后壁下流,从口腔排出,也称咯血
D. 咯血是指喉及喉以下呼吸道任何部位的出血,经口排出者
【单选题】
呕血最常见的原因是:___
A. 消化性溃疡
B. 钩端螺旋体病
C. 食管癌
D. 胃底、食管静脉曲张破裂
【单选题】
咯血的特点不正确的是:___
A. 血色鲜红
B. 咯血前有咳嗽、喉部痒感
C. 痰中带血
D. 咯出物为酸性反应
【单选题】
上消化道出血伴慢性、节律性、周期性上腹痛,诊断考虑为:___
A. 反流性食管炎
B. 急性胃粘膜病变
C. 食管静脉曲张破裂
D. 消化性溃疡
【单选题】
下列哪一种疾病能引起咯血 ?___
A. 胆结石
B. 浅表性胃炎
C. 左心衰竭
D. 消化性溃疡
【单选题】
关于意识障碍的错误说法是:___
A. 意识障碍还包含情感活动异常、无意识动作增加
B. 意识障碍简要分为嗜睡、意识模糊、昏睡、昏迷及谵妄
C. 意识障碍即昏迷或昏睡
D. 意识障碍也可表现为语言表达能力失常
【单选题】
程度最轻的意识障碍为:___
A. 嗜睡
B. 意识模糊
C. 昏睡
D. 浅昏迷
【单选题】
下列关于黄染的叙述,哪项是不正确的 ?___
A. 阿的平所致的巩膜黄染,首先出现在角膜周围
B. 球结膜下脂肪积聚,往往分布不均匀
C. 胡萝卜血症可引起巩膜黄染,皮肤不黄
D. 胡萝卜血症可引起皮肤黄染,巩膜不黄
推荐试题
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用