刷题
导入试题
【单选题】
最迟长出的恒牙是 ___
A. :第一磨牙
B. :第二磨牙
C. :第三磨牙
D. :尖牙
E. :切牙
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
不属于实质性器官的是 ___
A. :肝
B. :肾
C. :膀胱
D. :肺
E. :胰
【单选题】
桡神经沟位于 ___
A. :肩胛骨
B. :肱骨
C. :桡骨
D. :尺骨
E. :以上都不是
【单选题】
属于牙周组织的是 ___
A. :牙釉质
B. :牙骨质
C. :牙髓
D. :牙龈
E. :以上都不是
【单选题】
胃溃疡好发于 ___
A. :贲门
B. :胃底
C. :胃体
D. :幽门部
E. :胃大弯
【单选题】
关于胃的描述,正确的是 ___
A. :胃大部分位于腹上区
B. :贲门部是溃疡和癌症的好发部位
C. :幽门约在第1腰椎体右侧
D. :幽门窦位于幽门管的右侧
E. :临床上所说的“胃窦”为贲门部
【单选题】
口腔与咽的分界 ___
A. :腭垂
B. :腭舌弓
C. :腭咽弓
D. :咽峡
E. :咽扁桃体
【单选题】
关于肛管的描述,正确的是 ___
A. :长约25cm
B. :内有多条纵行的粘膜皱襞,称肛瓣
C. :各肛柱的下端与肛瓣的边缘连结成齿状线
D. :肛门内、外括约肌均为平滑肌
E. :齿状线以上为皮肤
【单选题】
关于直肠的描述,正确的是 ___
A. :长约25cm
B. :位于盆部的前部
C. :在矢状面有两个弯曲,骶曲凸向前
D. :直肠下部显著扩大,称为直肠壶腹
E. :男性直肠前方有膀胱、前列腺和附睾
【单选题】
麦氏点位于 ___
A. :脐与右髂前上棘连线的中、外1/3交点处
B. :右锁骨中线与肋弓交点处的稍下方
C. :左、右髂结节连线的中点
D. :脐与右髂前上棘连线的内、中1/3交点处
E. :以上都不对
【单选题】
空肠和回肠的区别中,回肠的特点是 ___
A. :回肠主要位于左上腹
B. :回肠与十二指肠相接
C. :回肠的皱襞高而密
D. :回肠管径较粗,管壁较厚
E. :回肠血管较少,外观呈粉灰色
【单选题】
食管的第二个狭窄距离中切牙约 ___
A. :15cm
B. :25cm
C. :35cm
D. :45cm
E. :10cm
【单选题】
关于胃的描述,错误的是 ___
A. :胃在中等充盈时,大部分位于腹上区
B. :胃的入口为贲门,出口为幽门
C. :贲门平面向左上方凸出的部分为胃底
D. :胃溃疡多发生在胃小弯近幽门处
E. :胃小弯的最低点为角切迹
【单选题】
关于舌肌的描述,正确的是 ___
A. :舌肌是平滑肌
B. :颏舌肌是舌内肌
C. :左侧颏舌肌收缩,伸舌时舌尖偏向左侧
D. :左侧颏舌肌收缩,伸舌时舌尖偏向右侧
E. :以上都不对
【单选题】
大肠不包括 ___
A. :回肠
B. :盲肠
C. :阑尾
D. :结肠
E. :直肠
【单选题】
具有结肠带、结肠袋和肠脂垂的是 ___
A. :盲肠和结肠
B. :回肠和盲肠
C. :结肠和直肠
D. :空肠和回肠
E. :以上都不是
【单选题】
关于小肠的描述,错误的是 ___
A. :全长5-7米
B. :分空肠和回肠两部分
C. :上接幽门,下续盲肠
D. :空肠主要位于左上腹
E. :回肠主要位于右下腹
【单选题】
十二指肠球部位于 ___
A. :上部
B. :降部
C. :水平部
D. :升部
E. :以上都不是
【单选题】
十二指肠大乳头位于 ___
A. :十二指肠上部
B. :十二指肠降部
C. :十二指肠水平部
D. :十二指肠升部
E. :以上都不是
【单选题】
胃的分部不包括 ___
A. :贲门部
B. :胃底
C. :胃体
D. :幽门部
E. :角切迹
【单选题】
下消化道的起始部 ___
A. :幽门
B. :十二指肠球部
C. :空肠
D. :回肠
E. :盲肠
【单选题】
属于上消化道的是 ___
A. :十二指肠
B. :空肠
C. :回肠
D. :喉口
E. :盲肠
【单选题】
肝的基本结构和功能单位 ___
A. :肝细胞
B. :肝血窦
C. :肝管
D. :肝小叶
E. :肝总管
【单选题】
关于胰的描述,错误的是 ___
A. :是人体第二大消化腺
B. :由外分泌部和内分泌部组成
C. :前方有胃、后方有下腔静脉
D. :可分头、体、尾3部分
E. :外分泌部又称胰岛
【单选题】
关于胆总管的描述,不正确的是 ___
A. :走在肝十二指肠韧带内
B. :下降于十二指肠与胰头之间
C. :斜穿十二指肠降部后内侧壁
D. :胆总管直接开口于十二指肠小乳头
E. :与胰管汇合成肝胰壶腹
【单选题】
关于肝的描述,正确的是 ___
A. :膈面借冠状韧带分为左,右两叶
B. :左侧纵沟前部为胆囊
C. :右侧纵沟前部为下腔静脉
D. :横沟又称肝门
E. :静脉韧带是脐静脉闭锁后的遣迹
【单选题】
关于肝的描述,错误的是 ___
A. :肝是人体最大的腺体
B. :质软而脆,受暴力打击易破裂出血
C. :肝大部分位于左季肋区和腹上区,小部分位于右季肋区
D. :7岁以前的小儿,肝的体积相对较大
E. :肝门静脉是肝的功能性血管
【单选题】
胆囊三角(Calot三角)的境界是 ___
A. :胆囊管、肝总动脉及肝脏下面
B. :胆囊管、肝总管和肝脏下面
C. :肝总动脉、胆总管及肝脏下面
D. :肝门静脉、胆总管及肝脏下面
E. :以上都不是
【单选题】
关于胆囊的描述,正确的是 ___
A. :分泌并贮存胆汁
B. :位于肝左叶的下方
C. :胆囊底的体表投影位于右锁骨中线与右肋弓交点的稍下方
D. :属于腹膜内位器官
E. :以上都不对
【单选题】
胆汁产生的部位 ___
A. :肝血窦
B. :胆小管
C. :胆囊
D. :肝细胞
E. :以上都不是
【单选题】
胆汁排放途径不包括 ___
A. :肝左管
B. :肝右管
C. :肝总管
D. :胆总管
E. :胰管
【单选题】
肝的上界在右锁骨中线处平对 ___
A. :第6肋
B. :第7肋
C. :第5肋
D. :第4肋
E. :第8肋
【单选题】
进出肝门的结构不包括 ___
A. :肝固有动脉
B. :肝门静脉
C. :肝左、右管
D. :肝静脉
E. :神经和淋巴管
【单选题】
关于胰的描述,错误的是 ___
A. :由内分泌部和外分泌部构成
B. :胰位于胃的后方
C. :胰分为胰头、胰体和胰尾三部分
D. :胰头被十二指肠环抱
E. :胰尾伸向肝门
【单选题】
肝外胆道不包括 ___
A. :肝左、右管
B. :胆小管
C. :肝总管
D. :胆总管
E. :胆囊管
【单选题】
由上皮和固有层共同向肠腔形成的突起,称为 ___
A. :绒毛
B. :纤毛
C. :微绒毛
D. :皱襞
E. :以上都不是
【单选题】
由粘膜和部分粘膜下层共同向肠腔形成的突起,称为 ___
A. :绒毛
B. :微绒毛
C. :皱襞
D. :纤毛
E. :以上都不是
【单选题】
消化管壁的四层结构,由内向外依次为 ___
A. :粘膜、粘膜肌层、肌层和外膜
B. :粘膜、粘膜下层、肌层和外膜
C. :粘膜、粘膜肌层、粘膜下层和外膜
D. :粘膜、固有层、肌层和外膜
E. :以上都不是
【单选题】
损伤后可引起大便失禁的结构 ___
A. :齿状线
B. :直肠横襞
C. :肛直肠环
D. :肛瓣
E. :肛柱
【单选题】
小肠腺特有的细胞 ___
A. :柱状细胞
B. :杯状细胞
C. :潘氏细胞
D. :淋巴细胞
E. :巨噬细胞
【单选题】
不属于胰岛细胞分泌的激素 ___
A. :胰岛素
B. :胰高血糖素
C. :胰多肽
D. :胰蛋白酶
E. :生长抑素
推荐试题
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用