刷题
导入试题
【单选题】
PO2降低,使呼吸运动增强,主要是通过___。
A. 刺激外周化学感受器
B. 刺激中枢化学感受器
C. 直接兴奋延髓呼吸中枢
D. 直接抑制延髓呼吸中枢
E. 直接兴奋脑桥呼吸调整中枢
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
H+浓度升高,使呼吸运动增强,主要是通过___。
A. 刺激外周化学感受器
B. 刺激中枢化学感受器
C. 直接兴奋延髓呼吸中枢
D. 直接抑制延髓呼吸中枢
E. 直接兴奋脑桥呼吸调整中枢
【单选题】
关于肺牵张反射的叙说,错误的是:___
A. 感受器存在于支气管和细支气管的平滑肌层
B. 可促使吸气及时转为呼气
C. 传入纤维在迷走神经中上行至延髓
D. 有明显的种族差异
E. 正常人平静呼吸时,对呼吸节律起重要调节作用
【多选题】
正常呼吸节律的形成主要依赖于___。
A. 延髓
B. 脑桥
C. 中脑
D. 脊髓
E. 大脑皮质
【单选题】
对消化道平滑肌生理特性的叙述,下列哪项错误___
A. 富有伸展性
B. 具有像心脏一样规则的自律性
C. 具有紧张性收缩
D. 兴奋性低
E. 对机械牵张刺激敏感
【单选题】
关于消化道平滑肌生理特性的叙说,正确的是:___
A. 兴奋性比骨骼肌高
B. 收缩速度较慢
C. 伸张性小
D. 对化学刺激不敏感
E. 有稳定的自发节律性
【单选题】
消化道平滑肌对下列哪种刺激反应不敏感___
A. 机械牵张
B. 电和切割
C. 温度变化
D. 酸碱等化学物质
E. 缺血和平滑肌痉挛
【单选题】
消化器官不具备下列哪种功能___
A. 消化食物
B. 内分泌
C. 免疫
D. 吸收营养
E. 维持酸碱平衡
【单选题】
消化管共有的运动形式是___
A. 紧张性收缩
B. 容受性舒张
C. 蠕动
D. 分节运动
E. 集团蠕动
【单选题】
关于消化道平滑肌基本电节律的叙说,正确的是:___
A. 胃肠各段的频率相同
B. 起步点是纵肌与环肌之间的Cajal细胞
C. 依赖于支配神经的存在
D. 不受体液因素的影响
E. 可促发肌肉收缩
【单选题】
胃肠平滑肌动作电位产生的主要离子基础是:___
A. K+内流
B. Na+内流
C. Ca2+内流
D. Cl—外流
E. K+外流
【单选题】
迷走神经兴奋时将引起___
A. 胃肠平滑肌活动增强,消化腺分泌减少
B. 胃肠平滑肌活动减弱,消化腺分泌增多
C. 胃肠平滑肌活动增强,消化腺分泌增多
D. 胃肠平滑肌活动减弱,消化腺分泌减少
E. 胃肠平滑肌活动变化不明显,消化腺分泌增多
【单选题】
副交感神经兴奋可使___
A. 胃肠运动加强
B. 胃排空减慢
C. 胆囊舒张
D. 消化腺分泌减少
E. 括约肌收缩
【单选题】
迷走神经兴奋引起胰液分泌的特点是___
A. 水多,碳酸氢盐少,胰酶含量多
B. 水和碳酸氢盐少,胰酶含量多
C. 水和碳酸氢盐多,胰酶含量少
D. 水和碳酸氢盐多,胰酶含量少
E. 水和碳酸氢盐少,胰酶含量少
【单选题】
交感神经兴奋可使___
A. 胃肠运动加强
B. 胃排空加快
C. 胆囊舒张
D. 消化腺分泌减少
E. 括约肌舒张
【单选题】
支配胃肠道的交感神经节后纤维释放的神经递质主要是:___
A. 乙酰胆碱
B. 肾上腺素
C. 去甲肾上腺素
D. 多巴胺
E. 5-羟色胺
【单选题】
消化腺细胞分泌酶原颗粒的方式是___
A. 载体中介易化扩散
B. 主动转运
C. 通道中介易化扩散
D. 单纯扩散
E. 胞吐作用
【单选题】
关于胃肠激素生理作用的叙述,下列哪项错误___
A. 调节消化道活动
B. 调节消化腺分泌
C. 促进消化道组织代谢和生长
D. 调节其它激素的释放
E. 调节小肠内营养物质的吸收
【单选题】
对胆囊收缩素生理作用的正确叙说是:___
A. 促进胆汁和胰液中水、HCO3-的分泌
B. 促进胰液中消化酶、水和HCO3-的分泌
C. 促进胆囊收缩和胰液中消化酶的分泌
D. 促进胆囊收缩和胰液中HCO3-的分泌
E. 促进胆囊收缩,抑制胃液分泌
【单选题】
引起胆囊收缩素释放作用最强的物质是:___
A. 盐酸
B. 脂酸钠
C. 蛋白质分解产物
D. 高渗溶液
E. 高渗溶液
【单选题】
关于唾液的叙述,错误的是___
A. 每天分泌量为1~1.5L
B. 具有杀菌作用
C. 能清洁和保护口腔
D. 可分解淀粉
E. 唾液呈碱性
【单选题】
在人的唾液中含有的酶是___
A. 脂肪酶
B. 肽酶
C. 蛋白酶
D. 淀粉酶和溶菌酶
E. 淀粉酶
【单选题】
唾液中的消化酶主要是:___
A. 淀粉酶
B. 溶菌酶
C. 麦芽糖酶
D. 肽酶
E. 凝乳酶
【单选题】
下列哪一项不是唾液的作用:___
A. 湿润和溶解食物
B. 清洁和保护口腔
C. 杀菌
D. 消化部分蛋白质
E. 消化部分淀粉
【单选题】
胃的特有运动形式是___
A. 紧张性收缩
B. 容受性舒张
C. 蠕动
D. 分节运动
E. 集团蠕动
【单选题】
实现胃容受性舒张的传出途径是:___
A. 交感神经
B. 迷走胆碱能神经
C. 迷走肽能神经
D. 壁内神经丛
E. 释放肠抑胃肽
【单选题】
关于胃蠕动的叙说,正确的是:___
A. 食物入胃后1分钟开始
B. 约每分钟5次
C. 约需3分钟到达幽门
D. 每次可将20~30ml食糜排入小肠
E. 迷走神经兴奋可使蠕动增强
【单选题】
食物入胃约_____分钟,胃开始蠕动。___
A. 5
B. 10
C. 15
D. 30
E. 20
【单选题】
下列因素中,哪项有促进胃运动的作用___
A. 胃泌素
B. 肠-胃反射
C. 胰泌素
D. 抑胃肽
E. 盐酸
【单选题】
胃的排空速度,正确的是___
A. 糖最快,蛋白质次之,脂肪最慢
B. 蛋白质最快,糖次之,脂肪最慢
C. 糖最快,脂肪次之,蛋白质最慢
D. 脂肪最快,蛋白质次之,糖最慢
E. 脂肪最快,糖次之,蛋白质最慢
【单选题】
混合食物由胃完全排空通常需要___
A. 1~1.5h
B. 2~3h
C. 4~6h
D. 7~8h
E. 12~24h
【单选题】
关于胃排空的叙说,错误的是:___
A. 食物入胃后5分钟开始
B. 流体食物比稠的固体食物快
C. 糖类最快,蛋白质最慢
D. 情绪兴奋时快,忧虑时慢
E. 混合食物完全排空约需4~6小时
【单选题】
下列促进胃排空的因素是___
A. 盐酸
B. 脂肪
C. 肠抑胃素
D. 高渗溶液
E. 蛋白质分解产物
【单选题】
下列哪项不参与调控胃排空速度 ___
A. 水
B. 胃泌素
C. 机械的扩张刺激
D. 内容物的渗透压
E. 进入十二指肠的酸性食糜
【单选题】
关于胃液分泌的描述,下列哪项错误___
A. 壁细胞分泌盐酸
B. 主细胞分泌胃蛋白酶原
C. 粘液颈细胞分泌粘液
D. 幽门腺细胞分泌粘液
E. 主细胞分泌内因子
【单选题】
关于胃液的叙述,错误的是___
A. 无色酸性液体
B. 每日分泌量为1.5~2.5L
C. pH为0.9~1.5
D. 包括盐酸等物质
E. 胃液呈碱性
【单选题】
下列有关胃液的生理作用,不包括:___
A. 消化蛋白质
B. 杀菌
C. 促进胰液分泌
D. 促进Ca2+、Fe2+的吸收
E. 帮助维生素B12吸收
【单选题】
胃泌素的生理作用不包括___
A. 刺激胃酸分泌
B. 促进胃运动
C. 刺激胰酶分泌
D. 促进唾液分泌
E. 促进胆汁分泌
【单选题】
刺激胃液分泌的重要物质是___
A. 去甲肾上腺素
B. 肾上腺素
C. 组胺
D. 促胰液素
E. 抑胃肽
【单选题】
激活胃蛋白酶原的物质是___
A. 肠激酶
B. 盐酸
C. 组织液
D. 胃泌素
E. 胰泌素
【单选题】
内因子促进下列哪一种物质的吸收:___
A. 铁
B. 钙
C. 维生素B 12
D. 胆盐
E. 维生素K
推荐试题
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别
【单选题】
2.刀开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
3.行程开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
4.交流接触器的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用