【单选题】
某慢性低氧血症患者出现代谢性酸中毒和高钾血症,但血压正常,分析该患者血钾增高的原因是___
A. 肾小管K+ -Na+交换减弱
B. 肾小管H+ -K+交换增强
C. 肾小管Na+重吸收减少
D. 肾小球滤过率降低
E. 近端小管K+的吸收增加
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
下列心脏病很少引起肺淤血的是___
A. 高血压性心脏病
B. 肺源性心脏病
C. 风湿性心脏病二尖瓣狭窄
D. 梅毒性心脏病
E. 冠心病
【单选题】
冠状动脉粥样硬化最常见累及的冠状动脉分支是___
A. 左旋支动脉
B. 左前降支动脉
C. 左主干动脉
D. 右主干动脉
E. 右旋支动脉
【单选题】
某患者,心悸气短,有风湿病史,近半年症状加重,查体左心界扩大,心率120次/分,胸骨左缘2-3肋间可闻及舒张期杂音,脉为水冲脉,本患者的疾病最大可能是___
A. 风湿性心脏病二尖瓣关闭不全
B. 风湿性心脏病主动脉瓣狭窄
C. 风湿性心脏病主动脉瓣关闭不全
D. 风湿心脏病二尖瓣狭窄
E. 三尖瓣狭窄
【单选题】
关于暴发型流脑,下述哪项是错误的___
A. 高热、头痛伴呕吐
B. 常见周围循环衰竭
C. 皮肤黏膜广泛淤点淤斑
D. 蛛网膜下腔大量脓细胞
E. 双侧肾上腺出血
【单选题】
脑血栓形成最常发生于下列哪条动脉___
A. 大脑前动脉
B. 颈内动脉
C. 大脑中动脉
D. 大脑后动脉
E. 椎基底动脉
【单选题】
大脑中动脉皮层支闭塞后引起的对侧偏瘫有什么特点___
A. 不伴有颅神经瘫痪
B. 偏瘫以下肢为重
C. 为均等性轻偏瘫
D. 偏瘫以下肢较轻
E. 上下肢均为0级瘫
【单选题】
30岁男性,劳动中突然剧烈头痛、呕吐,一度意识不清,醒后颈枕部痛,右侧眼睑下垂,右瞳孔大、颈强,克氏征阳性。最可能的诊断是___
A. 急性脑膜炎
B. 脑出血、脑疝
C. 小脑出血
D. 脑干出血
E. 蛛网膜下腔出血
【单选题】
高渗性缺水的早期主要症状是___
A. 幻觉
B. 谵妄
C. 恶心
D. 口渴
E. 心悸
【单选题】
高渗性缺水,其体液变化之最终表现是___
A. 细胞外液缺水
B. 细胞内液缺水
C. 细胞内液缺水超过细胞外液缺水
D. 细胞内外液等量缺水
E. 细胞外液缺水超过细胞内液缺水
【单选题】
等渗性缺水短期内出现血容量明显不足时,提示体液丧失超过体重的___
A. 3%
B. 3.5%
C. 4%
D. 4.5%
E. 5%
【单选题】
低血钾影响神经、肌肉系统时,最突出的部位是___
A. 呼吸肌
B. 腹肌
C. 四肢肌
D. 膈肌
E. 背部肌
【单选题】
决定心肌微循环灌注量的主要因素是___
A. 动脉收缩压
B. 动脉舒张压
C. 外周血管阻力
D. 心脏每搏量
E. 心肌收缩力
【单选题】
ARDS最早期的症状是___
A. 呼吸加快窘迫感
B. 明显呼吸困难
C. 病人发绀
D. 呼吸道分泌物增多
E. 肺部听诊有罗音
【单选题】
判断烧伤创面深度的主要依据是___
A. 创面的肿胀程度
B. 创面有无水疱
C. 创面疼痛情况
D. 创面渗出情况
E. 创面残存上皮的有无和多少
【单选题】
大面积烧伤早期发生的休克,多为___
A. 神经源性休克
B. 心源性休克
C. 低血容量休克
D. 过敏性休克
E. 感染性休克
【单选题】
成人,体重60kg,烧伤面部、胸、腹部、两前臂、两手及两小腿和足部,烧伤总面积为___
A. 47%
B. 48%
C. 49%
D. 50%
E. 51%
【单选题】
施行口对口人工呼吸时,操作者深吸气后用力吹气时,吹出气中氧浓度是___
A. 5%
B. 10%
C. 15%
D. 16%
E. 18%
【单选题】
心跳呼吸停止后,最容易出现的继发性病理改变是___
A. 肾小管坏死
B. 心肌损坏
C. 脑缺血缺氧性改变
D. 肺水肿
E. 肝坏死
【单选题】
脑复苏时,为防止脑水肿发生不可逆损伤,脑循环血量最低应保持在___
A. 25%
B. 20%
C. 15%
D. 10%
E. 5%
【单选题】
治疗高血钾引起的心跳停止,最佳选用___
A. 阿托品
B. 肾上腺素
C. 溴苄胺
D. 氯化钙
E. 氯化钾
【单选题】
腹部闭合性损伤中,较多见的实质性脏器损伤为哪一项___
A. 肝
B. 肾
C. 脾
D. 肾上腺
E. 胰
【单选题】
腹部最易损伤的空腔脏器是___
A. 结肠
B. 胃
C. 小肠
D. 直肠
E. 十二指肠
【单选题】
一患者诊断为胃十二指肠溃疡急性穿孔,在送往医院途中,患者体位应为___
A. 平卧位
B. 左侧卧位
C. 俯卧位
D. 右侧卧位
E. 半卧位
【单选题】
溃疡病合并瘢痕性幽门梗阻,频繁呕吐,最易出现___
A. 代谢性酸中毒
B. 代谢性碱中毒
C. 低镁血症
D. 低钙血症
E. 高渗性脱水
【单选题】
最易引起嵌顿的疝是___
A. 切口疝
B. 股疝
C. 脐疝
D. 腹股沟直疝
E. 腹股沟斜疝
【单选题】
滑动疝最易发生的部位是___
A. 外伤处
B. 小网膜孔
C. 脐血管穿过的脐环
D. 髂窝区后腹膜与后腹壁结合处
E. 愈合不良的手术切口
【单选题】
单纯空腔器官梗阻的腹痛特点___
A. 持续性腹痛
B. 阵发性腹痛
C. 持续性痛阵发性加重
D. 持续性痛伴腹泻
E. 阵发性痛伴发热
【单选题】
哪项不是炎症性急腹症的特点___
A. 腹痛由轻转重
B. 持续性腹痛
C. 病变部位有固定压痛
D. 腹膜刺激征局限于病变局部
E. 腹膜炎范围不随病变加重而扩展
【单选题】
女性,30岁,农民,2小时前劳动中无明显诱因突然上腹刀割样疼痛,迅速波及全腹,不敢直腰,肝浊音界消失,舟状腹,有腹膜刺激征,应诊断为___
A. 阑尾炎穿孔,弥漫性腹膜炎
B. 宫外孕破裂
C. 溃疡病穿孔
D. 绞窄性肠梗阻
E. 急性出血性腹膜炎
【单选题】
肠梗阻的四大共同表现___
A. 腹痛,肠型,呕吐,便闭
B. 便闭,呕吐,腹胀,腹痛
C. 便闭,腹痛,腹胀,肠音亢进
D. 便闭,腹痛,肠音减弱,腹胀
E. 腹痛,便闭,肠型,腹胀
【单选题】
急性腹膜炎腹痛的特点___
A. 疼痛阵发加剧
B. 病人转侧不安 
C. 指不出确切部位
D. 原发病灶处最著
E. 解大便后减轻
【单选题】
胆管结石和急性胆管炎急性发作的典型症状是___
A. 腹痛,呕吐,寒热
B. 腹痛,呕吐,黄疸
C. 腹痛,黄疸,腹泻
D. 腹痛,腹胀,昏迷
E. 腹痛,黄疸,寒热
【单选题】
上消化道出血的病人,伴有发热及右上腹痛,就考虑___
A. 胃十二指肠溃疡病
B. 门脉高压症
C. 出血性胃炎
D. 胃癌
E. 胆道出血
【单选题】
急性胰腺炎病人中,呕吐后疼痛可___
A. 减轻
B. 缓解
C. 加重
D. 消失
E. 不减轻
【单选题】
肋骨骨折最常见于___
A. 1~3肋
B. 4~7肋
C. 8~10肋
D. 11~12肋
E. 肋弓
【单选题】
张力性气胸产生休克,急救措施首先是___
A. 输血
B. 用升压药
C. 抗休克同时开胸探查
D. 患侧胸腔排气减压
E. 气管插管辅助呼吸
【单选题】
男性,33岁,右胸车祸伤1小时,呼吸困难,发绀。查体:脉搏130次/分,血压76/50mmHg,右前胸可及皮下气肿,右胸叩鼓音,右肺呼吸音消失,最可能的诊断是___
A. 张力性气胸
B. 闭合性气胸
C. 创伤性血胸
D. 创伤性休克
E. 多发性肋骨骨折
【单选题】
肱骨中下1/3骨折,最易发生的并发症是___
A. 肱动脉损伤
B. 正中神经损伤
C. 尺神经损伤
D. 桡神经损伤
E. 肱二头肌断裂
【单选题】
497,伸直型肱骨髁上骨折的断端最常见的移位方向是___
A. 远折端向后移位
B. 近折端向后移位
C. 远折端向前移位
D. 近折端向桡侧移位
E. 近折端向尺侧移位
【单选题】
肱骨髁上骨折,最易损伤___
A. 肱二头肌
B. 肱三头肌
C. 肱动、静脉
D. 肌皮神经
E. 桡神经
推荐试题
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers