【单选题】
在设计视力表时,考虑判断人眼视力高低的标准是___
A. 人眼所能看清楚的物体大小
B. 视网膜中央凹处最小的清晰像大小
C. 视网膜中央凹以外最小的清晰像大小
D. 人眼能看清楚的物体的距离
E. 视杆细胞的直径
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
下列关于正常人眼调节的叙述,正确的是___
A. 视远物时需调节才能清晰成像于视网膜
B. 晶状体变凸有助于消除球面像差和色像差
C. 瞳孔缩小可避免强光对视网膜的有害刺激
D. 双眼球会聚可避免复视而形成单视视觉
E. 调节能力随年龄的增长而得到加强
【单选题】
声波由鼓膜经听骨链传向卵圆窗时出现的振动变化是___
A. 幅度增大,压强增大
B. 幅度减小,压强减小
C. 幅度增大,压强减小
D. 幅度减小,压强增大
E. 声压增高,振幅增大
【单选题】
按照行波理论,低频振动(低音调)___
A. 只引起耳蜗顶部基底膜发生振动
B. 只引起耳蜗底部基底膜发生振动
C. 是整个基底膜均有振动,振幅大小相同,终止于顶部
D. 首先引起耳蜗底部基底膜振动,振幅逐渐增大,近顶端达到到最大振幅
E. 首先引起耳底部基底膜振动,开始较大而后逐渐减小,近顶端处逐渐消失
【单选题】
蜗管内淋巴正电位的形成和维持主要依靠___
A. 毛细胞顶膜钠泵的活动
B. 蜗管外侧壁血管纹活动
C. 基底膜支持细胞的活动
D. 基底膜的上下位移
E. 前庭膜的上下位移
【单选题】
69,一侧听觉传入通路在上橄榄核以上损伤的结果是___
A. 同侧听力障碍,对侧听力增强
B. 对侧听力障碍,同侧听力增强
C. 同侧听力障碍,对侧听力正常
D. 对侧听力障碍,同侧听力正常
E. 双侧听力均无明显障碍
【单选题】
冷水进人一侧耳内,可引起下列哪一变化,从而导致出现头晕和恶心等植物性功能改变___
A. 冷却了耳石器官
B. 壶腹嵴的运动减弱
C. 前庭传入神经放电增加
D. 前庭传入神经放电减少
E. 内淋巴液流动
【单选题】
73关于脊休克的描述,不正确的是___
A. 脊休克的产生不是由于切断损伤刺激本身引起的
B. 脊休克后脊髓反射可逐渐恢复再次切断脊髓会再引起脊休克
C. 脊休克的产生与恢复说明脊髓能完成某些简单的反射
D. 产生与恢复说明高位中枢易化伸肌反射、抑制屈肌反射
E. 脊休克发生时脊髓反射减弱或消失
【单选题】
75有思想准备情况下做膝跳反射,受试者膝跳反射会减弱原因是___
A. 高级中枢对低级中枢的调节作用
B. 反射弧发生变化
C. 传出神经受阻
D. 感受器受到抑制
E. 传入信号减少
【单选题】
腱器官传入冲动增加所引起的效应是
A. 对同一肌肉的的γ运动神经元起抑制作用
B. 对同一肌肉的α运动神经元起抑制作用
C. 使梭外肌收缩增强
D. 使梭內肌收缩增强
E. 肌肉内的温度变化
【单选题】
在整体中, 当某一肌肉受到牵拉时将发生牵张反射,表现为___
A. 其他关节的肌肉也同时收缩
B. 同一关节的协同肌抑制
C. 同一关节的拮抗肌兴奋
D. 受牵拉的肌肉收缩
E. 伸肌和屈肌都收缩
【单选题】
84下列关于肌牵张反射的叙述,错误的是___
A. 肌梭是肌牵张反射的感受器
B. 反射的基本中枢位于脊髓
C. 脊髓离断后,牵张反射永久消失
D. 是维持姿势的基本反射
E. 在脊髓突然与高位中枢离断后,牵张反射增强
【单选题】
腱反射或骨骼肌牵张反射___
A. 是由于刺激了肌腱内的感受器引起的反射活动
B. 传出神经元是前角小运动神经元
C. 效应器是被牵拉的肌肉
D. 在屈肌较明显
E. 以上各项都对
【单选题】
支配小汗腺的自主神经和其节后纤维末梢释放的递质分别是___
A. 交感神经,乙酰胆碱
B. 副交感神经,乙酰胆碱
C. 副交感神经,肽类递质
D. 交感神经,去甲肾上腺素
E. 副交感神经,氨基酸类递质
【单选题】
下列关于手足徐动症的描述,正确的是___
A. 是肌紧张过强而运动过少的疾病
B. 常伴有静止性震颤
C. 与多巴胺合成减少密切相关
D. 应用利血平治疗此病
E. 与γ-氨基丁酸能神经元功能亢进有关
【单选题】
帕金森病产生的原因是___
A. 新纹状体.苍白球内侧部直接通路活动增强
B. 新纹状体.苍白球内侧部间接通路活动减弱
C. 黑质多巴胺递质 系统功能受损
D. 纹状体乙酰胆碱递质系统活动减弱
E. 黑质多巴胺递质系统功能亢进
【单选题】
男,72岁。乏力,走路不稳3个月。查体肌张力减低,共济失调,意向性震颤,指鼻试验阳性,该患者最可能的病变部位是___
A. 小脑
B. 皮层运动区
C. 脑干
D. 基底神经节
E. 脊髓
【单选题】
下列有关交感神经系统的描述,哪一项是不正确的___
A. 交感神经分布广泛
B. 交感节前纤维往往和多个节内神经元发生突触联系
C. 交感神经系统可促使机体适应环境的急变
D. 交感神经系统可使肝糖原分解加速
E. 交感神经系统的意义主要在于保护机体、休整恢复
推荐试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks