【单选题】
妇科盆腔检查常采用的体位是___
A. 平卧位
B. 膀胱截石位
C. 膝胸卧位
D. 臀高头低位
E. 自由体位
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
下列关于甲型肝炎病毒的描述,正确的是___
A. 属于DNA病毒
B. 感染后机体获得的免疫力不持久
C. 只有一个抗原抗体系统
D. 可引起慢性肝炎
E. 病毒抵抗力弱
【单选题】
引起猩红热的病原体是___
A. 乙群A型溶血性链球菌
B. 金黄色葡萄球菌
C. 肺炎链球菌
D. 疱疹病毒
E. 柯萨奇病毒
【单选题】
成人男性贫血,Hb的诊断标准是___
A. Hb<150g/L
B. Hb<120g/L
C. Hb<110g/L
D. Hb<90g/L
E. Hb<60g/L
【单选题】
下列哪项不属于新生儿抽搐的特殊表现___
A. 眼球震颤
B. 斜视
C. 尖叫
D. 握拳
E. 呼吸暂停
【单选题】
多器官功能障碍综合征必须是___
A. 三个系统或(和)器官的急性功能障碍
B. 一个系统的两个器官的急性功能障碍
C. 一个系统的两个以上器官急性功能障碍
D. 一个系统或(和)器官为另一个系统或器官的发病原因
E. 一个以上系统或(和)器官在急性疾病过程中相继出现急性功能障碍
【单选题】
上消化道出血最常见的原因___
A. 门脉高压症
B. 出血性胃炎
C. 消化性溃疡D.胃癌
D. 胃癌
E. 胆道出血
【单选题】
关于胎儿循环系统特点,正确的是___
A. 有脐静脉2条,脐动脉1条
B. 卵圆孔位于左、右心室之间
C. 进入胎儿右心房的下腔静脉血是混合
D. 卵圆孔开口处位于上腔静脉入口
E. 胎儿体内存在纯动脉血
【单选题】
原发性肾病综合征的常见并发症是___
A. 心力衰竭
B. 高血压脑病
C. 肾功能不全
D. C.肾功能不全
E. 感染
【单选题】
口服避孕药的作用是___
A. 非细菌性异物反应
B. 使宫颈黏液变稀薄
C. 减少子宫内膜前列腺素的形成
D. 抑制排卵
E. 抑制输卵管蠕
【单选题】
胎盘小叶一般有___
A. 5~10个
B. 10-15个
C. 15~20个
D. 20~25个
E. 25~30个
【单选题】
下列有关流行性乙型脑炎流行病学的描述,错误的是___
A. 以显性感染为主
B. 主要通过蚊虫叮咬传播
C. 主要流行于夏秋季
D. 感染后可获持久免疫力
E. 人对乙脑病毒普遍易感
【单选题】
某患儿所在幼儿园老师反映其身高、体重均远远低于其同龄儿,为了解其骨骼发育情况,应作下列哪项检查___
A. 血常规
B. 胸部X线摄片
C. 肝功能
D. 腰椎穿刺
E. 腕部X线照片
【单选题】
深部浓肿诊断的主要依据是___
A. 有波动感
B. 局部有深压痛高
C. 白细胞增高
D. 穿刺抽到脓液
E. 患处运动障碍
【单选题】
女性,36岁,从高处坠落时臀部着地造成腰椎骨折,其致伤原因是___
A. 直接损伤
B. 间接损伤
C. 肌肉牵拉
D. 积累损伤
E. 骨骼疾病
【单选题】
小儿无尿是指24小时尿量低于___
A. 30ml
B. 50ml
C. 80ml
D. 100ml
E. 120ml
【单选题】
以下药物中对再生障碍性贫血的发生没有明显影响的是___
A. 氯霉素
B. 阿司匹林
C. 保泰松
D. 磺胺
E. 青霉素
【单选题】
影响子宫复旧的因素是___
A. 授乳
B. 妊娠高血压综合征
C. 子宫炎症
D. 胎盘功能不良
E. 以上都不是
【单选题】
男性,23岁,诊断为重型肝炎,近日该病人睡眠规律倒错,记忆力,定性力,计算力下降,扑翼征可疑。病人可能为___
A. 慢性活动性肝炎
B. 急性重型肝炎
C. 肝性脑病
D. 肝肾综合征
E. 亚急性重型肝炎
【单选题】
老年痴呆患者认知功能障碍的最初表现是___
A. 注意力不集中,近记忆力下降
B. 远记忆力下降,记不起自己经历的重要事情
C. 时间定向力障碍
D. 地点定向力障碍
E. 思维障碍
【单选题】
慢性肾小球肾炎发病的起始因素为___
A. 急性肾小球肾炎迁延不愈所致
B. 细菌感染所致
C. 病毒感染导致
D. 免疫介导炎症
E. 遗传因素
【单选题】
下列与阿尔茨海默病(AD)的发生无确切关系的微量元素是___
A. 硅
B. 钙
C. 锰
D. 铝
E. 铁
【单选题】
CO中毒时,血中明显增多的血红蛋白是___
A. 碳氧血红蛋白
B. 高铁血红蛋白
C. 氧合血红蛋白
D. 硫化血红蛋白
E. 还原血红蛋白
【单选题】
6个月以后的小儿开始出现的心理反应是___
A. 认生
B. 反抗
C. 失望
D. 否认
E. 恐惧
【单选题】
对急性肾盂肾炎最有诊断价值的检查是___
A. 尿常规示白细胞管型
B. 血尿素氮、肌酐升高
C. 内生肌酐清除率下降
D. 尿红细胞大于3个/高倍镜
E. 24小时尿蛋白定量
【单选题】
心绞痛发作时疼痛持续时间一般为___
A. 3~5分钟
B. 10分钟
C. 15分钟D.20分钟
D. 20分钟
E. 30分钟
【单选题】
休克时主要的代谢改变是___
A. 酸中毒、高血钾
B. 碱中毒、低血钾
C. 低镁血症、低渗性脱水
D. 低血钙、低血糖
E. 成人呼吸窘迫综合征
【单选题】
锁骨骨折好发于___
A. 外1/3处
B. 外中1/3处
C. 内1/3处
D. 外1/2
E. 各种发生几率相通
【单选题】
8岁小儿贫血是指血红蛋白值低于___
A. 90g/L
B. 100g/L
C. 110g/L
D. 120g/L
E. 130g/L
【单选题】
某急性心肌梗死患者心电监护时发现-提前出现的宽大畸形QRS波群,T波与QRS波主波方向相反,此提前出现的QRS波群最可能是___
A. 窦性心律不齐
B. 房性期前收缩
C. 交界区期前收缩
D. 室性期前收缩
E. 正常现象
【单选题】
化脓性骨髓炎是指什么组织的化脓性感染___
A. 骨髓
B. 骨皮质、骨髓
C. 骨骺板、骨髓
D. 骨、骨膜
E. 骨、骨膜、骨髓
【单选题】
早产儿有呼吸暂停,主要是因为___
A. 肺泡数量相对少
B. 呼吸中枢相对不成熟
C. 肺泡表面活性物质少
D. 肋间肌肌力弱
E. 膈肌位置高
【单选题】
提示急性胰腺炎预后不良的是___
A. 代谢性酸中毒
B. 代谢性碱中毒
C. 低钾血症
D. 低钙血症
E. 低镁血症
【单选题】
男性,46岁,因慢性肾衰竭由其爱人捐献他一枚肾脏,行肾移植手术。此种脏器移植属于___
A. 自体移植
B. 同种异体移植
C. 异种异体移植
D. 同质移植
E. 支架移植
【单选题】
下列哪项不属于绝经巨大作用症___
A. 月经周期突然停止
B. 夜间盗汗
C. 阴道炎
D. 骨质疏松
E. 经血减少
【单选题】
门静脉高压症患者出现腹水的原因不包括___
A. 门静脉系的毛细血管床滤过压增加
B. 血浆白蛋白降低
C. 肝内淋巴液容量增加、回流不畅
D. 抗利尿
E. 醛固酮减少激素增加
【单选题】
下列各种细胞中HIV主要感染的是___
A. 单核细胞
B. 淋巴细胞
C. 神经胶质细胞
D. CD4+T淋巴细胞
E. NK细胞
【单选题】
《中华人民共和国护士管理办法>第四条中规定,护士的执业权利受谁保护___
A. 医院
B. 法律
C. 政府
D. 群众
E. 社区
【单选题】
洋地黄中毒引起的室性心律失常疗效较好的药物是___
A. 慢心律
B. 利多卡因
C. 苯妥英钠
D. 普萘洛尔
E. 维拉帕米
【单选题】
导致原发性血小板减少性紫癜患儿出血的主要原因是___
A. 病毒感染
B. 毛细血管脆性增加
C. 毛细血管通透性增加
D. 血小板数量减少
E. 血小板功能异常
【单选题】
传染病的基本特征是___
A. 有传染性、传播途径、免疫性
B. 有病原体、流行性、传染
C. 有病原性、传染性、流行性、地方性、季节性、免疫性
D. 有传染性、免疫性、流行性、地方性、季节性
E. 有病原性、传染性、免疫性
推荐试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity