【单选题】
子宫脱垂患者阴道前后壁修补手术后应采取的体位是___
A. 头高脚低位
B. 平卧位
C. 半卧位
D. 侧卧位
E. 自由体位
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
低渗性脱水,主要是___
A. 血钾低
B. 血钠低
C. 血钙低
D. 血镁低
E. 血糖低
【单选题】
良性卵巢肿瘤最常见的并发症为___
A. 蒂扭转
B. 内出血
C. 破裂
D. 感染
E. 恶变
【单选题】
泌尿系结核患者的健康教育中应强调定期复查。具体方法是___
A. 每月查血常规1-2次,以了解结核抗体情况
B. 每月查尿常规1~2次,每3~6个月泌尿系造影.1次
C. 每月查泌尿系造影1~2次
D. 每3-6个月进行B超检查1次
E. 每半年行膀胱镜检查1次
【单选题】
低钾与高钾血症相同的症状是___
A. 心动过速
B. 乏力、软瘫
C. 舒张期停搏
D. 腹胀、呕吐
E. 心电图T波低平
【单选题】
10个月患儿,面黄来诊。诊断为营养性巨幼红细胞贫血,下列处理正确的是___
A. 口服铁剂
B. 口服胃蛋白酶
C. 口服维生素C
D. 肌内注射维生素B
E. 预防发生心功能不全
【单选题】
请问泌尿系损伤的治疗原则错误的是___
A. 恢复尿道连续性
B. 引流尿量,解除尿潴留
C. 尿外渗部位,应做切开引流
D. 常规使用抗生素
E. 用气囊导尿管压迫止血
【单选题】
一个肾病综合征患儿,有胸腔积液,全身水肿较重,护理该患儿时不应采用的方法是___
A. 避免皮肤擦伤及受压
B. 保持皮肤清洁干燥
C. 阴囊部用吊带托起
D. 让患儿卧于橡胶单上以利清理床单位
E. 静脉穿刺时选好血管,争取一次穿刺成功
【单选题】
腹泻脱水患儿补液后排尿,此时输液瓶中尚有不含钾液体200ml,此液体中最多可加入10%氯化钾多少___
A. 4ml
B. 6ml
C. 8ml
D. 10ml
E. 12ml
【单选题】
初种麻疹疫苗的年龄是___
A. 出生立即
B. 3个月
C. 4~6个月
D. 8个月以上
E. 12个月以上
【单选题】
下列哪项不是小儿发生疾病的特点___
A. 患感染性和传染性疾病时常起病急且病情重
B. 幼小婴儿严重感染时各种反应低下
C. 小儿病情易反复,变化较快
D. 因为小儿体液免疫和细胞免疫都比较健全,故败血症少见
E. 因小儿难以正确表达自己的感受,故观察病情尤其重要
【单选题】
在缺铁性贫血的相应化验中,唯一数值增高的指标是___
A. 胆红素
B. 总铁结合力
C. 血红蛋白
D. 铁
E. 蛋白质
【单选题】
患者,女性,30岁,生育史为流产2次,无早产史,足月产1次,现有一女,可简写为___
A. 1021
B. 2101
C. 121
D. 1201
E. 1012
【单选题】
急性白血病病人容易发生感染的主要原因是___
A. 白细胞增多
B. 继发性营养不良
C. 成熟粒细胞缺乏
D. 长期贫血导致机体抵抗力下降
E. 化疗药副作用
【单选题】
丹毒的临床表现下列哪项不对___
A. 局部皮肤红肿
B. 胀痛及烧灼感
C. 常有化脓
D. 容易复发
【单选题】
妊娠期母体变化哪项不对___
A. 妊娠32~34周血容量增加达高峰
B. 妊娠晚期易发生外阴及下肢静脉曲张
C. 子宫峡部在妊娠后期形成子宫下段
D. 妊娠末期孕妇血液处于低凝状态
E. 妊娠后卵巢不排卵
【单选题】
绒毛膜癌治愈观察年限为___
A. 1年
B. 2年
C. 3年
D. 4年
E. 5年
【单选题】
某健康新生儿出生后第3天,对其生命体征正确的描述是___
A. 胸式呼吸为主
B. 体温38.7℃
C. 脉搏90次/min
D. 心率100次/min
E. 呼吸40~45次/min
【单选题】
首次产前检查的时间应在___
A. 妊娠12周
B. 妊娠16周
C. 妊娠20周
D. 妊娠24周
E. 妊娠28周
【单选题】
口服有机磷中毒一般出现症状的时间为___
A. 10min~2h
B. 2~6h
C. 5~7h
D. 8~12h
E. 12~24h
【单选题】
胎盘娩出后。子宫底每天下降___
A. 5~6cm
B. 4~5Cm
C. 3~4Cm
D. 23Cm
E. 1~2Cm
【单选题】
关于产妇产褥期的临床表现,下列哪项是正确的___
A. 分娩后经过数小时,可见子宫底稍下降
B. 产妇于产后一周内脉搏增快
C. 产后宫缩痛多见初产妇
D. 子宫复旧需2~3周
E. 子宫复旧速度因母乳喂养而加速
【单选题】
肝硬化腹水患者。每日进水量限制在___
A. 1500ml
B. 1000ml
C. 800ml
D. 500ml
E. 300ml
【单选题】
新生儿颅内出血的诊断依据应除外___
A. 缺氧史
B. 尖叫
C. 产伤史
D. 嗜睡、拒乳
E. 感染病灶
【单选题】
有关口服铁剂的注意事项。错误的是___
A. 向病人说明服用铁剂后可出现黑便
B. 服用铁剂前后禁饮浓茶
C. 避免铁剂溶液与牛奶同服
D. 服铁剂溶液时要用吸管吸入咽下
E. 症状改善后可停药
【单选题】
下列关于结核菌素试验结果描述正确的是___
A. 结核菌素试验阴性即可除外结核
B. 卡介苗接种成功,结核菌素反应多呈阳性
C. 重症肺结核的结核菌素反应阳性
D. 结核菌素试验阳性,肯定有结核病
E. 初次感染结核后4周内,结核菌素试验阳性
【单选题】
下列哪项属于卵巢肿瘤___
A. 皮样囊肿
B. 黄素囊肿
C. 卵泡囊肿
D. 黄体囊肿
E. 卵巢巧克力囊肿
【单选题】
下列哪项符合无菌技术操作原则___
A. 持无菌镊的1/2处
B. 持无菌容器时手指触及容器边缘
C. 将无菌敷料伸进无菌溶液瓶内蘸取溶液
D. 将无菌盘的盖巾扇形折叠时,开口边向外
E. 戴无菌手套的手触及另一手套反折部的外侧面
【单选题】
前置胎盘患者进行产科检查,。错误的是___
A. 胎方位清楚
B. 先露高浮
C. 胎心正常
D. 子宫大小与停经月份一致
E. 宫颈抬举痛明显
【单选题】
穿刺针进入蛛网膜下隙的确切征象是___
A. 有突破感
B. 拔出针芯有脑脊液流出
C. 能测得负压
D. 拔出针芯有血液流出
E. 注生理盐水无阻力
【单选题】
正常小儿,身长108cm,体重21kg,身长之中点位于脐与耻骨联合上缘之间,尚未开始出恒牙,其可能的年龄是___
A. 5岁
B. 6岁
C. 7岁
D. 8岁
E. 9岁
【单选题】
孕妇由于妊高征应用硫酸镁治疗,在治疗过程中出现膝腱反射消失。呼吸浅而慢,每分钟10次。此患者除立即停药外应给下述哪种药液___
A. 5%葡萄糖静脉滴注
B. 肌注山莨菪碱
C. 静注50%葡萄糖
D. 静注10%葡萄糖酸钙
E. 静注低分子右旋糖酐
【单选题】
慢性肺心病的确诊依靠___
A. 心尖区舒张期杂音第一心音亢进
B. 心尖区收缩期杂音
C. 主动脉区舒张期杂音
D. 主动脉瓣区收缩期杂音
E. 肺动脉瓣第二音亢进及剑突处心尖搏动
【单选题】
为减少支气管扩张患者呼吸道感染的发生,尤应重点做好下列哪项护理工作___
A. 卧床休息
B. 高蛋白易消化饮食
C. 保持口腔清洁
D. 病室空气流通
E. 保持一定的温度
【单选题】
X线检查时密度最高的组织结构是___
A. 实质器官
B. 脂肪
C. 骨骼
D. 神经
E. 肌肉
【单选题】
尿毒症病人出血是由于___
A. 凝血因子减少
B. 皮下脂肪太薄
C. 血小板减少及毛细血胞通透性增加
D. 全骨髓抑制
E. 巨核细胞破坏
【单选题】
痛风发作时的特点___
A. 腕关节对称
B. 脊柱大关节
C. 膝关节对称
D. 单关节不对称
E. 对称游走
【单选题】
癫癎病人的发作类型,临床上最常见的是___
A. 简单部分性发作
B. 复杂部分性发作
C. 单纯失神发作
D. 强直阵挛发作
E. 癫癎持续状态
【单选题】
失血性休克时的首要护理措施是___
A. 配血、备血、定血型
B. 备齐一切抢救用物
C. 迅速建立静脉通路
D. 按医嘱应用止血药
E. 高流量氧气吸入
【单选题】
粪便呈暗红色,且有特殊的臭味,见于___
A. 霍乱
B. 急性胃肠炎
C. 肠激惹综合征
D. 细菌性痢疾
E. 阿米巴痢疾
【单选题】
有关粪隐血试验,不正确的概念是___
A. 少量消化道出血即可阳性
B. 正常人为阴性
C. 服用铁剂可呈假阳性
D. 判断消化道出血的有效方法
E. 可确诊消化道出血的部位
推荐试题
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5