【单选题】
肺癌患者出现Horner综合征是由于肿瘤压迫___
A. 膈神经
B. 副交感神经
C. 喉返神经
D. 臂丛交感神经
E. 颈交感神经
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
E
解析
暂无解析
相关试题
【单选题】
慢性支气管炎的X线表现为___
A. 肺部有块影
B. 肺内有液平
C. 肺大疱征象
D. 肺纹理增粗
E. 肺透亮度增加
【单选题】
呼吸衰竭时出现电解质紊乱,少见的是___
A. 高钾血症
B. 低钾血症
C. 低钠血症
D. 低氯血症
E. 高钙血症
【单选题】
呼吸衰竭患者表现为头痛.头胀.日轻夜重,昼眠夜醒,神智恍惚,球结膜充血水肿.皮肤温暖潮湿等,应考虑为___
A. 脑疝
B. 休克
C. 抑郁
D. 肝性脑病
E. 肺性脑病
【单选题】
呼吸衰竭患者的病情观察,下列哪一项变化对发现肺性脑病的先兆极为重要___
A. 皮肤
B. 血压
C. 神志
D. 瞳孔
E. 心率
【单选题】
Ⅱ型呼吸衰竭的吸氧浓度应为___
A. 25~35%
B. 38~42%
C. 41~45%
D. 46~50%
E. 51~60%
【单选题】
呼吸系统疾病最常见的原因是___
A. 感染
B. 吸烟
C. 粉尘和有害气体吸入
D. 其他肿瘤疾病
E. 冷空气刺激
【单选题】
结核菌的特点,下列哪一项不正确___
A. 具有耐药性
B. 对外界抵抗力较强
C. 涂片染色具抗碱性
D. 属分枝杆菌,生长缓慢
E. 菌内含类脂质.蛋白质和多糖类
【单选题】
肺结核最常见的临床类型是___
A. 原发型肺结核
B. 浸润型肺结核
C. 结核性胸膜炎
D. 血行播散型肺结核
E. 慢性纤维空洞型肺结核
【单选题】
抢救大咯血.窒息患者的首要措施是___
A. 立即进行人工呼吸
B. 立即使用呼吸中枢兴奋剂
C. 立即给予鼻导管吸氧
D. 立即输血.输液.注射止血剂
E. 立即解除呼吸道梗阻
【单选题】
肺源性心脏病呼吸衰竭时应给予___
A. 高流量持续吸氧
B. 高流量间歇吸氧
C. 低流量间歇吸氧
D. 低流量持续吸氧
E. 其余选项都不妥
【单选题】
支气管扩张最主要的临床表现是___
A. 慢性咳嗽.大量脓痰.反复咯血
B. 发热.盗汗
C. 慢性咳嗽.胸痛
D. 呼吸困难
E. 贫血.杵状指
【单选题】
慢性Ⅱ型呼吸衰竭患者的吸氧方法是___
A. 高浓度氧
B. 纯氧
C. 高压吸氧
D. 低浓度.低流量持续吸氧
E. 间歇吸氧
【单选题】
对肺结核患者进行病情观察时,发现下列何种情况提示病情较重,应加强护理___
A. 低热盗汗.颧部潮红
B. 软弱疲乏.精神不振
C. 食欲减退.体重减轻
D. 高热不退.脉搏快速.呼吸急促
E. 痰中带血.咳嗽咳痰
【单选题】
刺激性呛咳伴金属音调的咳嗽应首先考虑___
A. 支气管哮喘
B. 支气管肺癌
C. 肺脓肿
D. 支气管扩张
E. 喉返神经麻痹
【单选题】
对胸痛患者的护理措施中下列哪一项不妥___
A. 稳定情绪
B. 注意休息
C. 常规使用镇痛剂
D. 宽胶布固定患侧胸廓
E. 胸膜炎者取患侧卧位
【单选题】
呼吸衰竭患者缺氧的典型表现是___
A. 多汗
B. 心动过速
C. 发绀
D. 呼吸困难
E. 扑翼样震颤
【单选题】
慢性呼吸衰竭最常见的病因是___
A. 慢性阻塞性肺病
B. 重症肺结核
C. 肺动脉高压
D. 广泛肺间质纤维化
E. 肺炎
【单选题】
预防结核病根本有效的方法是___
A. 不要随地吐痰
B. 接种卡介苗
C. 加强营养.增强体质
D. 将患者隔离
E. 合理应用抗结核药物治疗肺结核患者
【单选题】
吸痰可保持呼吸道通畅,但每次吸引时间不应超过___
A. 10秒
B. 12秒
C. 15秒
D. 18秒
E. 25秒
【单选题】
气管切开处应每日消毒1次,内套管应几小时清洁消毒1次___
A. 2~4小时
B. 3~4小时
C. 4~6小时
D. 6~8小时
E. 8~10小时
【单选题】
气管切开患者吸痰时,吸痰管插入气管内的深度至少应为___
A. 8cm
B. 11cm
C. 13cm
D. 15cm
E. 18cm
【单选题】
结核菌素皮内试验结果的观察应在注射后___
A. 20分钟~1小时
B. 12小时
C. 24小时
D. 36小时
E. 48~72小时
【单选题】
做结核菌素试验的主要目的是___
A. 测定人体是否受过结核菌感染
B. 诊断是否患有肺结核
C. 判断结核病的严重程度
D. 增强机体对结核菌的免疫力
E. 明确肺结核患者是否需要隔离治疗
【单选题】
支气管肺癌的发生与下列哪项的关系最为密切___
A. 大气污染
B. 吸烟
C. 工业致癌物
D. 电离辐射
E. 肺结核
【单选题】
为预防肺结核的发生与流行,下列各项措施中最为关键的是___
A. 出生后接种卡介苗
B. 隔离排菌患者
C. 加强营养,锻炼身体,增强抵抗力
D. 合理化疗,治愈排菌患者
E. 为易感者及密切接触排菌患者者预防给药
【单选题】
结核病最主要的传播途径是___
A. 飞沫
B. 血液
C. 食物和水
D. 皮肤接触
E. 毛巾或餐具
【单选题】
下列哪项对气胸的诊断.判断疗效意义最为重要___
A. 突然胸痛
B. 呼吸困难
C. 胸廓膨隆
D. 胸部X线检查
E. 肺部呼吸音消失
【单选题】
自发性气胸最早出现的症状是___
A. 胸痛
B. 咳嗽.喘息
C. 呼吸困难
D. 发绀
E. 活动无耐力
【单选题】
诊断支气管肺癌最可靠的手段是___
A. 病史和体征
B. 胸部X线检查
C. 痰涂片检查
D. 胸部CT检查
E. 纤维支气管镜检查
【单选题】
慢性呼吸衰竭最早.最突出的症状是___
A. 发绀
B. 呼吸困难
C. 白天嗜睡
D. 心律失常
E. 神经精神症状
【单选题】
自发性张力性气胸最重要的治疗是___
A. 卧床休息
B. 给予抗生素
C. 吸氧
D. 排气治疗
E. 胸膜粘连术
【单选题】
对呼吸衰竭者的护理,下列错误的是___
A. 肺源性心脏病患者昼夜睡眠颠倒,应给予巴比妥类药进行调整
B. 休克患者进行性呼吸困难伴发绀,应警惕ARDS
C. 机械通气上机前训练患者在呼气时咽东西
D. 应用呼吸兴奋剂中出现抽搐,应停药
E. 呼吸衰竭改善后应及逐渐撤机
【单选题】
咳铁锈色痰主要见于___
A. 肺炎杆菌肺炎
B. 肺炎球菌肺炎
C. 浸润型肺结核
D. 原发性肺脓肿
E. 支气管扩张症
【单选题】
肺炎球菌肺炎患者的热型常呈___
A. 周期热
B. 波状热
C. 稽留热
D. 弛张热
E. 间歇热
【单选题】
咳嗽伴大量黄脓痰见于___
A. 支气管扩张症
B. 肺炎
C. 肺结核
D. 支气管肺癌
E. 支气管哮喘
【单选题】
混合性呼吸困难的特点是___
A. 呼吸深而慢
B. 吸气时间延长
C. 常伴高调哮鸣音
D. 呼吸频率增快.变浅
E. 常出现三凹征
【单选题】
肺炎球菌肺炎的发病最多见于___
A. 老年人
B. 青壮年
C. 少年
D. 新生儿
E. 婴幼儿
【单选题】
支气管扩张症患者做体位引流的时间宜在何时进行___
A. 早晨
B. 上午
C. 晚上
D. 饭前
E. 饭后
【单选题】
肺炎球菌肺炎的抗菌治疗宜首选___
A. 青霉素
B. 大环内酯素
C. 喹诺酮类
D. 头孢菌素类
E. 氨基糖苷类
【单选题】
肺炎时可减轻胸痛的最常用的体位是___
A. 患侧卧位
B. 仰卧位
C. 端坐位
D. 健侧卧位
E. 俯卧位
推荐试题
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程