【单选题】
门静脉高压症术前防止出血的措施应除外___
A. 避免劳累
B. 避免腹压增加
C. 避免食物过热、硬、刺激
D. 不放胃管
E. 绝对卧床
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
E
解析
暂无解析
相关试题
【单选题】
一病人因高热2日未能进食,自述口渴、口于、尿少色黄。查:脱水征,尿比重1.028,血清钠浓度为156mmol/L。治疗首先应给___
A. 3%~5%的高张盐水
B. 5%碳酸氢钠
C. 5%葡萄糖溶液
D. 葡萄糖盐水
E. 平衡液
【单选题】
男性,25岁。因车祸造成多发性损伤,急救时发现有窒息,腹部内脏脱出,股骨开放性骨折,病人血压低,脉微速。首先要处理的情况是___
A. 窒息
B. 腹部受伤
C. 股骨开放性骨折
D. 休克
E. 脉搏微弱
【单选题】
胸外心脏按压方法中不正确的做法是___
A. 按压部位在胸骨下段
B. 使胸骨下陷3~4cm
C. 每分钟按压80~100次
D. 双人操作,每按压4~5次,吹气4次
E. 双人操作,每按压15次,吹气2次
【单选题】
直肠癌根治手术后护理,以下哪项不正确___
A. 骶前引流管接负压吸引
B. 留置导尿1~2周
C. 手术后2~3天开放造瘘口
D. 胃肠减压一般使用48~72h
E. 骶前引流管2~3周后拔除
【单选题】
患儿,9个月,呕吐、腹泻3天,尿量略少,皮肤弹性稍差,口唇微干,眼窝轻度凹陷,血清钠浓度为140mmol/L,其脱水的程度为___
A. 重度脱水
B. 无脱水
C. 中度脱水
D. 极重度脱水
E. 轻度脱水
【单选题】
一患者胸部受伤后,胸内有进行性出血,出血源多为___
A. 心脏大血管破裂出血
B. 肺组织破裂出血
C. 支气管动脉破裂出血
D. 肋间动、静脉或胸廓内
E. 肋骨骨折断端出血
【单选题】
男,20岁,被人用刀捅伤半小时急诊入院,入院查体:血压9.3/6.7kPa(70/50mmHg),脉搏快弱,呼吸音减弱。X线示有大量积液阴影,应确诊为___
A. 开放性气胸
B. 损伤性气胸
C. 张力性气胸
D. 损伤性血气胸
E. 以上均不是
【单选题】
阿米巴肝脓肿没有继发细菌感染,应选用下列哪种方法治疗___
A. 脓肿内注入抗阿米巴药,切开引流
B. 脓肿内注入抗阿米巴药,穿刺抽吸
C. 全身应用抗阿米巴药,穿刺抽吸
D. 全身应用抗阿米巴药,切开引流
E. 全身应用抗阿米巴药,肝部分切除
【单选题】
妇科病人术后护理正确的是___
A. 硬膜外麻醉者,去枕平卧12小时
B. 妇科阴部手术后48小时取出阴道内纱布块
C. 会阴Ⅲ度裂伤修补术后5天给予缓泻剂
D. 一般腹部手术保留尿管5~7天
E. 广泛全子宫切除术后留置尿管10~14天
推荐试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection