【单选题】
下丘脑与腺垂体之间主要的联系途径是 ___
A. :垂体束
B. :垂体门脉系统
C. :神经纤维
D. :神经纤维和淋巴循环
E. :淋巴循环
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
出现“克丁病”的原因是哪个腺体分泌的激素不足 ___
A. :垂体
B. :松果体
C. :甲状腺
D. :甲状旁腺
E. :胸腺
【单选题】
分泌生长素的腺体 ___
A. :甲状腺
B. :肾上腺
C. :松果体
D. :垂体
E. :胸腺
【单选题】
肿大后可能会压迫视交叉的是 ___
A. :甲状腺
B. :垂体
C. :松果体
D. :上丘
E. :泪腺
【单选题】
人体内最重要最复杂的内分泌腺是 ___
A. :甲状腺
B. :肾上腺
C. :垂体
D. :松果体
E. :胰岛
【单选题】
神经垂体贮存的激素 ___
A. :催乳素
B. :催产素
C. :生长素
D. :醛固酮
E. :肾上腺素
【单选题】
腺垂体嗜酸性细胞可分泌 ___
A. :催产素和生长素
B. :催乳素和促肾上腺皮质激素
C. :生长素和促甲状腺素
D. :生长素和催乳素
E. :催产素和促性腺激素
【单选题】
不属于内分泌腺的是 ___
A. :肾上腺
B. :甲状腺
C. :垂体
D. :腮腺
E. :甲状旁腺
【单选题】
髓质是特指大脑和小脑深部的 ___
A. :灰质
B. :白质
C. :神经核
D. :网状结构
E. :皮质
【单选题】
皮质是特指大脑和小脑表面的 ___
A. :灰质
B. :白质
C. :神经核
D. :网状结构
E. :髓质
【单选题】
下列不属于脑干的结构是 ___
A. :端脑
B. :脑桥
C. :延髓
D. :中脑
E. :中脑水管
【单选题】
位于中枢神经白质内部的神经细胞胞体集团,称为 ___
A. :皮质
B. :髓质
C. :灰质
D. :白质
E. :神经核
【单选题】
在大脑和小脑的内部,神经纤维聚集之处称为 ___
A. :皮质
B. :髓质
C. :灰质
D. :网状结构
E. :神经核
【单选题】
在中枢神经内,神经纤维突起聚集之处称为 ___
A. :皮质
B. :网状结构
C. :灰质
D. :白质
E. :神经核
【单选题】
在脑和脊髓的表面上,神经细胞体和树突聚集之处,称为 ___
A. :皮质
B. :髓质
C. :网状结构
D. :白质
E. :神经核
【单选题】
基底核不包括 ___
A. :尾状核
B. :豆状核
C. :屏状核
D. :杏仁体
E. :齿状核
【单选题】
内囊位于 ___
A. :豆状核与尾状核之间
B. :尾状核、背侧丘脑与豆状核之间
C. :背侧丘脑与豆状核之间
D. :尾状核、下丘脑与豆状核之间
E. :屏状核与背侧丘脑之间
【单选题】
第一感觉区主要位于 ___
A. :中央前回
B. :中央后回
C. :距状沟两侧
D. :颞中回
E. :额下回
【单选题】
不经过内囊的结构是 ___
A. :皮质脊髓束
B. :皮质核束
C. :丘脑皮质束
D. :内侧丘系
E. :视辐射
【单选题】
脑外伤导致颅内压升高后被挤入枕骨大孔的结构 ___
A. :大脑半球
B. :小脑半球
C. :脑桥
D. :小脑扁桃体
E. :下丘脑
【单选题】
左侧中央前回受损伤,可能导致 ___
A. :左侧躯体运动障碍
B. :右侧躯体运动障碍
C. :左侧躯体感觉障碍
D. :右侧躯体感觉障碍
E. :右视觉障碍
【单选题】
小脑不具有的功能 ___
A. :维持身体平衡
B. :调节肌张力
C. :协调随意运动
D. :发动随意运动
E. :以上功能都不具有
【单选题】
生命中枢位于 ___
A. :大脑半球
B. :间脑
C. :中脑
D. :延髓
E. :小脑
【单选题】
不与脑干相连的脑神经 ___
A. :嗅神经
B. :滑车神经
C. :前庭蜗神经
D. :舌下神经
E. :迷走神经
【单选题】
不属于脑的结构 ___ D
A. :间脑
B. :小脑
C. :脑干
D. :脑神经
E. :边缘叶
【单选题】
大脑半球表面,神经元胞体聚集处,称为 ___
A. :皮质
B. :白质
C. :髓质
D. :神经核
E. :神经节
【单选题】
成人的脊髓下端平对 ___
A. :第1腰椎体
B. :第3腰椎体
C. :第4腰椎体
D. :第5腰椎体
E. :第1骶椎体
【单选题】
不属于中枢神经系统的结构 ___
A. :灰质
B. :白质
C. :神经核
D. :神经节
E. :网状结构
【单选题】
出现“方形肩”的患者,其损伤的神经可能是 ___
A. :尺神经
B. :肌皮神经
C. :正中神经
D. :桡神经
E. :腋神经
【单选题】
什么神经损伤后会出现声音嘶哑、吞咽困难等症状 ___
A. :舌咽神经
B. :舌下神经
C. :迷走神经
D. :三叉神经
E. :面神经
【单选题】
传导舌前2/3味觉的神经 ___
A. :舌咽神经
B. :面神经
C. :舌下神经
D. :三叉神经
E. :迷走神经
【单选题】
支配咀嚼肌的神经是 ___
A. :眼神经
B. :上颌神经
C. :下颌神经
D. :面神经
E. :舌咽神经
【单选题】
支配泪腺和舌下腺分泌活动的神经是 ___
A. :视神经
B. :动眼神经
C. :面神经
D. :三叉神经
E. :迷走神经
【单选题】
属于感觉性的脑神经是 ___
A. :视神经
B. :动眼神经
C. :三叉神经
D. :面神经
E. :副神经
【单选题】
与听觉无关的结构是 ___
A. :上丘
B. :下丘
C. :内侧膝状体
D. :听辐射
E. :螺旋器
【单选题】
与视觉无关的结构是 ___
A. :外侧膝状体
B. :上丘
C. :下丘
D. :视交叉
E. :距状沟两侧的脑回
【单选题】
交感神经属于 ___
A. :躯体运动神经
B. :躯体感觉神经
C. :内脏运动神经
D. :内脏感觉神经
E. :迷走神经
【单选题】
植物神经是指 ___
A. :躯体运动神经
B. :躯体感觉神经
C. :内脏运动神经
D. :内脏感觉神经
E. :迷走神经
【单选题】
损伤什么神经后,病人出现口角歪向对侧 ___
A. :三叉神经
B. :面神经
C. :动眼神经
D. :舌咽神经
E. :舌下神经
【单选题】
第X对脑神经是 ___
A. :面神经
B. :三叉神经
C. :舌咽神经
D. :迷走神经
E. :副神经
【单选题】
全身最粗大的神经是 ___
A. :正中神经
B. :桡神经
C. :股神经
D. :坐骨神经
E. :腓总神经
推荐试题
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC