【多选题】
根据中国CML指南2016年版,CML慢性期标准为( )。
A. 外周血或骨髓中原始细胞<0.10
B. 外周血或骨髓中原始细胞≥0.20
C. 髓外原始细胞浸润
D. 未达到诊断加速期或急变期的标准
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
AD
解析
暂无解析
相关试题
【多选题】
关于ENESTnd和ENESTchina 研究, 以下说法正确有( )。
A. ENESTnd是3臂试验,ENESTchina是2臂试验
B. 两个试验的研究终点基本相同
C. ENESTnd中入组患者的中位年龄更大
D. ENESTnd中入组更多中高危患者
【多选题】
评价二代TKI做为新诊断CML-CP患者一线治疗疗效和安全性研究的临床试验包括( )。
A. ENESTnd
B. ENESTchina
C. DASISION
D. ENESTcmr
【多选题】
如果出现血液学毒性( ),应暂停达希纳的使用。
A. 加速期:ANC<0.5×109/升或血小板<10×109/升
B. 慢性期:ANC<1.0×109/升或血小板<50×109/升)
C. 加速期:ANC<1×109/升或血小板<10×109/升
D. 慢性期:ANC<10×109/升或血小板<50×109/升
【多选题】
使用Sokal风险评分将Ph+ CML患者分层为高度风险,中度风险和低度风险类别,其基于具有预后意义的独立因子包括
A. 患者
B. 脾肿大程度
C. 血小板计数
D. 外周原始细胞百分比
【多选题】
相比格列卫,达希纳一线治疗的哪项优势与TFR相关
A. Earlier,更早的分子学反应
B. Deeper,更深的分子学反应
C. Fewer,更少的疾病进展风险
D. 以上均不正确
【多选题】
以下达希纳主信息包括( )。
A. 达希纳是专为CML设计的二代TKI,强效精准抑制BCR-ABL
B. 达希纳更快获得更深缓解,减少疾病进展
C. 达希纳耐受性好,不良反应可预测,易管理
D. 达希纳有150mg,200mg2种剂型,方便患者使用
【多选题】
以下关于DASISION研究的描述,正确的是( )。
A. DASISION试验的研究终点是CCyR,而不是MMR
B. DASISION试验中,达沙替尼组与伊马替尼组获得MR4.5 的组间差异逐渐拉大
C. DASISION试验中,达沙替尼组并未显示比伊马替尼组显著降低疾病进展的风险
D. 反复发作的胸腔积液是多发的不良反应
【多选题】
以下哪个说法是正确的是( )。
A. 所有TKI由于抑制野生型Bcr-Abl,都会对心血管系统产生影响
B. 临床试验证实:达希纳治疗患者的心血管事件发生率与同年龄组普通人群相似
C. 所有进行TKI治疗的CML患者,都应该进行心血管风险因素的评估
D. 所有选项均不正确
【多选题】
有研究推荐,晚期CML患者移植后为预防急性移植物抗宿主病(aGVHD),可接受( ) 治疗。删除
A. 环孢素A
B. 霉酚酸酯
C. 短期甲氨蝶呤
D. 以上所有选项均错误
【多选题】
与伊马替尼相比,达希纳作为一线治疗的优势是( )。
A. Earlier,更早的分子学反应
B. Deeper,更深的分子学反应
C. Fewer,更少的疾病进展风险
D. 所有选项均不正确
【多选题】
"在ENESTnd研究中接受伊马替尼核心治疗反应欠佳/治疗失败的患者换用达希纳400 mg BID后患者达到CCyR和MMR的比例分别为
A. 0.58
B. 0.6
C. 0.32
D. 0.42
【多选题】
NCCN指南推荐:伊马替尼治疗中疾病进展至BC期的患者,可采取()治疗。
A. 临床试验
B. AML或ALL诱导化疗+TKI后HSCT(如可行)
C. TKI后HSCT(如可行)
D. 以上所有选项均错误
【多选题】
达希纳的适应症为()?
A. 用于治疗新诊断的费城染色体阳性的慢性髓性白血病(Ph+CML)慢性期成人患者。
B. 用于对既往治疗(包括伊马替尼)耐药或不耐受的费城染色体阳性的慢性髓性白血病(Ph+CML)
C. 初诊为费城染色体阳性的慢性髓性白血病(Ph+ CML)的慢性期成人患者
D. 以上均不正确
【多选题】
达希纳能够抑制()激酶的自磷酸化。
A. Bcr-Abl(20-60nM)
B. PDGFR(69nM)
C. 初诊为费城染色体阳性的慢性髓性白血病(Ph+ CML)的慢性期成人患者 (*)
D. c-Kit(210nM)
【多选题】
符合()其中任何一项,即可判断为CML加速期。
A. 外周血或骨髓中原始细胞占0.10-0.19
B. 外周血嗜碱粒细胞≥0.20
C. 与治疗无关的持续血小板减少或白细胞计数增高
D. 克隆演变
推荐试题
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode