【单选题】
脂酸在肝脏进行β-氧化不生成下列哪种化合物
A. H2O
B. 乙酰CoA
C. 脂酰CoA
D. NADH
E. FADH2
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
脂蛋白脂肪酶LDL催化
A. 脂肪细胞中甘油三酯的水解
B. 肝细胞中甘油三酯的水解
C. VLDL中甘油三酯的水解
D. HDL中甘油三酯的水解
E. LDL中甘油三酯的水解
【单选题】
下列化合物中哪一个不是β-氧化所需要的辅助因子
A. NAD+
B. CoA
C. 肉碱
D. FAD
E. NADP+
【单选题】
载脂蛋白B100主要存在于
A. HDL
B. LDL
C. VLDL
D. CM
E. 血浆
【单选题】
脂酰CoA进行β-氧化反应顺序为
A. 脱氢、再脱氢、加水、硫解
B. 硫解、脱氢、加水、再脱氢
C. 脱氢、加水、再脱氢、硫解
D. 脱氢、脱水、再脱氢、硫解
E. 加水、脱氢、硫解、再脱氢
【单选题】
脂肪肝的形成与下列哪种因素无关
A. 必需氨基酸缺乏
B. 酗酒
C. 甲基化作用障碍
D. 脂酸摄取过多
E. 胆碱缺乏
【单选题】
细胞内催化脂酰基转移到胆固醇生成胆固醇酯的酶是
A. 卵磷脂胆固醇脂酰转移酶
B. 脂酰转移酶
C. 肉碱脂酰转移酶
D. 脂酰CoA胆固醇脂酰转
E. 脂酸合成酶
【单选题】
不参加酮体氧化的酶是
A. β-酮脂酰CoA硫解酶
B. 乙酰乙酰硫激酶
C. 琥珀酰CoA转硫酶
D. β-羟丁酸脱氢酶
E.
【单选题】
胞液中脂酸合成的限速酶是
A. 肉碱脂酰转移酶
B. HMGCoA还原酶
C. HMGCoA合成酶
D. HMGCoA裂解酶
E. 乙酰CoA羧化酶
【单选题】
Ⅰ型高脂蛋白血症是指空腹血浆
A. CM升高
B. VLDL升高
C. LDL升高
D. LDL及VLDL升高
E. CM及VLDL升高
【单选题】
生物合成胆固醇的限速步骤是
A. 二甲丙烯焦磷酸Ⅾ焦磷酸法尼酯
B.
C. 羊毛固醇Ⅾ胆固醇
D. 羟甲基戊二酸单酰CoAⅮ甲羟戊酸MVA
E. 2乙酰CoAⅮ3-羟基-3-甲基戊二酰CoA
【单选题】
合成胆固醇的限速酶是
A. HMGCoA合成酶
B. HMGCoA还原酶
C. HMGCoA裂解酶
D. 甲羟戊酸激酶
E. 鲨烯环氧酶
【单选题】
密度最低的脂蛋白是
A. 乳糜微粒
B. β-脂蛋白
C. 前β-脂蛋白
D. α-脂蛋白
E. 脂蛋白α
【单选题】
脂酸生物合成叙述正确的是
A. 不需乙酰CoA
B. 中间产物是丙二酰CoA
C. 在线粒体内进行
D. 以NADH为还原剂
E. 最终产物为十碳以下脂酸
【单选题】
肝脏生成乙酰乙酸的直接前体是
A. β-羟丁酸
B. 乙酰乙酰CoA
C. β-羟丁酰CoA
D. 甲羟戊酸
E. 羟甲基戊二酸单酰CoA
【单选题】
脂酸合成所需的乙酰CoA由
A. 胞质直接提供
B. 线粒体合成并转化为柠檬酸转运到胞质
C. 胞质的乙酰肉碱提供
D. 线粒体合成以乙酰CoA的形式转运到胞质
E. 胞质的乙酰磷酸提供
【单选题】
甘油三酯经甘油二酯途径生物合成时的重要中间产物是
A. 甘油一酯
B. CDP-甘油二酯
C. 溶血磷脂酸
D. 磷脂酸
E. NADH
【单选题】
Ⅴ型高脂蛋白血症是指空腹血浆
A. CM升高
B. VLDL升高
C. LDL升高
D. LDL及VLDL升高
E. CM及VLDL升高
【单选题】
高密度脂蛋白的生理功能是
A. 运输外源性脂肪
B. 运输内源性脂肪
C. 运输胆固醇到肝外组织
D. 运输胆固醇到肝脏
E. 运输胆固醇到肠
【单选题】
酮体生成和胆固醇合成的共同中间产物是
A. 乙酰CoA
B. 乙酰乙酰CoA
C. 乙酰乙酸
D. HMGCoA
E. 丙二酰CoA
【单选题】
有防止动脉硬化功能的脂蛋白是
A. CM
B. HDL
C. VLDL
D. LDL
E. 以上都不是
【单选题】
血中运输未酯化脂酸的物质是
A. CM
B. VLDL
C. HDL
D. IDL
E. 清蛋白
【单选题】
1分子甘油彻底氧化生成CO2和H2O可净生成ATP分子数
A. 20或21
B. 11或13
C. 18或120
D. 20或22
E. 23或25
【单选题】
下列有关酮体的论述错误的是
A. 酮体是肝脏输出能源的一种形式
B. 酮体可作为脑和肌肉组织的重要能源
C. 脂肪动员减少时肝内酮体生成增多
D. 酮体是水溶性物质
E. 丙酮可由呼吸道呼出
【单选题】
合成卵磷脂时所需的活性胆碱是
A. ADP胆碱
B.
C. UDP胆碱
D. CDP胆碱
E. GDP胆碱
【单选题】
由乙酰CoA在胞质中合成1分子硬脂酸需要多少分子NADPH
A. 14
B. 16
C. 7
D. 18
E. 9
【单选题】
载脂蛋白AⅠ主要存在于
A. LDL
B. VLDL
C. HDL
D. CM
E. 血浆
【单选题】
脂肪动员的限速酶是
A. LPL
B. LCAT
C. MVA
D. HSL
E. ACAT
【单选题】
内源性甘油三酯主要由哪一种血浆脂蛋白运输
A. CM
B. LDL
C. VLDL
D. HDL
E. HDL3
【单选题】
酰基载体蛋白是
A. 载脂蛋白
B. 含辅酶A的蛋白质
C. 脂酸多酶复合体的核心
D. 带有酰基的载体蛋白
E. 存在于脂酸多酶合成复合体的表面的蛋白质
【单选题】
大鼠出生后饲以去脂膳食结果将引起下列哪一种脂质缺乏
A. 鞘磷脂
B. 磷脂
C. 甘油三酯
D. 前列腺素
E. 胆固醇
【单选题】
脂酸在肝脏进行β-氧化的限速酶是
A. 肉碱脂酰转移酶Ⅰ
B. HMGCoA还原酶
C. HMGCoA合成酶
D. HMGCoA裂解酶
E. 乙酰CoA羧化酶
【单选题】
脂酸活化后β-氧化反复进行不需要下列哪一种酶参与
A. 脂酰CoA脱氢酶
B. β-羟脂酰CoA脱氢酶
C. Δ2-烯酰CoA水化酶
D. β-酮脂酰CoA硫解酶
E. 硫激酶
【单选题】
下列关于脂酸β-氧化的叙述哪一项是正确的
A. 起始代谢物是自由脂酸
B. 起始代谢物是脂酰CoA
C. 整个过程在线粒体内进行
D. 整个过程在胞质内进行
E. 反应产物是CO2和H2O
【单选题】
下列哪一种生化反应主要在线粒体内进行
A. 脂酸合成
B. 脂酸β-氧化
C. 脂酸ω-氧化
D. 胆固醇合成
E. 甘油三酯合成
【单选题】
下列磷脂中哪一个含有胆碱
A. 脑磷脂
B. 脑苷脂
C. 卵磷脂
D. 心磷脂
E. 磷脂酸
【单选题】
血浆中的胆固醇酯是
A. 由肝脏合成后释放入血
B. 由小肠吸收入血
C. 由肝外组织释放入血
D. 在血浆中经酶的催化生成
E. 由血浆脂蛋白释出
【单选题】
Ⅳ型高脂蛋白血症是指空腹血浆
A. CM升高
B. VLDL升高
C. LDL升高
D. LDL及VLDL升高
E. CM及VLDL升高
【单选题】
下列哪一化合物是必须脂酸
A. 顺丁烯二酸
B. 亚麻酸
C. 柠檬酸
D. 琥珀酸
E. 苹果酸
【单选题】
人体内多不饱和脂酸指
A. 油酸、软脂酸
B. 油酸、亚油酸
C. 亚油酸、亚麻酸
D. 软脂酸、亚油酸
E. 硬脂酸、花生四稀酸
【单选题】
软脂酰CoA经过一次β-氧化其产物通过三羧酸循环和氧化磷酸化生成ATP的摩尔数为
A. 5
B. 9
C. 12
D. 17
E. 36
推荐试题
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation