【单选题】
某急性心肌梗死患者突然出现心尖区收缩期杂音,无震颤,心力衰竭明显加重。最可能的原因是___
A. 左室扩大,引起二尖辫关闭不全
B. 心率增快
C. 合并亚急性细菌性心内膜炎
D. 室间隔穿孔
E. 乳头肌功能失调或断裂
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
E
解析
暂无解析
相关试题
【单选题】
某急性心肌梗死的患者两小时后心电图随访Ⅱ.Ⅲ.avF导联出现病理性Q波,提示心肌梗死的部位可能是___
A. 后壁
B. 前壁
C. 下壁
D. 右侧壁
E. 左侧壁
【单选题】
长期卧床的心力衰竭患者栓子可来自下肢静脉,最易导致___
A. 上肢栓塞
B. 脑栓塞
C. 脾栓塞
D. 肺栓塞
E. 肾栓塞
【单选题】
频发室性早搏是指每分钟发生室性早搏多于___
A. 1次
B. 5次
C. 10次
D. 20次
E. 30次
【单选题】
动脉粥样硬化最具有特征性的病变是___
A. 纤维斑块病变引起管腔狭窄
B. 局限于动脉内膜的脂质条纹病变
C. 纤维斑块发生出血.坏死.溃疡的复合病变
D. 血管内膜表面破溃形成血栓及机化
E. 动脉壁的弹力层和肌层破坏后血管破裂引起出血
【单选题】
患者,男性,60岁,因急剧胸痛8小时入院,含服硝酸甘油效果不佳,血压为22.3/12.5kPa(168/94mmHg),心率为110次/分,伴偶发室性早搏,心电图示胸导联T波高尖。宜首选下列哪项治疗___
A. 静脉注射美托洛尔,继以口服
B. 口服异山梨酯
C. 静脉注射利多卡因
D. 口服慢心律
E. 口服疏甲丙脯酸
【单选题】
患者,女,28岁,首次入院,入院后一直在病房中走来走去,并主诉睡眠和胃口不佳。此患者的表现属于下列哪一种反应___
A. 焦虑
B. 恐惧
C. 害羞
D. 抑郁
E. 猜疑
【单选题】
关于对角色的有关陈述错误的是___
A. 原为戏剧.电影中的术语
B. 角色行为由个体完成
C. 社会心理学的一个专业术语
D. 角色行为由团体完成
E. 角色之间相互依存
【单选题】
护士语言使用要准确,言能达意,交代护理意图要简洁.通俗,避免使用医学术语,体现了语言的___
A. 专业性
B. 道德性
C. 礼貌性
D. 规范性
E. 安慰性
【单选题】
信息交流中最重要的技巧是___
A. 核实情况
B. 沉默的运用
C. 触摸的方式
D. 同情的表示
E. 用心倾听
【单选题】
护士与一糖尿病的患者及家属共同研究和讨论患者出院后的饮食安排问题,此时其最主要的角色是___
A. 治疗者
B. 管理者
C. 照顾者
D. 教导者
E. 协调者
【单选题】
患者不承认自己患病,称为___
A. 角色行为缺如
B. 角色行为强化
C. 角色行为消退
D. 角色行为冲突
E. 角色行为矛盾
【单选题】
护士能对日常的护理工作进行合理的组织.协调和控制,其角色与功能为___
A. 健康教育者
B. 健康协调者
C. 护理管理者
D. 护理计划者
E. 患者代言人
【单选题】
患者一方面需要别人的关心.照顾,另一方面又认为别人的关心照顾意味着自己的无能这属于患者一般心理反应的哪一种___
A. 焦虑
B. 无价值感与孤独感
C. 自尊心增强
D. 不安与挫折感
E. 主管感觉异常
【单选题】
以下哪一项社会特征不影响患者角色的适应___
A. 年龄
B. 文化程度
C. 家庭经济状况
D. 籍贯
E. 生活习惯
【单选题】
持治疗盘的姿态为双手握托治疗盘,肘关节贴近躯干呈___
A. 45°
B. 60°
C. 90°
D. 105°
E. 120°
【单选题】
患者,女,36岁,因乳腺癌住院,准备手术治疗,常暗自流泪.沉思,焦虑万分,护理时哪项是最重要的工作___
A. 通知家属来院探望
B. 允许陪住,避免焦虑
C. 报告主管医生前来诊治
D. 鼓励患者倾诉,给予疏导和安慰
E. 给予镇静剂缓解症状
【单选题】
在护患交往过程中,除以下哪种患者以外都可使用共同参与护理活动的模式___
A. 产妇
B. 糖尿病患者
C. 术后患者
D. 新生儿
E. 肢体训练患者
【单选题】
一人外伤后出血.烦躁,肢端湿冷,脉搏105次/分,脉压低。应考虑___
A. 无休克
B. 休克早期
C. 休克中期
D. 休克晚期
E. DIC形成
【单选题】
抗休克首要而基本的措施是___
A. 扩充血容量
B. 消除病因
C. 防止肾衰竭
D. 纠正酸中毒
E. 纠正电解质紊乱
【单选题】
抗休克治疗时,对改善肾缺血是哪一种药物___
A. 去甲肾上腺素
B. 肾上腺素
C. 多巴胺
D. 麻黄碱(麻黄素)
E. 去氧肾上腺素(新福林)
【单选题】
休克患者扩容首选的溶液是___
A. 平衡液
B. 生理盐水
C. 全血
D. 5%葡萄糖液
E. 右旋糖酐40(低分子右旋糖酐
【单选题】
患者男性,50岁,患胃十二指肠溃疡,突然大量呕血600ml左右,并出现烦躁不安.面色苍白.四肢湿冷。脉搏108次/分,血压14/12kPa。考虑患者已发生___
A. 虚脱
B. 轻度休克
C. 中度休克
D. 重度休克
E. 尚未休克
【单选题】
休克时患者的体位应处于___
A. 中凹位
B. 头低足高位
C. 平卧位
D. 半坐卧位
E. 头高足低位
【单选题】
患者男性,36岁,左下胸受挤压,左8.9.10肋骨骨折,脾破裂。面色苍白.四肢湿冷,脉搏122次/分,血压10.6/8kPa(80/60mmHg)。正确的处理原则是___
A. 大量快速输液待血压正常后手术
B. 一旦确诊立即手术
C. 积极抗休克,如病情无好转再手术
D. 积极抗休克同时迅速手术
E. 快速大量输血,待病情稳定后手术
【单选题】
观察休克患者血管痉挛严重程度的主要依据是___
A. 呼吸深浅
B. 意识情况
C. 脉压大小
D. 脉搏快慢
E. 肢端温度
【单选题】
在下列抗休克措施中,错误的是___
A. 吸氧.静脉输液
B. 平卧位
C. 置热水袋加温
D. 测中心静脉压
E. 观测尿量
【单选题】
内脏器官的损害一般在休克发生多长时间出现___
A. >16小时
B. >8小时
C. >10小时
D. >12小时
E. >24小时
【单选题】
上消化道大出血患者错误的护理措施是___
A. 平卧位.头偏向一侧
B. 严密观察出血量和色
C. 尽量鼓励患者起床排便
D. 绝对卧床
E. 大量呕血者须暂禁食
【单选题】
诊断早期原发性肝癌最有价值的方法是___
A. γ-GT
B. AFP的动态观察
C. CEA
D. CT
E. MRI
【单选题】
给上消化道出血患者做胃镜检查的适宜时间是___
A. 出血后24~48小时内
B. 出血后72小时内
C. 出血停止后10天
D. 出血停止后1周内
E. 出血停止后2周内
【单选题】
对消化系统疾病患者的护理,不正确的是___
A. 腹胀时可肛门排气
B. 消化道出血后不宜立即灌肠
C. 便秘时多吃水果
D. 腹泻时可服高蛋白高脂饮食
E. 做好口腔护理
【单选题】
确诊慢性胃炎的主要检查方法为___
A. 胃镜
B. X线
C. 胃液分析
D. 血清Hp抗体
E. 大便隐血试验
【单选题】
成人每天分泌的小肠液量为___
A. 100~200ml
B. 300~400ml
C. 500~600ml
D. 1000~3000ml
E. 4000~5000ml
【单选题】
护理肝性脑病患者,最为关键的措施是___
A. 注意休息
B. 避免诱因
C. 加强安全
D. 观察病情变化
E. 用药指导
【单选题】
急性胰腺炎患者的主要临床表现是___
A. 发热
B. 腹痛
C. 腹泻
D. 呕吐
E. 休克
【单选题】
下列何种药物可抑制大脑中假神经递质的形成___
A. 苯乙酸
B. 谷氨酸钾
C. 支链氨基酸
D. 苯甲酸钠
E. 鸟氨酸门冬氨酸
【单选题】
原发性肝癌的最好根治方法是___
A. 放射治疗
B. 化学治疗
C. 手术治疗
D. 免疫治疗
E. 雾化治疗
【单选题】
急性胰腺炎属于哪一类性质的炎症___
A. 感染性炎症
B. 无菌性炎症
C. 免疫性炎症
D. 化学性炎症
E. 化脓性炎症
【单选题】
原发性肝癌的预防最重要的措施是___
A. 休息
B. 调节饮食,注意卫生
C. 不吃霉变食品和粮食
D. 忌服对肝脏有损药物
E. 防霉.防毒.防肝炎
【单选题】
慢性胃炎胃酸缺乏引起消化不良者宜选用___
A. 陈香露片
B. 硫糖铝
C. 多潘立酮(吗丁啉)
D. 雷尼替丁
E. 胃酶合剂
推荐试题
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image