【单选题】
不属于肠系膜下动脉分支的是:___
A. 左结肠动脉
B. 乙状结肠动脉
C. 右结肠动脉
D. 直肠上动脉
E. 以上都不对
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
股三角内行于股动脉内侧的是:___
A. 股神经
B. 股静脉
C. 腓总神经
D. 坐骨神经
E. 胫神经
【单选题】
在体表不能摸到搏动的动脉是:___
A. 股动脉
B. 颞浅动脉
C. 肱动脉
D. 脾动脉
E. 足背动脉
【单选题】
关于静脉的叙述,错误的是:___
A. 引导血液回心
B. 管腔内流动的都是静脉血
C. 管壁比相应的动脉薄
D. 有浅静脉和深静脉之分
E. 壁薄腔大
【单选题】
收集头颈部、上肢、胸壁的静脉血的静脉系是___
A. 上腔静脉系
B. 下腔静脉系
C. 心静脉系
D. 肝门静脉系
E. 肝静脉
【单选题】
静脉角___
A. 由颈内静脉和颈外静脉汇成
B. 由锁骨下静脉和颈外静脉汇成
C. 由颈内静脉和锁骨下静脉汇成
D. 由颈内静脉和头臂静脉汇成
E. 由颈外静脉和头臂静脉汇成
【单选题】
颈内静脉的体表投影:___
A. 下颌角与锁骨中点的连线
B. 耳垂到锁骨胸骨端的连线
C. 下颌角与内眦的连线
D. 耳垂到锁骨中外1/3的连线
E. 以上都不对
【单选题】
颈外静脉的体表投影:___
A. 下颌角与锁骨中点的连线
B. 耳垂到锁骨胸骨端的连线
C. 下颌角与内眦的连线
D. 耳垂到锁骨中外1/3的连线
E. 以上都不对
【单选题】
不属于上肢浅静脉的是___
A. 贵要静脉
B. 头静脉
C. 肘正中静脉
D. 头臂静脉
E. 手背静脉
【单选题】
大隐静脉注入部位是___
A. 腘静脉
B. 髂内静脉
C. 髂外静脉
D. 股静脉
E. 髂总静脉
【单选题】
小隐静脉注入___
A. 股静脉
B. 髂外静脉
C. 腘静脉
D. 髂总静脉
E. 肝门静脉
【单选题】
静脉输液部位不包括___
A. 头皮静脉
B. 手背静脉
C. 奇静脉
D. 大隐静脉
E. 颈外静脉
【单选题】
肝门静脉系是___
A. 收集肝的静脉血
B. 收集除肝外不成对腹腔器官的静脉血
C. 收集肝和腹腔成对器官的静脉血
D. 收集腹腔成对器官的静脉血
E. 收集腹腔不成对器官的静脉血
【单选题】
不属于肝门静脉属支的是:___
A. 脾静脉
B. 肠系膜上静脉
C. 肠系膜下静脉
D. 肝静脉
E. 附脐静脉
【单选题】
肝门静脉与上、下腔静脉的吻合包括:___
A. 食管静脉丛
B. 直肠静脉丛
C. 脐周静脉网
D. 以上都对
E. 以上都不对
【单选题】
淋巴管道不包括:___
A. 毛细血管
B. 毛细淋巴管
C. 淋巴管
D. 淋巴干
E. 淋巴导管
【单选题】
淋巴干中,左右不对称的是:___
A. 颈干
B. 锁骨下干
C. 支气管纵膈干
D. 腰干
E. 肠干
【单选题】
关于胸导管,描述错误的是:___
A. 由左右腰干和肠干在第1腰椎前方汇合而成
B. 起始处膨大,称乳糜池
C. 收集全身3/4的淋巴
D. 注入左静脉角
E. 注入右静脉角
【单选题】
胸导管注入:___
A. 左静脉角
B. 右静脉角
C. 左肠干
D. 颈内静脉
E. 上腔静脉
【单选题】
右淋巴导管注入:___
A. 左静脉角
B. 右静脉角
C. 左肠干
D. 颈内静脉
E. 上腔静脉
【单选题】
以下哪个不属于淋巴器官___
A. 淋巴结
B. 胰
C. 脾
D. 胸腺
E. 扁桃体
【单选题】
淋巴器官的功能是___
A. 产生淋巴细胞
B. 参与免疫反应
C. 滤过血液
D. 滤过淋巴液
E. 以上都是
【单选题】
关于淋巴结,描述正确的是:___
A. 成群分布
B. 多沿血管分布
C. 新鲜时呈灰红色
D. 椭圆形小体
E. 以上都是
【单选题】
乳腺癌,最先转移的淋巴结是:___
A. 腋淋巴结
B. 颈外侧淋巴结
C. 胸骨旁淋巴结
D. 肺门淋巴结
E. 纵膈淋巴结
【单选题】
关于脾,说法错误的是:___
A. 位于左季肋区
B. 长轴与第10肋一致
C. 正常情况下载左肋骨下可被触及
D. 分为膈面和脏面
E. 有滤血和储血的功能
【单选题】
角膜___
A. 富有感觉神经末梢
B. 富含血管
C. 占眼外膜的前1/4
D. 屈度较小
E. 占眼外膜的前1/5
【单选题】
眼的屈光装置不包括___
A. 角膜
B. 晶状体
C. 玻璃体
D. 房水
E. 瞳孔
【单选题】
关于晶状体的描述,错误的是___
A. 位于虹膜与玻璃体之间
B. 不含血管和神经
C. 无色透明有弹性
D. 形如双凸透镜
E. 没有折光作用
【单选题】
关于眼球壁的描述,错误的是___
A. 虹膜中央为瞳孔
B. 中膜肥厚部分为睫状体
C. 脉络膜没有血管
D. 睫状体有调节晶体凸度的作用
E. 视网膜可分虹膜部和视部
【单选题】
眼前房与后房的分界是___
A. 虹膜
B. 脉络膜
C. 睫状体
D. 晶状体
E. 玻璃体
【单选题】
房水产生于___
A. 睫状体
B. 虹膜
C. 玻璃体
D. 晶状体
E. 巩膜
【单选题】
感受强光的细胞是___
A. 视锥细胞
B. 视杆细胞
C. 节细胞
D. 色素上皮细胞
E. 双极细胞
【单选题】
感光和辨色最敏锐的部位是___
A. 视神经乳头
B. 角膜
C. 虹膜
D. 黄斑中央凹
E. 晶状体
【单选题】
角膜内含有:___
A. 毛细血管
B. 感觉神经末梢
C. 色素细胞
D. 毛细淋巴管
E. 视细胞
【单选题】
沟通眼球前、后房的结构是:___
A. 虹膜角膜角
B. 巩膜静脉窦
C. 泪点
D. 瞳孔
E. 眼静脉
【单选题】
产生房水的结构是:___
A. 睫状体
B. 晶状体
C. 泪腺
D. 眼房
E. 玻璃体
【单选题】
能调节晶状体曲度的肌是:___
A. 眼轮匝肌
B. 提上睑肌
C. 瞳孔开大肌
D. 睫状肌
E. 瞳孔括约肌
【单选题】
关于视网膜视部神经层的描述,正确的是___
A. 视锥和视杆细胞位于视网膜内层
B. 视锥细胞能感受弱光和颜色
C. 视杆细胞能感受强光
D. 双极细胞将神经冲动传导至外层的神经节细胞
E. 神经节细胞的轴突向视神经盘处汇集,构成视神经
【单选题】
不属于眼球屈光装置的结构是___
A. 角膜
B. 房水
C. 晶状体
D. 玻璃体
E. 巩膜
【单选题】
房水和房水循环,错误的是___
A. 为无色透明液体,有折光作用
B. 房水可维持正常的眼内压
C. 房水由睫状体产生,充填于眼前房
D. 眼前房和眼后房的压力大致相等
E. 房水循环受阻可导致眼内压增高
【单选题】
晶状体描述,错误的是___
A. 位于虹膜后方、玻璃体的前方
B. 呈双凸透镜状,无色透明,有丰富的血管和神经
C. 晶状体外面包以具有高度弹性的晶状体囊
D. 晶状体实质由平行排列的晶状体纤维所组成
E. 晶状体若因疾病或创伤而变混浊,称为白内障
推荐试题
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware