【单选题】
心肺脑复苏时,应用20%甘露醇的主要作用是___
A. 防治脑水肿
B. 防治肺水肿
C. 防治酸中毒
D. 防治体循环淤血
E. 防止高血钾
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
A
解析
暂无解析
相关试题
【单选题】
急性肾衰竭少尿或无尿期应控制血清钾升高,其相应的措施不包括___
A. 严格限制含钾食物
B. 可以输入库存血
C. 严格限制含钾药物
D. 可遵医嘱服用碱性药物
E. 高渗葡萄糖加胰岛素静滴
【单选题】
下列对缩宫素静脉滴注叙述正确的是___
A. 用于协调性子宫收缩乏力,以加强宫缩
B. 胎儿窘迫时用于加速产程
C. 滴注的速度及剂量始终保持一致
D. 孕妇根据情况自行调节滴速
E. 用于初产妇引产不敏感
【单选题】
患者男性,36岁。近日头晕、乏力,活动后症状加重伴心慌、气促,在骨髓图片中肉眼可看到脂肪滴,骨髓结果回报:骨髓增生减低;三系细胞均有不同程度的减少,慢性再障诊断成立。目前首选的治疗药物是___
A. 糖皮质激素
B. 盐皮质激素
C. 雄激素
D. 雌激素
E. 抗胸腺细胞球蛋白和抗淋巴细胞球蛋白
【单选题】
患者男性,50岁。突然大量呕血,既往无腹痛病史,体温36.5℃,脉搏96次/分,血压96/70mmHg,巩膜黄染,肝未触及.脾大肋下4cm,血红细胞32.0×10[~12.gif]/L,HB:70g/L,白细胞6.5×10/L,血细胞80×10/L,可拟诊断为___
A. 食管胃底静脉破裂出血
B. 胃癌出血
C. 应激性溃疡出血
D. 胆道出血
E. 溃疡病出血
【单选题】
抗甲状腺药物引起外周血白细胞减少时的停药指征为___
A. 白细胞<6000个/mm或中性粒细胞<1000个/mm
B. 白细胞<4000个/mm或中性粒细胞<1000个/mm
C. 白细胞<3500个/mm或中性粒细胞<2500个/mm
D. 白细胞<3000个/mm或中性粒细胞<1500个/mm
E. 白细胞<5000个/mm或中性粒细胞<500个/mm
【单选题】
关于双合诊检查,下列不正确的是___
A. 双合诊是盆腔检查最常用的方法
B. 方法是一手入阴道,另一手按下腹部,双手配合进行
C. 检查前须排空膀胱
D. 正常情况下可摸到卵巢
E. 正常输卵管不能扪到
【单选题】
王先生,40岁。因出血呈休克,经扩容疗法后血压和中心静脉压在正常范围内,但尿量18ml/h,尿比重1.010,应提示___
A. 血容量仍不足
B. 急性肾衰
C. 急性心力衰竭
D. 急性肺衰
E. 抗利尿激素分泌过多
【单选题】
中毒型细菌性痢疾的患儿需做粪检查时,下列不正确操作是___
A. 尽早选取脓血部分
B. 应多次送检
C. 无腹泻可用冷盐水灌肠取便
D. 必要时可重复进行灌肠取便
E. 粪便可提前留取
【单选题】
关于滴虫阴道炎临床表现正确的是___
A. 外阴瘙痒,红肿
B. 悬滴法找到白细胞增多
C. 阴道pH4.5
D. 阴道黏膜上附着白带,擦后露出红肿黏膜面
E. 稀薄泡沫状白带增多
推荐试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT