【单选题】
治疗中度妊高征(子痫)常用的药物组合___
A. 吗啡+甘露醇
B. 哌替啶+呋塞米
C. 硫酸镁+水合氯醛灌肠
D. 硫酸镁+低份子右旋醣酐
E. 硫酸镁+冬眠合剂
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
E
解析
暂无解析
相关试题
【单选题】
关于支气管哮喘的临床表现特征,下列哪项不妥___
A. 典型发作属呼气性呼吸困难
B. 为发作性疾病,可自行或用药后缓解
C. 发作时伴哮鸣音
D. 常在午间发作或加重
E. 每次发作,可历时数小时至数天
【单选题】
患者王女士,29岁,患支气管扩张10年,咳嗽,咳粘脓痰,痰量每天50ml,下述处理不当的是___
A. 体位引流
B. 加强营养
C. 限制饮水量1000ml/d
D. 给予祛痰剂
E. 给予雾化吸入
【单选题】
女性,24岁,月经周期28天,目前停经2个月,因少量阴道流血1天就诊。做B超检查,胚胎发育正常时该病例的B超可观察到___
A. 为自限性疾病
B. 多数预后良好
C. 血清补体降低
D. 血浆蛋白明显降低
E. 可出现轻、中度贫血
【单选题】
关于肺炎患者痰培养,下列哪种方法不正确___
A. 晨起深部痰液咳入无菌容器中
B. 在2小时内送检
C. 尽可能在未用抗生素之前
D. 可借助雾化吸入导痰
E. 任何时间的痰均可
【单选题】
持续性非卧床腹膜透析患者出现腹膜炎,下列护理措施哪项是错误的___
A. 用1000mL透析液连续冲洗3~5次
B. 暂时改作间歇性腹膜透析
C. 立即拔管
D. 腹膜透析内加抗生素
E. 全身应用抗生素
【单选题】
女性,20岁,未婚,因患滴虫性阴道炎,口服甲硝唑治疗。下列哪项不是甲硝唑的副作用___
A. 白细胞减少
B. 头痛
C. 恶心、呕吐等胃肠道反应
D. 药物性皮疹
E. 药物性泌乳
【单选题】
有关产前检查,正确的是___
A. 产前检查开始时间是孕12周
B. 孕24周开始建立围产期保健
C. 孕28周后每4周1次
D. 孕24周后每2周1次
E. 孕最后1个月每周检查1次
【单选题】
慢性肾炎有氮质血症的患者,饮食中蛋白质摄入量正确的是___
A. 应尽可能多的摄入优质蛋白,以增加抵抗力
B. 可以摄入,但应控制在0.1~0.2g/(kg?d)
C. 可以摄入,但应控制在0.3~0.4g/(kg?d)
D. 可以摄入,但应控制在0.5~0.8g/(kg?d)
E. 不能摄入蛋白质
【单选题】
30岁,既往月经正常,两年前产后大出血休克,此后一直闭经,贫血,脱发,无力。其诊断可能是___
A. 席汉氏综合征
B. 脱纳氏综合征
C. 多囊卵巢综合征
D. 药物抑制综合征
E. 闭经泌乳综合征
【单选题】
1500国际单位TAT脱敏注射法是___
A. 用等渗盐水稀释成10倍分4次肌注
B. 用等渗盐水稀释成10mL分3次肌注
C. 用等渗盐水稀释成10mL分4次肌注
D. 用注射用水稀释成10mL分4次肌注
E. 用注射用水稀释成10mL分3次肌注
推荐试题
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode