【单选题】
患者男性,36岁,左下胸受挤压,左8.9.10肋骨骨折,脾破裂。面色苍白.四肢湿冷,脉搏122次/分,血压10.6/8kPa(80/60mmHg)。正确的处理原则是___
A. 大量快速输液待血压正常后手术
B. 一旦确诊立即手术
C. 积极抗休克,如病情无好转再手术
D. 积极抗休克同时迅速手术
E. 快速大量输血,待病情稳定后手术
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
观察休克患者血管痉挛严重程度的主要依据是___
A. 呼吸深浅
B. 意识情况
C. 脉压大小
D. 脉搏快慢
E. 肢端温度
【单选题】
在下列抗休克措施中,错误的是___
A. 吸氧.静脉输液
B. 平卧位
C. 置热水袋加温
D. 测中心静脉压
E. 观测尿量
【单选题】
内脏器官的损害一般在休克发生多长时间出现___
A. >16小时
B. >8小时
C. >10小时
D. >12小时
E. >24小时
【单选题】
上消化道大出血患者错误的护理措施是___
A. 平卧位.头偏向一侧
B. 严密观察出血量和色
C. 尽量鼓励患者起床排便
D. 绝对卧床
E. 大量呕血者须暂禁食
【单选题】
诊断早期原发性肝癌最有价值的方法是___
A. γ-GT
B. AFP的动态观察
C. CEA
D. CT
E. MRI
【单选题】
给上消化道出血患者做胃镜检查的适宜时间是___
A. 出血后24~48小时内
B. 出血后72小时内
C. 出血停止后10天
D. 出血停止后1周内
E. 出血停止后2周内
【单选题】
对消化系统疾病患者的护理,不正确的是___
A. 腹胀时可肛门排气
B. 消化道出血后不宜立即灌肠
C. 便秘时多吃水果
D. 腹泻时可服高蛋白高脂饮食
E. 做好口腔护理
【单选题】
确诊慢性胃炎的主要检查方法为___
A. 胃镜
B. X线
C. 胃液分析
D. 血清Hp抗体
E. 大便隐血试验
【单选题】
成人每天分泌的小肠液量为___
A. 100~200ml
B. 300~400ml
C. 500~600ml
D. 1000~3000ml
E. 4000~5000ml
【单选题】
护理肝性脑病患者,最为关键的措施是___
A. 注意休息
B. 避免诱因
C. 加强安全
D. 观察病情变化
E. 用药指导
【单选题】
急性胰腺炎患者的主要临床表现是___
A. 发热
B. 腹痛
C. 腹泻
D. 呕吐
E. 休克
【单选题】
下列何种药物可抑制大脑中假神经递质的形成___
A. 苯乙酸
B. 谷氨酸钾
C. 支链氨基酸
D. 苯甲酸钠
E. 鸟氨酸门冬氨酸
【单选题】
原发性肝癌的最好根治方法是___
A. 放射治疗
B. 化学治疗
C. 手术治疗
D. 免疫治疗
E. 雾化治疗
【单选题】
急性胰腺炎属于哪一类性质的炎症___
A. 感染性炎症
B. 无菌性炎症
C. 免疫性炎症
D. 化学性炎症
E. 化脓性炎症
【单选题】
原发性肝癌的预防最重要的措施是___
A. 休息
B. 调节饮食,注意卫生
C. 不吃霉变食品和粮食
D. 忌服对肝脏有损药物
E. 防霉.防毒.防肝炎
【单选题】
慢性胃炎胃酸缺乏引起消化不良者宜选用___
A. 陈香露片
B. 硫糖铝
C. 多潘立酮(吗丁啉)
D. 雷尼替丁
E. 胃酶合剂
【单选题】
与急性出血坏死型胰腺炎的临床表现不符是___
A. 无腹膜炎表现
B. 呼吸衰竭
C. 代谢性酸中毒
D. 脐周皮肤青紫
E. 高热持续不退
【单选题】
慢性胃体炎的发病主要由下列哪一种因素引起___
A. 自身免疫反应
B. 饮食不当
C. 高盐饮食
D. 应激因素
【单选题】
最能诊断溃疡病穿孔的是___
A. 剧烈腹痛
B. 呕血
C. 板状腹
D. 休克
E. X线检查见膈下游离气体
【单选题】
胃肠粘膜的损害因素,不正确的是___
A. 前列腺素E
B. 吸烟
C. 过度精神紧张
D. 刺激性饮食
E. 地塞米松
【单选题】
肠结核的主要感染途径是___
A. 胃肠道感染
B. 血行播散
C. 直接蔓延
D. 淋巴播散
E. 皮肤接触
【单选题】
最易导致幽门梗阻症状的溃疡是___
A. 胃溃疡
B. 十二指肠溃疡
C. 球后溃疡
D. 幽门管溃疡
E. 胃多发性溃疡
【单选题】
与幽门螺旋杆菌密切相关的疾病是___
A. 慢性胃炎.消化性溃疡.炎症性肠病
B. 慢性胃炎.消化性溃疡.胃癌
C. 慢性胃炎.消化性溃疡.胃平滑肌瘤
D. 肥厚性胃炎.Zollinger-Ellison综合征.贲门失弛缓综合征
E. lison综合征.贲门失弛缓综合征
【单选题】
上消化道大量出血后,患者下列检查可升高的是___
A. 血红蛋白
B. 血尿素氮
C. 血尿酸
D. 血红细胞
【单选题】
溃疡病患者宜少量多餐,其意义是___
A. 避免胃窦部过度扩张
B. 减慢胃排空
C. 减少胆汁反流
D. 促进胃液分泌
E. 中和胃酸
【单选题】
肝性脑病患者出现烦躁不安时,最好选用___
A. 氯丙嗪
B. 吗啡
C. 地西泮
D. 硫芬妥纳
E. 哌替啶
【单选题】
不属于门静脉高压的侧支循环___
A. 食管下段静脉曲张
B. 脐周静脉曲张
C. 腹壁静脉曲张
D. 痔静脉曲张
E. 下肢静脉曲张
【单选题】
肝性脑病患者使用精氨酸的目的是___
A. 保护肝细胞
B. 使肠内呈酸性,减少氨吸收
C. 减少锰中毒
D. 抑制脑内假神经递质合成
E. 与游离氨结合,从而降低血氨
【单选题】
患者,男性,46岁,有嗜酒史。近2年来常感腹胀,食欲减退,齿龈出血,但仍坚持工作。最近1周来下肢水肿明显,昨晚呕血后进入昏迷状态。应考虑___
A. 肝性脑病
B. 乙醇(酒精)中毒性昏迷
C. 糖尿病酮症昏迷
D. 尿毒症性昏迷
E. 低血糖昏迷
【单选题】
患者,男性,52岁,中午饱餐1小时后突然出现中.上腹部剧烈的刀割样疼痛,且向腰背部放射,继而呕出胆汁,伴高热.面色苍白。急诊入院检查时全腹疼痛,腹肌强直。紧急处理措施不妥的是___
A. 静脉输液
B. CT检查
C. 检查
D. 解痉止痛
E. 鼻饲流质
【单选题】
肝穿刺的部位___
A. 右锁骨中线第2肋间
B. 右腋中线第8~9肋间
C. 右锁骨中线第9~10肋间
D. 右锁骨中线第5~6肋间
E. 右腋中线第9~10肋间
【单选题】
原发性肝癌早期诊断的主要血检指标是___
A. AFP
B. ALT
C. AST
D. LDHE
E. 血清铁蛋白
【单选题】
当前诊断小肝癌和微小肝癌的最佳检查方法是___
A. 超
B. T
C. 穿刺活检
D. 线肝血管造影
E. 射性核素肝显像
【单选题】
主细胞分泌___
A. 碱性黏液
B. 盐酸
C. 胃泌素
D. 胃蛋白酶原
E. 胃液
【单选题】
十二指肠溃疡发生的原因主要是___
A. 吸烟
B. 喝酒
C. 损害因素增强
D. 粘膜修复快
E. 胃液减少
【单选题】
幽门梗阻时呕吐特点___
A. 鲜血
B. 咖啡样
C. 喷射性
D. 隔夜食物
E. 食后即吐
【单选题】
腹泻时应观察患者以下何种表现___
A. 食欲不振
B. 恶心呕吐
C. 烦躁不安
D. 脱水或电解质紊乱
E. 头痛
【单选题】
急性胰腺炎患者为抑制或减少胰液分泌的措施是___
A. 补充液体
B. 吸氧
C. 胃肠减压
D. 纠正休克
E. 解痉镇痛
【单选题】
呈喷射状呕吐的是___
A. 急性胃炎
B. 胃溃疡
C. 慢性胃炎
D. 颅内高压症
E. 十二指肠溃疡
【单选题】
小肠病变引起的腹痛部位为___
A. 上腹正中
B. 左下腹
C. 右肋下
D. 右下腹
E. 脐周
推荐试题
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200