【单选题】
术前不必用阿托品的麻醉是___
A. 吸入麻醉
B. 腰麻
C. 静脉麻醉
D. 硬膜外麻醉
E. 肌内注射麻醉
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
全麻前给予阿托品的作用是___
A. 镇静
B. 镇痛
C. 增强麻醉镇痛效果
D. 防止呕吐物误吸
E. 减少呼吸道分泌物
【单选题】
麻醉前用药一般在麻醉前___
A. 15分钟
B. 30分钟
C. 45分钟
D. 1小时
E. 2小时
【单选题】
患者,女性,38岁。局麻下行纤维瘤摘除术,术中用1%普鲁卡因150ml后出现嗜睡.心律失常.血压下降。首先考虑是___
A. 兴奋性中毒反应
B. 抑制性中毒反应
C. 癔症发作
D. 中毒性休克
E. 变态反应
【单选题】
腰麻后最常见的并发症是___
A. 全脊髓麻醉
B. 血压下降
C. 马尾神经损伤
D. 头痛
E. 尿潴留
【单选题】
腰麻后患者常规采用的体位___
A. 去枕平卧2~4小时
B. 去枕平卧8~10小时
C. 去枕平卧6~8小时
D. 去枕平卧4~6小时
E. 不去枕平卧4~6小时
【单选题】
患者,女性,36岁。因甲亢长期服药无效,拟在颈丛麻醉下行甲状腺大部切除术,术前不宜选用___
A. 东莨菪碱
B. 巴比妥类
C. 阿托品
D. 地西泮
E. 氟哌利多
【单选题】
全麻患者将下颌托起是防止___
A. 喉头水肿
B. 舌后坠
C. 喉痉挛
D. 对抗麻醉剂毒性反应
E. 呼吸道分泌物增多
【单选题】
全身麻醉前使用阿托品的目的是___
A. 抑制腺体分泌
B. 抑制迷走神经兴奋
C. 增强对局部麻醉药的耐受性
D. 镇静.催眠作用
E. 减轻麻醉药物毒性反应
【单选题】
麻醉药物阻滞注入手术区周围的神经纤维是___
A. 区域阻滞麻醉
B. 粘膜表面麻醉
C. 局部浸润麻醉
D. 神经干阻滞麻醉
E. 椎管内麻醉
【单选题】
甲亢.高热患者不宜使用___
A. 阿托品
B. 苯巴比妥钠
C. 吗啡
D. 氯丙嗪
E. 哌替啶
【单选题】
治疗急性非淋巴细胞白血病的联合化疗方案,以下哪项不适用___
A. 阿糖胞苷+柔红霉素(DA)
B. 长春新碱+泼尼松(VP)
C. 长春新碱+阿霉素+阿糖胞苷+泼尼松(VAPA)
D. 柔红霉素+阿糖胞苷+硫鸟嘌呤(DAT)
E. 三尖杉酯碱+阿糖细胞苷+长春新碱+泼尼松(HOAP)
【单选题】
有关急性型特发性血小板减少性紫癜的临床表现描述,下列错误的是___
A. 好发于儿童
B. 起病前有感染史
C. 病程多为自限性
D. 出血部位下肢最多
E. 痊愈后经常要复发
【单选题】
特发性血小板减少性紫癜患者血小板相关抗体的产生部位是___
A. 脾
B. 肝
C. 胃
D. 十二指肠球部
E. 回盲部
【单选题】
由血小板.血管壁.功能异常引起的出血性疾病,其临床特点应除外___
A. 多见于女性
B. 常有家族史
C. 多自发出血
D. 皮肤粘膜瘀点或瘀斑
E. 病程短暂,反复发作
【单选题】
血友病中主要缺乏凝血因子___
A. 凝血因子Ⅷ
B. 凝血因子Ⅸ
C. 凝血因子Ⅴ
D. 凝血因子Ⅵ
E. 凝血因子Ⅶ
【单选题】
慢性淋巴细胞性白血病(慢淋白血病)常以何症状为就诊的首发症状是___
A. 疲乏
B. 消瘦
C. 低热
D. 食欲减退
E. 淋巴结肿大
【单选题】
下列是关于慢性白血病的论述错误的是___
A. 慢性急变用原方案化学治疗无效
B. 慢性急变患者大多预后不良
C. 约半数以上可急变
D. 大多数急性转化而来
E. 国内以慢性粒细胞白血病多见
【单选题】
急性白血病患者口腔护理的主要目的是___
A. 预防细菌感染
B. 增进食欲
C. 祛除氨臭
D. 发现口腔粘膜损害
E. 防治病毒感染
【单选题】
护士夜间巡视病区,发现一型急性白血病患者突然出现烦躁不安.呕吐.头痛颈项强直,此患者是___
A. 颅内出血
B. 牙龈出血
C. 消化道出血
D. 皮肤出血
E. 粘膜出血
【单选题】
特发性血小板减少性紫癜的实验室检查中,下列哪一项正常___
A. 毛细血管脆性试验
B. 血块退缩试验
C. 血小板计数
D. 凝血时间
E. 出血时间
【单选题】
腰椎棘突做骨髓穿刺应取何种体位___
A. 仰卧位
B. 侧卧位
C. 坐位
D. 平卧位
E. 端坐卧位
【单选题】
急性白血病诊断最可靠的依据___
A. 有肝脾淋巴结肿大
B. 血白细胞数剧增或剧减
C. 骨髓象见较多中幼及晚幼白细胞
D. 有出血.贫血.感染三大症状
E. 骨髓象见原始白细胞超过30%
【单选题】
急性白血病的临床表现为___
A. 发热.贫血
B. 出血.感染
C. 各器官浸润.出血
D. 贫血.出血
E. 贫血.出血.发热和感染,以及各器官浸润
【单选题】
治疗血友病最有效的止血方法___
A. 应用抗纤溶剂
B. 压迫止血
C. 1-去氨-8-D-精氨酸-加压素
D. 补充凝血因子
E. 应用肾上腺糖皮质激素
【单选题】
急性溶血患者尿中可出现___
A. 血尿
B. 脓尿
C. 蛋白尿
D. 乳糜尿
E. 血红蛋白尿
【单选题】
骨髓穿刺应抽取多少骨髓液滴于载玻片上___
A. 0.1~0.2ml
B. 0.5~1.0ml
C. 2~4ml
D. 0.2~0.4ml
E. 1~2ml
【单选题】
急性白血病与再生障碍性贫血最主要的鉴别检查项目是___
A. 骨髓象
B. 血细胞计数
C. 网织红细胞绝对值
D. 肝脾淋巴结有否肿大
E. 血涂片找幼稚细胞
【单选题】
诊断贫血的血液检查中,以下什么降低最重要___
A. 红细胞
B. 血小板
C. 血红蛋白
D. 血细胞比容
E. 网织红细胞计数
【单选题】
铁剂最佳给药时间___
A. 两餐之间
B. 餐中
C. 餐前
D. 睡前
E. 早晨空腹
【单选题】
鞘内注射化疗药物的护理措施下列不妥的是___
A. 患者取侧卧位
B. 腰椎穿刺给药
C. 推注药物宜慢
D. 注毕去枕平卧3~4小时
E. 注意观察有无头痛等反应
【单选题】
缺铁性贫血最常见的原因___
A. 铁吸收不良
B. 慢性失血
C. 铁摄入不足
D. 红细胞本身缺陷
E. 铁需要量增加
【单选题】
观察铁剂治疗效果最早的检验指标是___
A. 红细胞数升高
B. 血红蛋白量升高
C. 血细胞比容升高
D. 网织红细胞计数升高
E. 骨髓铁粒幼细胞计数升高
【单选题】
脑膜白血病,作鞘内注射常用的化疗药物___
A. 长春新碱(VCR)
B. CTX
C. TX
D. 红霉素
E. 霉素
【单选题】
再生障碍性贫血应用雄激素治疗的作用机制是刺激骨髓而促使___
A. 红细胞增多
B. 白细胞增多
C. 血小板增多
D. 全血细胞增多
E. 网织红细胞增多
【单选题】
急性白血病进行移植的最佳时间主要在___
A. 第一次完全缓解期
B. 第一次急性发作期
C. 脑膜白血病的早期
D. 脑膜白血病恢复期
E. 未使用化疗药物前
【单选题】
临床上再生障碍性贫血一般无___
A. 贫血
B. 出血
C. 感染
D. 全血细胞减少
E. 肝.脾.淋巴结肿大
【单选题】
下列哪一项不符缺铁性贫血的实验室检查___
A. 血象为小细胞低色素性贫血
B. 骨髓象以中晚幼红细胞为主
C. 骨髓涂片示骨髓细胞外铁消失
D. 红细胞原卟啉升高
E. 血清总铁结合力下降
【单选题】
为预防尿酸性肾病的发生,化疗期间可口服___
A. 丙磺舒
B. 磺吡酮
C. 苯澳马隆
D. 别嘌呤醇
E. 秋水仙碱
【单选题】
白血病患者的对症护理,下列哪项不妥___
A. 颅内出血患者禁忌输入血小板
B. 骨痛难忍时及早给予镇痛剂
C. 严重贫血者在床上用膳排便
D. 鼻出血可用局部冷敷和填塞法
E. 发热患者必要时给退热药,不宜酒精擦身
【单选题】
中度贫血是指血红蛋白在___
A. <30g/L
B. 60~90g/L
C. 80~100g/L
D. 90~100g/L
E. 110~140g/L
推荐试题
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic