[Free] Download New Updated (December) CompTIA HIT-001 Exam Questions 401-410

Ensurepass

QUESTION 401

Which of the following types of health information systems is designed to be shared by many health organizations to report information required by regulatory agencies?

 

A.     Departmental System

B.     External System

C.     Hospital Wide System

D.     Enterprise System

 

Correct Answer: B

 

 

QUESTION 402

Which of the following is the most common way of performing social engineering attacks?

 

A.     War driving

B.     Session hijacking


C.    
Email

D.     Phone

 

Correct Answer: D

 

 

QUESTION 403

According to the USB 2.0 standard, what should be the maximum cable length between devices?

 

A.     4.5 meters

B.     10 meters

C.     5 meters

D.     1 meter

 

Correct Answer: C

 

 

QUESTION 404

A patient comes into the hospital with pain in her chest and the physician wants to determine if there are abnormalities in the el
ectrical impulses of her heart that could indicate damage. What medical device measures the electrical signal of the heart and often prints it out in a wave’s format?

 

A.     EKG

B.     CT

C.     EEG

D.     Ultrasound

 

Correct Answer: A

 

 

QUESTION 405

The Joint Commission for the Accreditation of Healthcare Organizations requires a hospital medical record to be completed with what time frame after discharge?

 

A.     14 days

B.     7 days

C.     30 days

D.     24 hours

 

Correct Answer: C

 

 

QUESTION 406

Which of the following actions refer to the transmission of medical information directly from a medical device?

 

A.     Device Capture

B.     Clinical Imaging

C.     Document Imaging

D.     Document Archiving

 

Correct Answer: A

 

QUESTION 407

One important aspect of access security for both workstations and portable devices to protect PHI is the implementation of lockouts. What is a lockout?

 

A.
    
Once an employee is terminated, resigns or ends his or her affiliation with the organization, their access is locked out promptly.

B.     A stop point in a database where information cannot be added until an audit is performed of previous entries.

C.     A physical lock on the access device or keyboard prevents unauthorized users for using the device or workstation.

D.     Workers are logged off or locked out of a clinical application automatically after a predetermined period of inactivity, such as ten minutes.

 

Correct Answer: D

 

 

QUESTION 408

You are employed in a physician practice that consist of one physician, two office workers and sees only a few patients on a daily basis. Which of the following file systems would be appropriate for your facility?

 

A.     Open Shelf Files

B.     Filing Cabinets with Drawers

C.     Compressible Units with Open Files

D.     Motorized Revolving Files

 

Correct Answer: B

 

 

QUESTION 409

Maria works as a healthcare IT Technician for an organization. She has received an e-mail from the MN Compensation Office with the following message: Dear Sir/Madam, My name is Edgar Rena, the director of compensation here at the MN Compensation Office in Chicago. We receive so many complaints about fraudulent activities that have been taking place in your region for the past few years. Due to the high volume loss of money, the MN compensation department has had an agreement with the appropriate authority to compensate each victim with a sum of USD$500,000.00.You were selected among the list of people to be paid this sum. To avoid any imperative mood by intending scammers, your payment has been transmuted into an International bank draft which can be cashed at any local bank in your country. Please fill the below details and send it to our secretary for your compensation bank draft. Full name. ______Address.________Tel. ____________ Fill & Send to: Dr. Michael Brown MN Compensation Office, IL Tel. +1-866-233-8434 Email. micbrown@live.com

Further instructions shall be given to you by our secretary as soon as you contact him. To avoid losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to our secretary. Thanks and God bless. If Maria replies to this mail, which of the following attacks may she become vulnerable to?

 

A.     Phishing attack

B.     Spamming

C.     SYN attack

D.     Mail bombing

 

Correct Answer: A

 

 

QUESTION 410

Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE 802.11 wireless networks. What are the goals of WEP? Each correct answer represents a complete solution.

Choose all that apply.

 

A.     Data Integrity

B.     Accessibility

C.     Adaptability

D.     Confidentiality

E.      Access Control

 

Correct Answer: ACDE

 

Free VCE & PDF File for CompTIA HIT-001 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in HIT-001 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.