[Free] Download New Updated (December) CompTIA HIT-001 Exam Questions 401-410



Which of the following types of health information systems is designed to be shared by many health organizations to report information required by regulatory agencies?


A.     Departmental System

B.     External System

C.     Hospital Wide System

D.     Enterprise System


Correct Answer: B




Which of the following is the most common way of performing social engineering attacks?


A.     War driving

B.     Session hijacking


D.     Phone


Correct Answer: D




According to the USB 2.0 standard, what should be the maximum cable length between devices?


A.     4.5 meters

B.     10 meters

C.     5 meters

D.     1 meter


Correct Answer: C




A patient comes into the hospital with pain in her chest and the physician wants to determine if there are abnormalities in the el
ectrical impulses of her heart that could indicate damage. What medical device measures the electrical signal of the heart and often prints it out in a wave’s format?


A.     EKG

B.     CT

C.     EEG

D.     Ultrasound


Correct Answer: A




The Joint Commission for the Accreditation of Healthcare Organizations requires a hospital medical record to be completed with what time frame after discharge?


A.     14 days

B.     7 days

C.     30 days

D.     24 hours


Correct Answer: C




Which of the following actions refer to the transmission of medical information directly from a medical device?


A.     Device Capture

B.     Clinical Imaging

C.     Document Imaging

D.     Document Archiving


Correct Answer: A



One important aspect of access security for both workstations and portable devices to protect PHI is the implementation of lockouts. What is a lockout?


Once an employee is terminated, resigns or ends his or her affiliation with the organization, their access is locked out promptly.

B.     A stop point in a database where information cannot be added until an audit is performed of previous entries.

C.     A physical lock on the access device or keyboard prevents unauthorized users for using the device or workstation.

D.     Workers are logged off or locked out of a clinical application automatically after a predetermined period of inactivity, such as ten minutes.


Correct Answer: D




You are employed in a physician practice that consist of one physician, two office workers and sees only a few patients on a daily basis. Which of the following file systems would be appropriate for your facility?


A.     Open Shelf Files

B.     Filing Cabinets with Drawers

C.     Compressible Units with Open Files

D.     Motorized Revolving Files


Correct Answer: B




Maria works as a healthcare IT Technician for an organization. She has received an e-mail from the MN Compensation Office with the following message: Dear Sir/Madam, My name is Edgar Rena, the director of compensation here at the MN Compensation Office in Chicago. We receive so many complaints about fraudulent activities that have been taking place in your region for the past few years. Due to the high volume loss of money, the MN compensation department has had an agreement with the appropriate authority to compensate each victim with a sum of USD$500,000.00.You were selected among the list of people to be paid this sum. To avoid any imperative mood by intending scammers, your payment has been transmuted into an International bank draft which can be cashed at any local bank in your country. Please fill the below details and send it to our secretary for your compensation bank draft. Full name. ______Address.________Tel. ____________ Fill & Send to: Dr. Michael Brown MN Compensation Office, IL Tel. +1-866-233-8434 Email. micbrown@live.com

Further instructions shall be given to you by our secretary as soon as you contact him. To avoid losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to our secretary. Thanks and God bless. If Maria replies to this mail, which of the following attacks may she become vulnerable to?


A.     Phishing attack

B.     Spamming

C.     SYN attack

D.     Mail bombing


Correct Answer: A




Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE 802.11 wireless networks. What are the goals of WEP? Each correct answer represents a complete solution.

Choose all that apply.


A.     Data Integrity

B.     Accessibility

C.     Adaptability

D.     Confidentiality

E.      Access Control


Correct Answer: ACDE


Free VCE & PDF File for CompTIA HIT-001 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized. Bookmark the permalink.