Ensurepass
Latest CompTIA HIT-001 Real Exam Download 401-410

 

 

QUESTION
Which of the following types of health information systems is designed to be shared by many health organizations to report information required by regulatory agencies?
A. Departmental System
B. External System
C. Hospital Wide System
D. Enterprise System
Correct Answer: B

 

 

QUESTION 402
Which of the following is the most common way of performing social engineering attacks?
A. War driving
B. Session hijacking
C. Email
D. Phone
Correct Answer: D

 

 

QUESTION 403
According to the USB 2.0 standard, what should be the maximum cable length between devices?
A. 4.5 meters
B. 10 meters
C. 5 meters
D. 1 meter
Correct Answer: C

 

 

QUESTION 404
A patient comes into the hospital with pain in her chest and the physician wants to determine if there are abnormalities in the electrical impulses of her heart that could indicate damage. What medical device measures the electrical signal of the heart and often prints it out in a wave鈥檚 format?
A. EKG
B. CT
C. EEG
D. Ultrasound
Correct Answer: A

 

 

QUESTION 405
The Joint Commission for the Accreditation of Healthcare Organizations requires a hospital medical record to be completed with what time frame after discharge?
A. 14 days
B. 7 days
C. 30 days
D. 24 hours
Correct Answer: C

 

 

QUESTION 406
Which of the following actions refer to the transmission of medical information directly from a medical device?
A. Device Capture
B. Clinical Imaging
C. Document Imaging
D. Document Archiving
Correct Answer: A

 

 

QUESTION 407
One important aspect of access security for both workstations and portable devices to protect PHI is the implementation of lockouts. What is a lockout?
A. Once an employee is terminated, resigns or ends his or her affiliation with the organization, their access is locked out promptly.
B. A stop point in a database where information cannot be added until an audit is performed of previous entries.
C. A physical lock on the access device or keyboard prevents unauthorized users for using the device or workstation.
D. Workers are logged off or locked out of a clinical application automatically after a predetermined period of inactivity, such as ten minutes.
Correct Answer: D

 

 

QUESTION 408
You are employed in a physician practice that consist of one physician, two office workers and sees only a few patients on a daily basis. Which of the following file systems would be appropriate for your facility?
A. Open Shelf Files
B. Filing Cabinets with Drawers
C. Compressible Units with Open Files
D. Motorized Revolving Files
Correct Answer: B

 

 

QUESTION 409
Maria works as a healthcare IT Technician for an organization. She has received an e-mail from the MN Compensation Office with the following message: Dear Sir/Madam, My name is Edgar Rena, the director of compensation here at the MN Compensation Office in Chicago. We receive so many complaints about fraudulent activities that have been taking place in your region for the past few years. Due to the high volume loss of money, the MN compensation department has had an agreement with the appropriate authority to compensate each victim with a sum of USD$500,000.00.You were selected among the list of people to be paid this sum. To avoid any imperative mood by intending scammers, your payment has been transmuted into an International bank draft which can be cashed at any local bank in your country. Please fill the below details and send it to our secretary for your compensation bank draft. Full name. ______Address.________Tel. ____________ Fill & Send to: Dr. Michael Brown MN Compensation Office, IL Tel. +1-866-233-8434 Email. micbrown@live.com
Further instructions shall be given to you by our secretary as soon as you contact him. To avoid losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to our secretary. Thanks and God bless. If Maria replies to this mail, which of the following attacks may she become vulnerable to?
A. Phishing attack
B. Spamming
C. SYN attack
D. Mail bombing
Correct Answer: A

 

 

QUESTION 410
Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE 802.11 wireless networks. What are the goals of WEP? Each correct answer represents a complete solution.
Choose all that apply.
A. Data Integrity
B. Accessibility
C. Adaptability
D. Confidentiality
E. Access Control
Correct Answer: ACDE

Comments are closed.