Practical of HIT-001 practice exam materials and questions pool for CompTIA certification for IT candidates, Real Success Guaranteed with Updated HIT-001 pdf dumps vce Materials. 100% PASS CompTIA Healthcare IT Technician Exam exam Today!
2016 Mar HIT-001 Study Guide Questions:
Q76. Which of the following best describes the term protocol?
A. The combination of cable type and access method used on a network.
B. A set of rules.
C. The ability to move data through layers of the OSI model.
D. The permissible amount of data contained in a packet.
Explanation: A protocol is a set of predefined rules that govern how two or more processes communicate and interact to exchange data. Protocols are considered as the building blocks of network communication. Computer protocols are used by communicating devices and software services to format data in a way that all participants understand. It provides a context in which to interpret communicated information.
Q77. The HIPAA act prevents disclosure of health information to which of the following?
A. The Patient
B. Patient Representatives
C. Department of Health and Human Services
D. Patient Employer
Explanation: HIPAA act does not allow a patient's health information to be disclosed to a patients employer. Answer: A is incorrect. The Patient is incorrect as the patient has a right to know any and all information pertinent to his/her medical care. Answer: B is incorrect. Patient representatives is incorrect as health information can be disclosed to anyone a patient designates to represent them such as a family member or attorney. Answer: C is incorrect. Department of Health and Human Services is incorrect as patient information may be disclosed to the Department of Health and Human Services when it is conducting a compliance investigation or review or enforcement action.
Q78. You are called into fix a workstation system crash on a machine which processes images from an magnetic resonance imaging facility. A patient is waiting in the MRI machine while you are trying to fix the problem so they can complete their exam. How should you interact with the patient?
A. Work rapidly and thoroughly to fix the problem, and allow the imaging tech or medical assistants to interact and reassure the patient.
B. Ask the patient why they are in for testing.
C. Complain loudly to the imaging tech that they have been using the wrong method to call up the incorrect programs and that has caused the system problems.
D. Ask how they are feeling and assure them that you will fix the problem soon.
Explanation: It is not part of your job to interact with the patient. Being respectful if asked a direct QUESTION NO: but your job is to fix the system and be polite, not to interact with the patient. Answer: D is incorrect. Patients require privacy and understanding. Do not ask any intrusive QUESTION NO: not your job to interact with the patient. Let the medical assistants or imaging techs to their job to reassure the patient. Answer: B is incorrect. Do not ask the patient any QUESTION NO: or their health. This is not your job and it is invasive of the patient's privacy. Answer: C is incorrect. Remonstrating other employees in front of a patient while the patient is in a vulnerable position is not professional behavior. Fix the problem, and then arrange to meet with the imaging tech at a later time to explain what they may be
Q79. For what period of time do all primary dental records be retained?
A. 4 years
B. 6 years
C. 30 years
D. 10 years
Explanation: All primary dental records must be retained for a period of at least 4 years from the date of the patient's last episode of care. Answer: B is incorrect. 6 years is incorrect as this is the amount of time in which all materials containing HIPAA information must be kept. Answer: D is incorrect. 10 years is incorrect as this is the amount of time all primary medical records must be retained. Answer: C is incorrect. 30 years is incorrect as no medical information is required to be retained for 30 years.
Q80. Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.
Explanation: The ping and TRACERT tools are used to determine the hop counts of an IP packet. The ping command-line utility is used to test connectivity with a host on a TCP/IP-based network. This is achieved by sending out a series of packets to a specified destination host. On receiving the packets, the destination host responds with a series of replies. These replies can be used to determine whether or not the network is working properly. TRACERT utility is used to trace the path taken by TCP/IP packets to a remote computer. It traces and reports each router or gateway crossed by a TCP/IP packet on its way to the remote host. The TRACERT utility can be used with the target computer's name or IP address. It is used to detect and resolve network connection problems. Answer: A is incorrect. The netstat command displays protocol-related statistics and the state of current TCP/IP connections. It is used to get information about the open connections on a computer, incoming and outgoing data, as well as the ports of remote computers to which the computer is connected. The netstat command gets all this networking information by reading the kernel routing tables in the memory. Answer: D is incorrect. IPCONFIG is a command-line utility that displays the current TCP/IP configuration, such as the IP address, subnet mask, default gateway, etc. of a networked computer. It refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Users can run IPCONFIG from the command prompt whenever they need to know the status of a computer's TCP/IP configuration.
Improved HIT-001 exam fees:
Q81. Which of the following methods/applications can be used to send invitations for remote assistance in Windows XP Professional? Each correct answer represents a complete solution. Choose two.
A. Yahoo Messenger
C. Windows Messenger
D. Internet Explorer
Explanation: The following two methods can be used to send invitation for remote assistance in Windows XP Professional. E-mail. An e-mail client, configured on the computer, can be used to send invitations for remote assistance. Windows Messenger:Alternatively, if an e-mail client is not configured, Windows Messenger can also be used for sending invitations for remote assistance.
Q82. Which of the following work divisions is characterized by every member of the team performing a unique function, however, it is not performed in any particular sequence?
B. Unit Assembly
Explanation: Unit assembly is a type of work division in which each person performs a unique task, however, it may not be sequential Answer: C is incorrect. Serial is incorrect as this is a type of work division that is characterized by each person performing several tasks. Answer: D is incorrect. Parallel is incorrect as this is a type of work division that is characterized by each person performing several tasks. Answer: A is incorrect. Unilateral is incorrect as this is not a type of work division, This is meant as a distractor.
Q83. Which of the following tools are used for an indoor site survey? Each correct answer represents a complete solution. Choose all that apply.
A. Access point
B. Topography map
C. Spectrum analyzer
Explanation: Following are the tools that are used for an indoor site survey: Antenna. A wide variety of both omni-directional and indoor semi-directional antennas are used in every indoor site survey. Accesspoint. An access point is a wireless LAN device. It provides a means for wireless clients to send data to one another and to a wired network. AP connects to both wireless LAN and wired Ethernet LAN. Spectrum analyzer. A spectrum analyzer, or spectral analyzer, is a device that is used to examine the spectral composition of some electrical, acoustic, or optical waveform. It may also measure the power spectrum. The analog and digital spectrum analyzers are as follows: 1.An analog spectrum analyzer uses either a variable band-pass filter whose mid-frequency is automatically tuned (shifted, swept) through the range of frequencies of which the spectrum is to be measured. 2.A digital spectrum analyzer computes the discrete Fourier transform (DFT), a mathematical process that transforms a waveform into the components of its frequency spectrum. Answer: B is incorrect. A topography map is a tool used for an outdoor site survey. It is a detaileA, Dccurate graphic representation of cultural and natural features on the ground. These maps are based on topographical surveys performed at large scales.
Q84. A visiting IT professional is at an OBGYN practice and has been granted access to the computer system, but not the practice's paper records it's previous system of charting for patients. It's after standard work hours the IT professional is working late. He knows an ex-girlfriend used to be a patient at the practice and decides he wants to see her charts, since he can't find her in the computer. What simple Physical Safeguard would help fulfill HIPAA by protecting against the IT professional from accessing the practice's PHI?
A. The paper records are in locked the mobile charting cabinets in the check-in area.
B. The paper records are color coded.
C. The paper records are locked in storage room.
D. The paper records are kept in a series of drawers only known to the Privacy Officer.
Explanation: Under HIPAA, records must be in secure, locked storage when not in use. Option A is incorrect, because although the charts are locked, they are not secure. The cabinets could be moved out of the practice potentially, allowing for criminal break-in's off the premises. They must be secure and locked under HIPAA's rule. Option D is not a requirement of HIPAA and the records in this situation are neither locked nor secure. A determined person could find these drawers. Option B is incorrect. Color-coding usually has much more to do with the types of patients, but provides no protection against PHI theft.
Q85. Which of the following devices does SCSI support?Each correct answer represents a complete solution. Choose all that apply.
A. Hard disk drive
B. Sound card
C. CD drive
D. Tape drive
Explanation: Small Computer System Interface (SCSI) supports CD drive, tape drive, and hard disk drive.
Virtual HIT-001 free practice exam:
Q86. Which of the following protocols is used to securely transfer files from one host to another over the network?
Explanation: Secure File Transfer Protocol (SFTP) is used for secure, encrypted file transfers. SFTP is FTP over SSH and uses Secure Shell (SSH) for encryption and authentication. Answer: D is incorrect. FTP supports unencrypted authentication and file transfers between similar or dissimilar systems. Answer: A is incorrect. Trivial FTP (TFTP) is faster and less reliable than FTP for transferring files. It uses UDP to reduce overheads. It is less secure than FTP. Answer: C is incorrect. Telnet enables a host to connect and run a session on another host through remote terminal emulation. It is not a secure communication method.
Q87. Which of the following pieces of legislation insures the privacy and security of personal health information?
A. Patient Bill of Rights
Explanation: HIPPA is the legislation designed to insure the privacy and security of personal health information.
Q88. As a member of the hospital information technology team, you are asked to install an information system in which the nurses on the units can share information with emergency room staff. Which of the following types of information systems would you implement for this purpose?
A. External System
B. Departmental System
C. Enterprise System
D. Hospital Wide System
Explanation: A Hospital Wide System is a health information system that is designed for the integration of various departmental systems or one that provides the primary services for a hospital or clinical area. Answer: B is incorrect. Departmental System is incorrect as this type of hospital system is limited and serves the purposes of one department or domain. Examples are dose management systems that are used by pharmacies. Answer: C is incorrect. Enterprise system is incorrect as this type of system is designed for use for all departments that encompass a large health system including hospitals, clinics and nursing homes. Answer: A is incorrect. External system is incorrect as this type of system is shared by many health organizations to report information required by regulatory agencies or as an information exchange for regional health information networks.
Q89. Your past medical records including hospitalizations, physician visits and medication prescription are all examples of which of the following?
A. Archived Health Information
B. Individually Identifiable Health Information
C. Demographic Health Information
D. De-Indentified Health Information
Explanation: Individually Identifiable Health Information is information, including demographic information that relates to the individual's past, present or future physical or mental health or condition, the provision of health care to an individual or the past, present or future payment of health care provisions. Answer: A is incorrect. Archived Health Information is incorrect as this is health information that has been stored on some sort of media such as a compact disc, dvd or videotape. Answer: D is incorrect. De-identified health information is incorrect as this information requires removal of all data in which a patient can be identified such as name, date of birth, social security number and address. Answer: C is incorrect. Demographic Health Information is incorrect although, this is a part of individually identifiable health information, it contains no information regarding and individual's illness or treatment. Demographic information is the patient's name, date of birth, address, social security number, insurance information and contact information.
Q90. A user named Rick wants to configure a TCP/IP network at his residence. He has three computers. He chooses star topology to connect his computers. He wants to configure his computers with static IP addressing. Which of the following are the required parameters that he will configure for each computer on the network?Each correct answer represents a complete solution. Choose all that apply.
A. MAC Address
B. Subnet mask
C. IP address
D. Default gateway
Explanation: IP address and subnet mask are the required parameters to configure manual addressing for a computer on a TCP/IP network.