The CompTIA HIT-001 questions and answers tend to be up to date through the technical engineers live. Youre going to get the newest simulated check queries that are in step with the existing CompTIA exam. A lot more notably, the up-date date lengthy in order to A hundred and eighty nights, displaying you will probably have half any seasons time to study HIT-001 puts.
2016 Jun HIT-001 exam fees
Q351. Which of the following methods can be helpful to eliminate social engineering threat?Each correct answer represents a complete solution. Choose three.
A. Data encryption
B. Vulnerability assessments
C. Data classification
D. Password policies
Explanation: The following methods can be helpful to eliminate social engineering threat:Password policiesVulnerability assessmentsData classificationPassword policy should specify that how the password can be shared.Company should implement periodic penetration and vulnerability assessments. These assessments usually consist of using known hacker tools and common hacker techniques to breach a network security. Social engineering should also be used for an accurate assessment. Since social engineers use the knowledge of others to attain information, it is essential to have a data classification model in place that all employees know and follow. Data classification assigns level of sensitivity of company information. Each classification level specifies that who can view and edit data, and how it can be shared.
Q352. As a member of the hospital information technology team, you are asked to install an information system in which the nurses on the units can share information with emergency room staff. Which of the following types of information systems would you implement for this purpose?
A. Enterprise System
B. Departmental System
C. External System
D. Hospital Wide System
Explanation: A Hospital Wide System is a health information system that is designed for the integration of various departmental systems or one that provides the primary services for a hospital or clinical area. Answer: B is incorrect. Departmental System is incorrect as this type of hospital system is limited and serves the purposes of one department or domain. Examples are dose management systems that are used by pharmacies. Answer: A is incorrect. Enterprise system is incorrect as this type of system is designed for use for all departments that encompass a large health system including hospitals, clinics and nursing homes. Answer: C is incorrect. External system is incorrect as this type of system is shared by many health organizations to report information required by regulatory agencies or as an information exchange for regional health information networks.
Q353. Which of the following commands can you use to manually force a client to re-register itself with a dynamic DNS server?
A. IPCONFIG /renew
B. IPCONFIG /release
C. IPCONFIG /registerdns
D. NBTSTAT -rr E. DNS /rr
Explanation: To ensure that all names are correctly registered when you restart the DHCP client service, you should type the ipconfig command with the registerdns switch. IPCONFIG /renew refreshes the DHCP lease. IPCONFIG /release releases the DHCP option. When you run the NBTSTAT -rr command at a command prompt, the names of the WINS client can be re-registered in the WINS database.
Q354. Which of the following tools is used for an outdoor site survey?
A. Spectrum analyzer
C. Topography map
D. Access point
Explanation: A topography map is a tool used for an outdoor site survey. It is a detaileA, Dccurate graphic representation of cultural and natural features on the ground. These maps are based on topographical surveys performed at large scales. Answer: B, D, and A are incorrect. Following are the tools that are used for an indoor site survey:Antenna. A wide variety of both omni-directional and indoor semi-directional antennas are used in every indoor site survey. Access point. An access point is a wireless LAN device. It provides a means for wireless clients to send data to one another and to a wired network. AP connects to both wireless LAN and wired Ethernet LAN. Spectrum analyzer. A spectrum analyzer, or spectral analyzer, is a device that is used to examine the spectral composition of some electrical, acoustic, or optical waveform. It may also measure the power spectrum.The analog and digital spectrum analyzers are as follows: 1.An analog spectrum analyzer uses either a variable band-pass filter whose mid-frequency is automatically tuned (shifted, swept) through the range of frequencies of which the spectrum is to be measured. 2.A digital spectrum analyzer computes the discrete Fourier transform (DFT), a mathematical process that transforms a waveform into the components of its frequency spectrum.
Q355. Which of the following refers to the group of health care subject matter experts and information scientists who create the standards for exchange, management and integration of electronic health records?
B. Health Level 7
Explanation: Health Level 7 (HL7) is an international community of healthcare subject matter experts and information scientists collaborating to create standards for the exchange, management and integration of electronic healthcare information. HL7 promotes the use of such informatics standards within and among healthcare organizations to increase the effectiveness and efficiency of healthcare information delivery for the benefit of all. Answer: D is incorrect. HIPPA is incorrect as this is the legislation designed to insure the privacy and security of personal health information.
Most up-to-date comptia healthcare it technician (hit-001) course:
Q356. You are working on a problem in a system which sending insurance billing information to a remote site. The systems uses messaging with HL7 interface specifications. What is the message identifier field for insurance information?
Explanation: IN1 is the message identifier field for insurance information. Data fields within the insurance information segment include IN1-2, insurance ID number, IN1-8, group number, and similar data fields. Answer: C is incorrect. MSA is the message identifier field for "message acknowledgement segment" and is used to acknowledge a previously received message. Answer: B is incorrect. OBR is a message segment for a laboratory order requesting observation. Answer: D is incorrect. SCH is the schedule activity information segment that is used for messaging in scheduling programs.
Q357. You work as a Network Administrator for Net World International. The company has a Windows-based network. For security, you want to implement a strong password policy. Which of the following are the characteristics of a strong password?Each correct answer represents a complete solution. Choose all that apply.
A. The password must contain the real name of the user.
B. The password must be at least seven characters long.
C. The password must not contain a complete dictionary word.
D. The password must contain keyboard symbols.
E. The password must contain numerals.
Explanation: The following are the characteristics of a strong password: The password must be at least seven characters long. The password must contain upper case letters, lowercase letters, numerals, and keyboard symbols such as !, @, #, $, %, ^. The password must not contain a user name, real name, or company name. The password must not contain a complete dictionary word. The password must be significantly different from previous passwords. A strong password provides an effective defense against unauthorized access to a resource.
Q358. Which of the following can be implemented to help prevent unauthorized users from connecting their computers to the company's wireless access point?
A. Enable SSID broadcast
B. Use DHCP for assigning an IP address on the network
C. MAC addresses filtering
D. Configure IP v6 on the network
Explanation: MAC address filtering can be implemented to help prevent unauthorized users from connecting their computers to the company's wireless access point. MAC address filtering is a security method that enables a device to allow only certain MAC addresses to access a network. It can be configured on a Wireless Access Point (WAP) to allow only certain system MAC addresses to communicate with the rest of the network. MAC address filtering can be performed using either of the two policies. exclude all by default, then allow only listed clients; or include all by default, then exclude listed clients. MAC filtering can also be used on a wireless network to prevent certain network devices from accessing the wireless network. MAC addresses are allocated only to hardware devices, not to persons. Answer: B is incorrect. Using DHCP for assigning an IP address will not help prevent unauthorized users from connecting their computers to the company's wireless access point. Answer: D is incorrect. Configuring IP v6 on the network will not help prevent unauthorized users from connecting their computers to the company's wireless access point. Answer: A is incorrect. Enabling SSID broadcast will increase security risk.
Q359. You are billed $150.00 for medical services received from your primary care physician. You can only afford to pay $90.00 and your physician accepts that amount. This is an example of which of the following payment terms?
A. Sliding Scale Fee
C. Customary Charges
D. Fee for Services
Explanation: Sliding scale fee is a payment term which is common in low income areas and is based on the patient's ability to pay. Answer: B is incorrect. Capitation is incorrect as this payment term is a pre-paid amount based on a per-person or per-capita amount. Answer: C is incorrect. A customary charge is incorrect as this type of payment term is based on what is normally charged or what is reasonable for the service provided. Answer: D is incorrect. Fee for Services in incorrect as this term of payment is dependent on the cost of the provider to provide services such as lab tests, x-rays etc. Hospitals or other facilities receiving fee for service are paid for each individual service that is provided.
Q360. Minor children can receive medical care without parental consent in which of the following circumstances?
A. Eating Disorders
C. Drug and Alcohol Abuse
Explanation: A minor child can request and receive medical treatment for drug and alcohol abuse and for treatment of sexually transmitted disease without the consent of a parent. Answer: A is incorrect. Parental consent is required for treatment of eating disorders. Answer: D is incorrect. Parental consent is required for treatment of obesity. Answer: B is incorrect. Parental consent is required for treatment of pregnancy.
see more CompTIA Healthcare IT Technician Exam