Cause all that matters here is passing the CompTIA HIT-001 exam. Cause all that you need is a high score of HIT-001 CompTIA Healthcare IT Technician Exam exam. The only one thing you need to do is downloading Exambible HIT-001 exam study guides now. We will not let you down with our money-back guarantee.

2021 Nov HIT-001 practice test

Q11. Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two. 

A. It backs up the entire database, including the transaction log. 

B. It backs up only the files changed since the most recent backup and clears the archive bit. 

C. It is the fastest method of backing up data. 

D. It is the slowest method for taking a data backup. 

Answer: BC 

Explanation: Incremental backup is the fastest method of backing up data. It backs up only the files changed since the most recent backup and clears the archive bit. In an incremental backup, data restoration is slower than the other backup methods. Restoring data from an incremental backup requires the last full backup and all subsequent incremental backups. Incremental backups must be restored in the same order as they are created. 


Q12. Which of the following is the most common way of performing social engineering attacks? 

A. War driving 

B. Session hijacking 

C. Email 

D. Phone 

Answer:

Explanation: The phone is the most common way of performing social engineering attacks. Social engineering is the art of convincing people and making them disclose useful information such as account names and passwords. This information is further exploited by hackers to gain access to a user's computer or network. This method involves mental ability of people to trick someone rather than their technical skills. A user should always distrust people who ask him for his account name, password, computer name, IP address, employee ID, or other information that can be misused. Answer: C is incorrect. Although emails are also used for social engineering attacks, but it is not used as much as the phone. Answer: A is incorrect. War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere. To do war driving, one needs a vehicle, a computer (which can be a laptop), a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car. Because a wireless LAN may have a range that extends beyond an office building, an outside user may be able to intrude into the network, obtain a free Internet connection, and possibly gain access to company records and other resources. Answer: B is incorrect. Session hijacking refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to Web developers, as the HTTP cookies used to maintain a session on many Web sites can be easily stolen by an attacker using anintermediary computer or with access to the saved cookies on the victim's computer (see HTTP cookie theft).TCP session hijacking is when a hacker takes over a TCP session between two machines. Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine. 


Q13. The HIPAA Privacy Rule provide a list of exceptions where protected health information can be disclosed without the authorization of the patient, and several of these exceptions involve legal matters. Which of the following is NOT one of those exceptions to authorized disclosure? 

A. Disclosure to report abuse, neglect or domestic violence. 

B. Disclosure to family members during a custody case. 

C. Disclosure to law enforcement officials to locate a fugitive, suspect or missing person. 

D. Disclosure for judicial proceedings 

Answer:

Explanation: Disclosure to a family member is not an exception to authorized disclosure unless the patient is no longer competent, and then other laws go into effect regarding next of kin authorization. Previous authorization is required if this kind of release of information is to occur. Unless an authorization has been clearly made, there should be no release to family members in this kind of legal matter. Answer: C is incorrect. Disclosure to law enforcement officials is an exception and no authorization document is required. Answer: A is incorrect. Disclosure to report abuse, neglect or domestic violence is a HIPAA exception and no authorization document is required for disclosure to proper authorities. Answer: D is incorrect. Disclosure for judicial proceedings in which the patient or covered entity is involved is an exception and no authorization document is required. 


Q14. You work as a Network Administrator for Net Perfect Inc. Rick, a Sales Manager, asks you to configure his tablet PC in such a way that he can copy and paste text quickly. Which of the following actions will you perform to accomplish the task? 

A. Configure flicks for the desired task. 

B. Configure an automatic script to run the desired task at the tap event. 

C. Configure a keyboard shortcut for the desired task. 

D. Configure an automatic script to run the desired task at the double tap event. 

Answer:

Explanation: In order to accomplish the task, you will have to configure flicks for the desired task. Flick is a gesture made by a tablet pen by quickly dragging the pen in a straight line across the screen for approximately an inch (2.5cm). It triggers an event on which Windows Vista is configured to take action. The default actions are scroll up, scroll down, forward, and back, which are assigned to the up, down, right, and left flicks, respectively. Vista can be configured to take action on up to eight different flicks. These actions can be defined by selecting the Navigational Flicks and Editing Flicks option in the flicks tab of Pen and Input Devices. Answer: B, D are incorrect. These are the most common events in a tablet PC. Changing the default action of tap and double tap events will be a bad move, as it will hamper the productivity of the user working on the tablet PC. Answer: C is incorrect. As most of the work is performed through the pen in the tablet PC, configuring a keyboard shortcut will not help resolve the issue. 


Q15. You are called into fix a workstation system crash on a machine which processes images from an magnetic resonance imaging facility. A patient is waiting in the MRI machine while you are trying to fix the problem so they can complete their exam. How should you interact with the patient? 

A. Work rapidly and thoroughly to fix the problem, and allow the imaging tech or medical assistants to interact and reassure the patient. 

B. Ask the patient why they are in for testing. 

C. Complain loudly to the imaging tech that they have been using the wrong method to call up the incorrect programs and that has caused the system problems. 

D. Ask how they are feeling and assure them that you will fix the problem soon. 

Answer:

Explanation: It is not part of your job to interact with the patient. Being respectful if asked a direct QUESTION NO: but your job is to fix the system and be polite, not to interact with the patient. Answer: D is incorrect. Patients require privacy and understanding. Do not ask any intrusive QUESTION NO: not your job to interact with the patient. Let the medical assistants or imaging techs to their job to reassure the patient. Answer: B is incorrect. Do not ask the patient any QUESTION NO: or their health. This is not your job and it is invasive of the patient's privacy. Answer: C is incorrect. Remonstrating other employees in front of a patient while the patient is in a vulnerable position is not professional behavior. Fix the problem, and then arrange to meet with the imaging tech at a later time to explain what they may be 


Refresh HIT-001 real exam:

Q16. Which of the following portable computer systems is used by smart phones for offering advanced OS capabilities? Each correct answer represents a complete solution. 

A. SBC 

B. SFF 

C. Tablet PC 

D. PDA 

E. laptop 

Answer:

Explanation: PDA stands for personal digital assistant and it is also known as a palmtop computer or handheld computer. It is a mobile device, which functions as a personal information manager and connects to the Internet. Smartphone uses PDA for offering advanced OS capabilities. The PDA has an electronic visual display enabling it to include a Web browser, but some newer models also have audio capabilities, enabling them to be used as mobile phones or portable media players. Many PDAs can access the Internet, intranets or extranets via Wi-Fi, or Wireless Wide Area Networks. The typical features of a PDA are as follows: 1.Touch screen 2.Memory cards 3.Wired connectivity 4.Wireless connectivity 5.Synchronization Answer: C is incorrect. A Tablet PC refers to a fully functional laptop PC, equipped with a stylus. Tablet PCs are personal computers where the owner is free to install any compatible application or operating system. Answer: E is incorrect. A laptop is a type of portable computer. It is designed for mobile use and small and light enough to sit on a person's lap while in use. It integrates most of the typical components of a desktop computer, including a display, a keyboard, a pointing device (touchpad or trackpad, pointing stick), speakers, and often including a battery, into a single small and light unit. Answer: A is incorrect. Single-board computers (SBCs) are complete computers built on a single circuit board. The design is centered on a single or dual microprocessor with RAM, IO and all other features needed to be a functional computer on one board. Answer: B is incorrect. Small form factor computers are those computers that are generally designed to support the same features as modern desktop computers, but in a smaller space. Most accept standard x86 microprocessors, standard DIMM memory modules, standard 3.5 inch hard disks, and standard 5.25 inch optical drives. SFF computers can be far smaller than typical desktop computers. They are often used in space-limited areas where normal computers cannot be placed. 


Q17. Which of the following governing bodies standardizes the transmission of healthcare data? 

A. Department of Health and Human Services 

B. The Joint Commission 

C. Occupational Safety and Health Administration 

D. National Committee on Vital and Health Statistics 

Answer:

Explanation: The National Committee on Vital and Health Statistics is the governing body that standardized the transmission of protected health information. Answer: A is incorrect. Department of Health and Human Services is incorrect as this agency is protecting the health of all Americans and providing essential human services, especially for those who are least able to help themselves. 


Q18. Which of the following is true about the TELNET utility? Each correct answer represents a complete solution. Choose all that apply. 

A. It uses TCP port 23. 

B. It uses the RDP protocol to connect to a remote computer. 

C. It allows users to communicate with a remote computer. 

D. It transmits data in clear text. 

Answer: ACD 

Explanation: Telnet is a command-line connectivity tool that starts terminal emulation with a remote host running the Telnet server service. Telnet allows users to communicate with a remote computer, offers the ability to run programs remotely, and facilitates remote administration. The Telnet utility uses the Telnet protocol for connecting to a remote computer running the Telnet server software to access files. It uses TCP port 23 by default. Answer: B is incorrect. The TELNET utility uses the Telnet protocol for connecting to a remote computer. 


Q19. You are asked to convert all paper medical records to a digital format. Which of the following tasks are you being asked to perform? 

A. Document Imaging 

B. Device Capture 

C. Document Archiving 

D. Clinical Imaging 

Answer:

Explanation: Document imaging involves prepping, scanning, indexing and performing quality control on paper documents that are entered into a computerized system. Answer: B is incorrect. Device capture is the act of transmitting medical information directly from a medical device such as electrocardiogram. Answer: C is incorrect. Document archiving is the act of ensuring the documents of a patient's medical record are sufficiently stored for the appropriate length of time in a private location. Answer: D is incorrect. Clinical imaging refers to medical information that is obtained by the use of photographs or other medical imaging devices that need to be a part of the patient's permanent medical record. 


Q20. Which of the following can search contents of a hard disk, address book of an e-mail, or any information about the computer, and transmit the information to the advertisers or other interested parties without user knowledge? 

A. Firmware 

B. Malware 

C. Adware 

D. Spyware 

Answer:

Explanation: Spyware is software that gathers information about a user without his knowledge. Spyware can get into a computer when the user downloads software from the Internet. Spyware can search the contents of a hard disk, address book of an e-mail, or any information about the computer, and transmits the information to the advertisers or other interested parties. Answer: A is incorrect. Firmware is a term often used to denote the fixed, usually rather small, programs and data structures that internally control various electronic devices. Firmware sits on the reader and controls its function. It reads only one type of tag either active or passive. Answer: B is incorrect. Malware or malicious software is a threat that attempts to break into a computer or damage it without the consent of the owner of the system. There are a number of types of malware depending upon their threat level and functions. Some malware are conditionally executed while others are unconditional. Answer: C is incorrect. Adware is software that automatically downloads and display advertisements in the Web browser without user permission. When a user visits a site or downloads software, sometimes a hidden adware software is also downloaded to display advertisement automatically. This can be quite irritating to user. Some adware can also be spyware.