[Free] Download New Updated (December) CompTIA HIT-001 Exam Questions 481-490



Your past medical records including hospitalizations, physician visits and medication prescription are all examples of which of the following?


A.     Archived Health Information

B.     Individually Identifiable Health Information

C.     Demographic Health Information

D.     De-Identified Health Information


Correct Answer: B







A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn’t know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?


A.     War dialing attack

B.     Social Engineering attack

C.     Replay attack

D.     Brute Force attack


Correct Answer: B




Which of the following categories of information technology in the health care setting involve billing and accounting applications?


A.     Financial IT

B.     Infrastructure IT

C.     Clinical IT

D.     Administrative IT


Correct Answer: A




Which of the following refers to an electronic version of patient data that is compiled from several different facilities and healthcare providers?


A.     Archived Health Information

B.     Electronic Health Record

C.     Electronic Medical Record

D.     Demographic Health Information


Correct Answer: B




Which of the following types of security will be the cause of concern if the server has been stolen from the organization’s premises?


A.     User authentication

B.     Physical security

C.     Operational security

D.     Information security


Correct Answer: B




You are working on a problem in a system which sending insurance billing information to a remote site. The systems uses messaging with HL7 interface specifications. What is the message identifier field for insurance information?


A.     IN1

B.     OBR

C.     MSA

D.     SCH


Correct Answer: A




Which of the following devices enables you to input letters, numbers, and other characters into the computer for storage or manipulation?


A.     Mouse

B.     Keyboard

C.     Monitor

D.     Printer


Correct Answer: B




Which of the following are the features of SSH? Each correct answer represents a complete solution. Choose all that apply.


A.     SSH uses the client-server model.

B.     SSH is used primarily on Linux and UNIX based systems.

C.     SSH and Telnet can be configured simultaneously.

D.     SSH uses public-key cryptography to authenticate the remote computer.


Correct Answer: ABD




Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?


A.     Confidentiality

B.     Authentication

C.     Non-repudiation

D.     Integrity


Correct Answer: A




You are asked to install a completely new information system for your facility. Your superiors inquire how long the project will take. You construct a chart illustrating how long the project will take. You design a chart based on the one shown below. Which of the following types of project management tools have you created to illustrate the time of completion for your project?




A.     PERT Diagram

B.     Gantt Chart

C.     Venn Diagram

D.     Critical Path


Correct Answer: D


Free VCE & PDF File for CompTIA HIT-001 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …