Healthcare IT 20% Flashcards

(148 cards)

1
Q

The most desirable approach to security is one which is:

A

Layered and dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give an example of ROM memory?

A

CD
(CD-ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which document provides manufacturers with a means of disclosing the security-related features of their medical device?

A

MDS2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SATA, IDE, and SCSI are types of connectors for which type of hardware?

A

Harddrives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC stands for ___________.

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When using DOS, you must use the __________ command in order to change directories.

A

CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

802.11g (Wi-Fi 3) operates at what frequency?

-4.2 GHz
-2.4 GHz or 5 GHz
-5 GHz
-2.4 GHz

A

-2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of cable should be used to connect a computer to a switch?

-HDMI
-Crossover
-Patch
-Straight-through

A

-Straight-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the maximum length of cat5/cat5e/cat6
UTP cable?

-100 meters
-1 mile
-1000 meters
-10 meters

A

-100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UTP cables have what type of connector?

-BNC
-1/8 phono
-RCA
-RJ45

A

-RJ45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Referring to networking cables, what does UTP stand for?

-UltraNet Twin Parity
-Unshielded Twisted Pair
-User Technology Protocol
-Uncoupled Transient Protected

A

-Unshielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the speed of Gigabit Ethernet?

-10 Mb/s
-1000 Mb/s
-100 Mb/s
-1 Mb/s

A

-1000 Mb/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many bits make a byte?

4
12
16
8

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network interface controller (also known as a network interface card or network adapter) typically?

-connects a computer to a
network
-routes network traffic
between subnets
-tracks the location of other
computers connected to
the network
-tells the network what
protocol to use

A

connects a computer to a
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ______ can be hardware or software that controls incoming and outgoing network traffic.

router
gateway
switch
firewall

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _____ will pass broadcast traffic to all ports.

gateway
router
hub
switch

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The number of bits used by IPv6 address is:

32
128
16
64

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

LGA 1155, FM2 and AM3+ refer to ___ ?

Printer connection types
Hard drive interfaces
RAM interfaces
CPU socket types

A

CPU socket types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A common computer monitor connection is ___ ?
DVI
RJ-45
USB 2.0
Composite

A

DVI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Approximately how much RAM should a typical desktop computer have?

About 512 kB
More than 2 GB
About 1 GB
Less than 32 MB

A

More than 2 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identify 3 operating systems.
-Windows 7, Visual Basic,
OS X
-Windows XP, Linux, OS X
-Firefox, JAVA, Windows 7
-DOS, Unix, Firefox

A

-Windows XP, Linux, OS X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does SSD stand for?
-Solid State Drive
-Serial Storage Domain
-Secure Storage Database
-Server Software Driver

A

Solid State Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following are typically NOT constructed with LEDs?

Power supply
Display/monitor
Keyboard
RAM

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are common computer power supply output voltages?

3.3, 5, 12
12, 120, 240
1, 5, 10
1.5, 6, 9

A

3.3, 5, 12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
To troubleshoot a computer problem, listen for ___ during the boot up process. -System error buzzer -Morse code beeps or lights -BIOS error beep codes or lights -Random clicking
BIOS error beep codes or lights
26
What operation(s) does the BIOS perform? -Boots the computer by initializing system devices and running the boot loader. -Regulates power to the motherboard, hard drive and monitor. -Monitors all voltages, input / output signals and browsing history. -Controls the size of the hard drive.
Boots the computer by initializing system devices and running the boot loader.
27
What are some hardware components in a typical, modern computer? -Motherboard, RAM, CPU, power supply, disk drive -Floppy drive, CPU, power supply, BIOS -Modem, router, power supply, disk drive -RAID controller, VPN, CPU, power supply, disk drive
-Motherboard, RAM, CPU, power supply, disk drive
28
Which of the following is the protocol that provides communication across interconnected networks? A. CSMA/CD B. SMTP C. TCP/IP D. Routing table
C. TCP/IP
29
The IEEE standard for Ethernet communication: A. 802.11 B. 802.3 C. 803.11 D. 811.3
B. 802.3
30
Which of the following is a volatile memory a. RAM b. ROM c. DPROM d. BIOS
a. RAM
31
What is the function of computer I/O? a. Carry data b. Store Programs and Data c. Interface with peripheral data d. Fetch, decode, and
c. Interface with peripheral data
32
Switches are the modern counterpart of a. Frames b. Bridges c. routers d. repeaters
b. Bridges Layer 2 OSI
33
What command is used to determine if a VLAN is functional?
Ping -checks for successful communications between devices on VLAN
34
The operating system responds to service requests by the hardware via? a. Polling cycle b. Software version c. Interrupt request d. Preprogrammed cycle
c. Interrupt request -Requests attention or service
35
What type of program replicates itself a. Worm b. Macro c. Trojan d. Database
a. Worm
36
What is middleware? a. A desktop peripheral device b. A common Trojan computer virus c. Software that connects two other separate applications d. Software that serves as security monitoring applications
c. Software that connects two other separate applications
37
Communication between a computer and a standard keyboard involves what mode of transmission? a. Serial b. Parallel c. SATA d. SCSI
a. Serial
38
The IEEE 802.11 standard is used for which of the following network applications? a. Wireless LAN (WLAN) interfacing b. Electronic Medical Record (EMR) storage c. Virtual Private Network (VPN) firewall d. Picture Archiving and Communication system (PACS)
a. Wireless LAN (WLAN) interfacing
39
What Network topology uses a token to communicate with? A. Bus Topology B. Ring Topology C. Star Topology D. Mesh Topology
B. Ring Topology -Also known as token ring.
40
What function does a 15 pin cable perform? A. HDMI Video B. VGA Video C. Composite Video D. DVI Video
B. VGA Video -VGA video uses a 15 pin D shaped connector
41
What type of cable is used in the open space above a dropped ceiling? A. Twisted Pair B. Coaxial Cable C. Fiber Optic Cable D. Plenum Rated Cat 5
D. Plenum Rated Cat 5 -Plenum is the area above a dropped ceiling.
42
What function does the I/O perform on a PC? A Data Routing B. Network Interfacing C. Security Firewall D Interface between the computer and peripheral devices
D Interface between the computer and peripheral devices
43
What type of network topology is also referred to as a "Daisy Chain"? A. Bus Topology B. Ring Topology C. Star Topology D. Mesh Topology
A. Bus Topology
44
True/False: A repeater amplifies/regenerates signals but can't route or segment?
True
45
What network device is useful for converting from fiber-optic to UTP cable? A. Repeater B. MAU C. Hub D. Subscriber Tip
A. Repeater
46
What is the IEEE protocol for wireless LAN? A. 802.3a B. 802.11 C. 802.3b D. 902.10
B. 802.11
47
What is the function of DHCP in network addressing? A. Digitally assign IP addresses on the network B. Downgraded hosting communications protocol C. Dynamically assign IP addresses on the network D. Digital Hub Communication Protocol
C. Dynamically assign IP addresses on the network (Dynamic Host Command Protocol)
48
What type of cable uses a "BNC" connector? A. Cat 5 twisted pair B. Cat 6 twisted pair C. Fiber Optic D. Coaxial Cable
D. Coaxial Cable
49
A __________ is a network zone that's located between an intranet and the internet. Perimeter network Satellite zone Server zone VLAN
Perimeter network
50
What protocol is used to transmit web pages across the internet? HTTP Telnet SSH DNS
HTTP HTTP stands for Hypertext Transfer Protocol, and it's the computer communication protocol that controls how web browsers interact with web pages.
51
Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called? Subnet mask MAC address Default gateway IP address
MAC address
52
A group of computers that's been compromised and controlled for malicious intent is called a __________? distributed network system remote net Honeypot botnet
botnet
53
A firewall will usually separate which two network zones? Routers and switches VLAN and VPN User and server Intranet and internet
Intranet and internet
54
In computer networking, a __________ is a communication endpoint. At the software level, within an operating system, a __________ is a logical construct that identifies a specific process or a type of network service. Port; port Repeater, repeater Router; router Firewall, firewall
Port; port In computer networking, a port is a virtual starting and stopping point for network connections that is controlled by the operating system. Ports are used to identify where a network begins and ends, and to direct different types of traffic as they enter a device. For example, emails go to a different port number than web pages.
55
The physical layer handles data as __________. Morse code hexadecimal code 120V AC binary
binary
56
The TCP and UDP protocols are used on what layer? Transport Application Control Transmission
Transport
57
In the OSI model, layers interact with __________? adjoining layers other random layers no other layers all other layers
adjoining layers
58
In the OSI model, a computer user mostly interacts with __________? the network layer the application layer all layers the software layer
the application layer
59
The technologist __________ station is used to review images after acquisition but before sending them to the radiologist. Reading File room Pre-check Quality control (QC)
Quality control (QC)
60
The __________ contains the master database of everything that is in the archive. It controls the receipt, retrieval, and distribution of the images it stores and also controls all the DICOM processes running within the archive. Archive manager Software manager Data manager Image manager
Image manager
61
What term is used to describe how an exam is completed from order entry to transcribed report? Completion Archive Workflow Assignment
Workflow
62
The ______________ is the most interactive part of a PACS and is used inside and outside of radiology. Archive server Reading workstation File room workstation Display workstation
Display workstation *This question is on CRES
63
PACS can receive images from any hospital department that send in a ___________ format. Analog DICOM PDF RAW
DICOM
64
The acronym PACS stands for which of the following terms? Picture arrival communication system Picture archival computer system Picture arrival computer system Picture archiving and communication system
Picture archiving and communication system
65
What protocol is used to secure HTTPS data? SSH DHCP Telnet SSL
SSL Secure Sockets Layer Secure Sockets Layer (SSL) is a communication protocol that establishes a secure connection between two devices or applications on a network. SSL uses encryption to protect data that is transmitted across the web, and it also initiates an authentication process between two devices. SSL has been used to establish privacy, authentication, and data integrity for internet communications since 1995.
66
The ___ protocol can increase network security by hiding intranet IP addresses. trust but verify TCP/IP NAT DHCP
NAT-NETWORK ADDRESS TRANSLATION NAT is a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers.
67
Which option provides the most secure wireless security protocol? WPA WPA2 WEP 802.1x
802.1x 802.1X is a network authentication protocol that verifies the identity of a user or device trying to connect to a network.
68
How long is an IPv6 address? 128 bytes 128 bits 32 bits 64 bits
128 bits
69
You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server? 10 Mbps 100 kbps 2 Mbps 1 Mbps
10 Mbps
70
Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz? B G N A
G =54Mps @ 2.4GHz The IEEE 802.11g specification allows up to 54 Mbps transmission in the 2.4 GHz band.
71
Which protocol does DHCP use at the Transport layer? TCP ARP UDP IP
UDP Dynamic Host Configuration Protocol (DHCP) uses the User Datagram Protocol (UDP) at the transport layer
72
Where is a hub specified in the OSI model? Data Link layer Session layer Application layer Physical layer
Physical layer
73
Propagation time is: Bandwidth/Queuing time Propagation speed/Bandwidth Distance/Propagation speed Message size/ Bandwidth
Propagation speed/Bandwidth
74
Transmission media are directly controlled by the: physical layer network layer session layer data link layer
physical layer
75
In a network with dozens of switches, how many root bridges would you have? 1 2 5 12
1
76
What is the frequency range of the IEEE 802.11a standard? 5Gbps 2.4GHz 2.4Gbps 5GHz
5GHz
77
A nurse scanning the barcode on a patient tag rather than typing it into the system is an example of __________. scanning automation source data automation item data automation input automation
input automation
78
What is the maximum cable length for shielded twisted-pair (STP) cable? 150 ft 100 ft 1000 m 100 m
100 m
79
Which device has a "platen?" modem printer monitor touchpad
printer
80
The program that the microprocessor uses to get the computer started after it's turned on: BIOS NTFS BASIC POST
BIOS
81
Four-Color model used for printing: HDMI RBG CMYK VGA
CMYK The acronym stands for cyan, magenta, yellow, and key(black).
82
Foundation protocol of the internet which allows computers to communicate over long distance networks: FTP PPP TCP/IP UDP
TCP/IP
83
The environment in which a piece of software is executed is know as the computer's: platform minimum requirements specification firmware
platform
84
What computer component would NOT typically be stress tested for several hours to verify proper operation? CPU RAM Network card Hard drive
Network card
85
A ___ will usually block broadcast traffic. switch router client hub
router
86
A ___ is a specialized computer that only provides file-based data storage to other devices connected to the network. firewall workstation server network attached storage
network attached storage
87
Using an adapter, it's possible to connect computers in a network using the electrical wiring in a house or building. False True
True
88
ESD would cause the most damage to which component? Power supply Monitor Expansion board Keyboard
Expansion board
89
What does FDISK do? recovers lost clusters on the hard drive fixes bad sectors on the hard drive performs low-level formatting of the hard drive creates partitions on the hard drive
creates partitions on the hard drive
90
What kind of connectors are used to connect a PC power supply to a hard drive? molex mini-molex AT P9
molex
91
Parity is: -the optimal transmission speed of data over a CAT 5 cable -an extra bit stored with data in RAM that is used to check for errors when the data is read back -the optimal transmission speed of data over a CAT 5 cable -an byte stored in the FAT to indicated remaining slots
-an extra bit stored with data in RAM that is used to check for errors when the data is read back
92
Which list below shows the terms ordered from smallest to largest. gigabyte , megabyte, kilobyte, terabyte megabyte, kilobyte, terabyte, gigabyte megabyte, kilobyte, gigabyte, terabyte kilobyte, megabyte , gigabyte, terabyte
kilobyte, megabyte , gigabyte, terabyte
93
UDP is a ___ protocol. remote connectionless connection oriented reliable
Connectionless User Datagram Protocol: UDP has no way of knowing payload is corrupt or made it. Not reliable
94
TCP is a ___ protocol. unreliable stationary connection oriented connectionless
connection oriented
95
TCP establishes a session with a ___ process. forced connection dual backup three way handshake best effort
three way handshake TCP=Transmission control protocol
96
TCP uses an error checking process known as ___ . ScanDisk SAS CRC ChkDsk
CRC, Cyclic Redundancy Check
97
What type of data is generally sent using UDP(User Datagram Protocol)? Email Very important data VoIP and streaming music Files
VoIP and streaming music -UDP is connectionless and unreliable. Does not guarantee delivery, or error checking.
98
What protocol is used to resolve IP addresses to MAC addresses? Telnet SSH DHCP ARP
ARP -Address Resolution Protocol, used to map Network layer IP address to a MAC address on same network.
99
What protocol is used to upload and download files across the network? Telnet DHCP SSH FTP
FTP -File transfer protocol
100
What protocol sends error messages and is used by ping and tracert commands? ICMP Telnet DHCP SSH
ICMP -Internet Control Message Protocol: network layer protocol used to send error messages and ops information indicating issues during communications between devices on an IP network.
101
What protocol is used to send e-mails between clients and servers? Telnet DHCP FTP SMTP
SMTP-Simple Mail Transfer Protocol
102
What protocol is used to retrieve e-mail from a mail server? DHCP POP3 Telnet SMTP
POP3-Post Office Protocol Version 3
103
What protocol is used to secure HTTPS data? SSH SSL Telnet DHCP
SSL-Secure Sockets Layer: Cryptographic protocol provides secure communications over a network.
104
FTP protocol uses which ports? 16 and 17 20 and 21 12 to 18 Any available port
20 and 21
105
The HTTP protocol uses which port? 80 87 53 40
80
106
What is the speed of Fast Ethernet? 10 Mb/s 1 Mb/s 100 Mb/s 1000 Mb/s
100 Mb/s
107
How many number of pairs do the UTP cables have? 6 pairs 5 pairs 4 pairs 8 pairs
4 pairs
108
What type of cable should be used to connect a computer to a switch? Crossover Coax HDMI Straight-through
Straight- through
109
How fast is a T1 line? 1.544 Mbps 44.736 Mbps 100 Mbps 56 Kbps
1.544 Mbps
110
802.11g (Wi-Fi 3) operates at what frequency? 4.2 GHz 2.4 GHz or 5 GHz 2.4 GHz 5 GHz
2.4 GHz at 54 Mbps
111
How fast is a T3 line? 56 Kbps 1.544 Mbps 44.736 Mbps 100 Mbps
44.736 Mbps
112
11.802.11n (Wi-Fi 4) operates at what frequency? 4.2 GHz 5 GHz 2.4 GHz or 5 GHz 2.4
2.4 GHz or 5 GHz at 300Mbps
113
How fast is 802.11b (Wi-Fi 1)? 54 Mbps 300 Mbps 11 Mbps 100 Mbps
11 Mbps = b 54 Mbps = g 300 Mbps =n
114
How fast is 802.11g (Wi-Fi 3)? 54 Mbps 300 Mbps 100 Mbps 11 Mbps
54 Mbps = g 11 Mbps = b 300 Mbps =n
115
How fast is 802.11n (Wi-Fi 4)? 11 Mbps 300 Mbps 100 Mbps 54 Mbps
300 Mbps= n 54 Mbps = g 11 Mbps = b
116
Which of the following is the least susceptible to lightning? Fiber-optic Shielded Twisted pair Coaxial Cable Unshielded Twisted pair
Fiber-optic
117
One method to manage network security is to divide the network into ___ . collision domains zones WANs elements
zones
118
What is the riskiest part of a network? The perimeter Subnets Intranets The internet
The internet
119
Which option provides the most secure wireless security protocol? WPA 802.1x WEP WPA2
802.1x
120
Which of the following is the best definition of a virus? Software that self-replicates Software that causes damage to any files Software that causes damage to system files Software that attaches to e-mail
Software that self-replicates
121
What is the most important security advantage of NAT? It blocks incoming ICMP packets By default allows only outbound connections It hides internal network addresses It blocks all ICMP packets
It hides internal network addresses
122
What is the purpose of a certificate? To verify that software is virus free To validate the recipient of a software To validate the sender of a digital signature or software To guarantee that a signature is valid
To validate the sender of a digital signature or software
123
A computer user mostly interacts with ___ ? all layers the software layer the application layer the network layer
the application layer
124
What occurs in the presentation layer? MAC address are handled Binary to decimal conversion Sessions are created Data compression and encryption
Data compression and encryption
125
What occurs in the session layer? Binary to decimal conversion MAC address are handled Sessions are created Data compression and encryption
Sessions are created
126
The TCP and UDP protocols are used on what layer? Control Transport Transmission Application
Transport
127
The data link layer uses ___ to route frames. broadcasts hexadecimal code IP addresses MAC addresses
MAC addresses
128
The physical layer handles data as ___ . 120V AC Morse code binary hexadecimal code
binary
129
An (unmanaged) switch works in the ___ layer. data link transport physical network
data link
130
Data is grouped into frames in the ___ layer. data link transport physical network
data link
131
What is volatile memory?
Memory that requires power to maintain its stored data. Examples: RAM, cache memory, and registers in a CPU.
132
Which of the following device is used to connect two systems, especially if the systems use different protocols? Bridge Repeater Gateway Hub
Gateway
133
A distributed network configuration in which all data/information pass through a central computer is Point-to-point network Ring network Bus network Star network
Star network
134
Which of the following communications modes support two-way traffic but in only one direction of a time? Simplex Half-duplex Full duplex Three-quarters duplex
Half-duplex
135
Codec refers to: Command declaration Coder-decoder Command decoding Co-declaration
Coder-decoder
136
What device separates a single network into two segments but lets the two segments appear as one to higher protocols? Bridge Switch Gateway Router
Bridge
137
Bluetooth is an example of: Local area network Personal area network Virtual private network Wide area network
Personal area network
138
Which type of records contain the most information? Patient portals Electronic medical records (EMRs) Electronic health records (EHRs) Evidence-based records
Electronic health records (EHRs)
139
The term _________ refers to any computer component that is required to perform work. kernel bootstrap resource source code
resource
140
The storage element for a Static RAM is the? diode resistor flip-flop capacitor
flip-flop
141
A tape drive offers __________ access to data. sequential sporadic timely random
sequential
142
When machine instructions are being executed by a computer, the instruction phase followed by the execution phase is referred to as __________. machine cycle program cycle task cycle execution cycle
execution cycle
143
In serial digital data communications, what must be added to the data?
Start, stop and parity bit for error detection and correction
144
One method to manage network security is to divide the network into _______.
Zones
145
A tape drive offers __________ access to data.
sequential
146
TCP is a ___ protocol.
connection oriented
147
A distributed network configuration in which all data/information pass through a central computer is
Star Network
148