Chapter 5 Review Questions Flashcards
What service does an ISP provide?
An ISP is an organization that offers individuals and companies an entry point to the Internet by way of a WAN.
What are the seven layers of the OSI model?
Application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer.
Which protocol is used to provide a window to view the desktop of another computer?
RDP
What is the purpose of the DNS?
The DNS resolves domain names into IP address that the network understands to reach the correct computer on the intranet or Internet.
Why might a facility choose to use a cloud-based solution for HIS requirements?
Some healthcare facilities do not have room or finances to house all the servers needed to run heath information systems. Cloud computing and virtualization are two techniques designed to reduce the overall costs of these systems.
What is the purpose for using Structured Query Language?
SQL is a programming langue used to manage data stored databases.
Why would a web page use PHP?
PHP is an open source, server-side, HTML-embedded scripting language used to create dynamic web pages. PHP scripting creates a customized web page for each individual viewing.
What are some of the obstacles that must be considered when designing a wireless infrastructure?
Some of the obstacles might include the following:
- Signal strength of each AP
- Shape of the building
- Types of materials used in the building, such as concert walls, wooden walls, sheetrock, and lead-lined rooms in the Radiology department.
- Elevators
- Number of floors
Why did WPA2 replace WPA wireless encryption?
A flaw was discovered in TKIP because it reused weak designs from WEB to make it backward compatible. This weakness allows hackers to spoof data, or to falsify data on the network.
What is the purpose of NAT when used by a router?
A router serves as a firewall to act like a middle man to prevent the detection of devices on the LAN by devices outside the LAN.
What is the purpose of pinging another device on a network?
A ping command is used to send a request to another device to find out if the two devices can communicate on the network.
What is the difference between a thick client and a thin client?
A thin client is used when an application is installed on the client computer. A thin client is used when an application is accessed by a computer but not installed on the computer.
What are some issues to consider when supporting servers so that servers preform well and are protected?
Security risk, high traffic and load balancing, hardware and software specifications required by vendors, and purging old logs.
What is the difference between a differential backup and an incremental backup?
A differential backup backs up new and changed files and does not make the files as having been backed up. An incremental back up backs up the files that have been created or changed since the last incremental backup and marks the files as having been backed up.
What information should be documented when deploying a new computer, printer, or server for reference in case the device fails?
The reference document should include the following:
- Brand
- Model
- Name on network
- Serial number
- OS version
- Static or DHCP IP address (If static, record the IP address used)
- MAC address for wired and wireless connections
- Applications installed
- Printers installed
Why is it important that virus definitions be updated regularly?
The antivirus software should have up-to-date virus definitions because new viruses are deployed daily.
Why might a monitor need to use a DVI connection rather than a VGA connection?
Certain departments require higher quality or resolution. For example, for picture archiving and communication system (PACS) a larger monitor with higher resolution and quality should be used to view the details of a medical image, such as a n MRI.
When creating a change management documentation, what information should be included?
The change management documentation should include the following:
- Device name, model number, and location
- Replacement parts
- Scheduled start and finish time of the change
- Actual start and finish time of change
- Number of users who will be affected
- The notification of changes sent to users affected
- Whether downtime is required
- The results from testing
- the rollback plan in case of failure
- Manager or supervisor approval
What are common peripheral devices found in a hospital supported by an HIT technician?
Common peripheral devices found in a hospital supported by HIT technicians include a barcode scanner, document scanner, card or badge scanner, or signature pads.
Why is it a security risk to allow access to e-PHI on smartphones?
Phones are easily misplaced, lost, or stolen, even more often than laptop computers. Any smartphone with access to e-PHI must be encrypted with password protection and time lockout.