Healthcare IT 20% Flashcards
The most desirable approach to security is one which is:
Layered and dynamic
Give an example of ROM memory?
CD
(CD-ROM)
Which document provides manufacturers with a means of disclosing the security-related features of their medical device?
MDS2
SATA, IDE, and SCSI are types of connectors for which type of hardware?
Harddrives
MAC stands for ___________.
Media Access Control
When using DOS, you must use the __________ command in order to change directories.
CD
802.11g (Wi-Fi 3) operates at what frequency?
-4.2 GHz
-2.4 GHz or 5 GHz
-5 GHz
-2.4 GHz
-2.4 GHz
What type of cable should be used to connect a computer to a switch?
-HDMI
-Crossover
-Patch
-Straight-through
-Straight-through
What is the maximum length of cat5/cat5e/cat6
UTP cable?
-100 meters
-1 mile
-1000 meters
-10 meters
-100 meters
UTP cables have what type of connector?
-BNC
-1/8 phono
-RCA
-RJ45
-RJ45
Referring to networking cables, what does UTP stand for?
-UltraNet Twin Parity
-Unshielded Twisted Pair
-User Technology Protocol
-Uncoupled Transient Protected
-Unshielded Twisted Pair
What is the speed of Gigabit Ethernet?
-10 Mb/s
-1000 Mb/s
-100 Mb/s
-1 Mb/s
-1000 Mb/s
How many bits make a byte?
4
12
16
8
8
A network interface controller (also known as a network interface card or network adapter) typically?
-connects a computer to a
network
-routes network traffic
between subnets
-tracks the location of other
computers connected to
the network
-tells the network what
protocol to use
connects a computer to a
network
A ______ can be hardware or software that controls incoming and outgoing network traffic.
router
gateway
switch
firewall
firewall
A _____ will pass broadcast traffic to all ports.
gateway
router
hub
switch
hub
The number of bits used by IPv6 address is:
32
128
16
64
128
LGA 1155, FM2 and AM3+ refer to ___ ?
Printer connection types
Hard drive interfaces
RAM interfaces
CPU socket types
CPU socket types
A common computer monitor connection is ___ ?
DVI
RJ-45
USB 2.0
Composite
DVI
Approximately how much RAM should a typical desktop computer have?
About 512 kB
More than 2 GB
About 1 GB
Less than 32 MB
More than 2 GB
Identify 3 operating systems.
-Windows 7, Visual Basic,
OS X
-Windows XP, Linux, OS X
-Firefox, JAVA, Windows 7
-DOS, Unix, Firefox
-Windows XP, Linux, OS X
What does SSD stand for?
-Solid State Drive
-Serial Storage Domain
-Secure Storage Database
-Server Software Driver
Solid State Drive
Which of the following are typically NOT constructed with LEDs?
Power supply
Display/monitor
Keyboard
RAM
RAM
What are common computer power supply output voltages?
3.3, 5, 12
12, 120, 240
1, 5, 10
1.5, 6, 9
3.3, 5, 12
To troubleshoot a computer problem, listen for ___ during the boot up process.
-System error buzzer
-Morse code beeps or lights
-BIOS error beep codes or
lights
-Random clicking
BIOS error beep codes or
lights
What operation(s) does the BIOS perform?
-Boots the computer by initializing system devices and running the boot loader.
-Regulates power to the motherboard, hard drive and monitor.
-Monitors all voltages, input / output signals and browsing history.
-Controls the size of the hard drive.
Boots the computer by initializing system devices and running the boot loader.
What are some hardware components in a typical, modern computer?
-Motherboard, RAM, CPU, power supply, disk drive
-Floppy drive, CPU, power supply, BIOS
-Modem, router, power supply, disk drive
-RAID controller, VPN, CPU, power supply, disk drive
-Motherboard, RAM, CPU, power supply, disk drive
Which of the following is the protocol that provides communication across interconnected networks?
A. CSMA/CD
B. SMTP
C. TCP/IP
D. Routing table
C. TCP/IP
The IEEE standard for Ethernet communication:
A. 802.11
B. 802.3
C. 803.11
D. 811.3
B. 802.3
Which of the following is a volatile memory
a. RAM
b. ROM
c. DPROM
d. BIOS
a. RAM
What is the function of computer I/O?
a. Carry data
b. Store Programs and Data
c. Interface with peripheral data
d. Fetch, decode, and
c. Interface with peripheral data
Switches are the modern counterpart of
a. Frames
b. Bridges
c. routers
d. repeaters
b. Bridges
Layer 2 OSI
What command is used to determine if a VLAN is functional?
Ping
-checks for successful communications between devices on VLAN
The operating system responds to service requests by the hardware via?
a. Polling cycle
b. Software version
c. Interrupt request
d. Preprogrammed cycle
c. Interrupt request
-Requests attention or service
What type of program replicates itself
a. Worm
b. Macro
c. Trojan
d. Database
a. Worm
What is middleware?
a. A desktop peripheral device
b. A common Trojan computer virus
c. Software that connects two other separate applications
d. Software that serves as security monitoring applications
c. Software that connects two other separate applications
Communication between a computer and a standard keyboard involves what mode of transmission?
a. Serial
b. Parallel
c. SATA
d. SCSI
a. Serial
The IEEE 802.11 standard is used for which of the following network applications?
a. Wireless LAN (WLAN) interfacing
b. Electronic Medical Record (EMR) storage
c. Virtual Private Network (VPN) firewall
d. Picture Archiving and Communication system (PACS)
a. Wireless LAN (WLAN) interfacing
What Network topology uses a token to communicate with?
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Mesh Topology
B. Ring Topology
-Also known as token ring.
What function does a 15 pin cable perform?
A. HDMI Video
B. VGA Video
C. Composite Video
D. DVI Video
B. VGA Video
-VGA video uses a 15 pin D shaped connector
What type of cable is used in the open space above a dropped ceiling?
A. Twisted Pair
B. Coaxial Cable
C. Fiber Optic Cable
D. Plenum Rated Cat 5
D. Plenum Rated Cat 5
-Plenum is the area above a dropped ceiling.
What function does the I/O perform on a PC?
A Data Routing
B. Network Interfacing
C. Security Firewall
D Interface between the computer and peripheral devices
D Interface between the computer and peripheral devices
What type of network topology is also referred to as a “Daisy Chain”?
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Mesh Topology
A. Bus Topology
True/False:
A repeater amplifies/regenerates signals but can’t route or segment?
True
What network device is useful for converting from fiber-optic to UTP cable?
A. Repeater
B. MAU
C. Hub
D. Subscriber Tip
A. Repeater
What is the IEEE protocol for wireless LAN?
A. 802.3a
B. 802.11
C. 802.3b
D. 902.10
B. 802.11
What is the function of DHCP in network addressing?
A. Digitally assign IP addresses on the network
B. Downgraded hosting communications protocol
C. Dynamically assign IP addresses on the network
D. Digital Hub Communication Protocol
C. Dynamically assign IP addresses on the network
(Dynamic Host Command Protocol)
What type of cable uses a “BNC” connector?
A. Cat 5 twisted pair
B. Cat 6 twisted pair
C. Fiber Optic
D. Coaxial Cable
D. Coaxial Cable
A __________ is a network zone that’s located between an intranet and the internet.
Perimeter network
Satellite zone
Server zone
VLAN
Perimeter network
What protocol is used to transmit web pages across the internet?
HTTP
Telnet
SSH
DNS
HTTP
HTTP stands for Hypertext Transfer Protocol, and it’s the computer communication protocol that controls how web browsers interact with web pages.
Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?
Subnet mask
MAC address
Default gateway
IP address
MAC address
A group of computers that’s been compromised and controlled for malicious intent is called a __________?
distributed network system
remote net
Honeypot
botnet
botnet
A firewall will usually separate which two network zones?
Routers and switches
VLAN and VPN
User and server
Intranet and internet
Intranet and internet
In computer networking, a __________ is a communication endpoint. At the software level, within an operating system, a __________ is a logical construct that identifies a specific process or a type of network service.
Port; port
Repeater, repeater
Router; router
Firewall, firewall
Port; port
In computer networking, a port is a virtual starting and stopping point for network connections that is controlled by the operating system. Ports are used to identify where a network begins and ends, and to direct different types of traffic as they enter a device. For example, emails go to a different port number than web pages.
The physical layer handles data as __________.
Morse code
hexadecimal code
120V AC
binary
binary
The TCP and UDP protocols are used on what layer?
Transport
Application
Control
Transmission
Transport
In the OSI model, layers interact with __________?
adjoining layers
other random layers
no other layers
all other layers
adjoining layers
In the OSI model, a computer user mostly interacts with __________?
the network layer
the application layer
all layers
the software layer
the application layer
The technologist __________ station is used to review images after acquisition but before sending them to the radiologist.
Reading
File room
Pre-check
Quality control (QC)
Quality control (QC)
The __________ contains the master database of everything that is in the archive. It controls the receipt, retrieval, and distribution of the images it stores and also controls all the DICOM processes running within the archive.
Archive manager
Software manager
Data manager
Image manager
Image manager
What term is used to describe how an exam is completed from order entry to transcribed report?
Completion
Archive
Workflow
Assignment
Workflow
The ______________ is the most interactive part of a PACS and is used inside and outside of radiology.
Archive server
Reading workstation
File room workstation
Display workstation
Display workstation
*This question is on CRES
PACS can receive images from any hospital department that send in a ___________ format.
Analog
DICOM
PDF
RAW
DICOM
The acronym PACS stands for which of the following terms?
Picture arrival communication system
Picture archival computer system
Picture arrival computer system
Picture archiving and communication system
Picture archiving and communication system
What protocol is used to secure HTTPS data?
SSH
DHCP
Telnet
SSL
SSL Secure Sockets Layer
Secure Sockets Layer (SSL) is a communication protocol that establishes a secure connection between two devices or applications on a network. SSL uses encryption to protect data that is transmitted across the web, and it also initiates an authentication process between two devices. SSL has been used to establish privacy, authentication, and data integrity for internet communications since 1995.
The ___ protocol can increase network security by hiding intranet IP addresses.
trust but verify
TCP/IP
NAT
DHCP
NAT-NETWORK ADDRESS TRANSLATION
NAT is a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers.
Which option provides the most secure wireless security protocol?
WPA
WPA2
WEP
802.1x
802.1x
802.1X is a network authentication protocol that verifies the identity of a user or device trying to connect to a network.
How long is an IPv6 address?
128 bytes
128 bits
32 bits
64 bits
128 bits
You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?
10 Mbps
100 kbps
2 Mbps
1 Mbps
10 Mbps
Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
B
G
N
A
G =54Mps @ 2.4GHz
The IEEE 802.11g specification allows up to 54 Mbps transmission in the 2.4 GHz band.
Which protocol does DHCP use at the Transport layer?
TCP
ARP
UDP
IP
UDP
Dynamic Host Configuration Protocol (DHCP) uses the User Datagram Protocol (UDP) at the transport layer
Where is a hub specified in the OSI model?
Data Link layer
Session layer
Application layer
Physical layer
Physical layer
Propagation time is:
Bandwidth/Queuing time
Propagation speed/Bandwidth
Distance/Propagation speed
Message size/ Bandwidth
Propagation speed/Bandwidth
Transmission media are directly controlled by the:
physical layer
network layer
session layer
data link layer
physical layer
In a network with dozens of switches, how many root bridges would you have?
1
2
5
12
1
What is the frequency range of the IEEE 802.11a standard?
5Gbps
2.4GHz
2.4Gbps
5GHz
5GHz
A nurse scanning the barcode on a patient tag rather than typing it into the system is an example of __________.
scanning automation
source data automation
item data automation
input automation
input automation
What is the maximum cable length for shielded twisted-pair (STP) cable?
150 ft
100 ft
1000 m
100 m
100 m
Which device has a “platen?”
modem
printer
monitor
touchpad
printer
The program that the microprocessor uses to get the computer started after it’s turned on:
BIOS
NTFS
BASIC
POST
BIOS
Four-Color model used for printing:
HDMI
RBG
CMYK
VGA
CMYK
The acronym stands for cyan, magenta, yellow, and key(black).
Foundation protocol of the internet which allows computers to communicate over long distance networks:
FTP
PPP
TCP/IP
UDP
TCP/IP
The environment in which a piece of software is executed is know as the computer’s:
platform
minimum requirements
specification
firmware
platform
What computer component would NOT typically be stress tested for several hours to verify proper operation?
CPU
RAM
Network card
Hard drive
Network card
A ___ will usually block broadcast traffic.
switch
router
client
hub
router
A ___ is a specialized computer that only provides file-based data storage to other devices connected to the network.
firewall
workstation
server
network attached storage
network attached storage
Using an adapter, it’s possible to connect computers in a network using the electrical wiring in a house or building.
False
True
True
ESD would cause the most damage to which component?
Power supply
Monitor
Expansion board
Keyboard
Expansion board
What does FDISK do?
recovers lost clusters on the hard drive
fixes bad sectors on the hard drive
performs low-level formatting of the hard drive
creates partitions on the hard drive
creates partitions on the hard drive
What kind of connectors are used to connect a PC power supply to a hard drive?
molex
mini-molex
AT
P9
molex
Parity is:
-the optimal transmission speed of data over a CAT 5 cable
-an extra bit stored with data in RAM that is used to check for errors when the data is read back
-the optimal transmission speed of data over a CAT 5 cable
-an byte stored in the FAT to indicated remaining slots
-an extra bit stored with data in RAM that is used to check for errors when the data is read back
Which list below shows the terms ordered from smallest to largest.
gigabyte , megabyte, kilobyte, terabyte
megabyte, kilobyte, terabyte, gigabyte
megabyte, kilobyte, gigabyte, terabyte
kilobyte, megabyte , gigabyte, terabyte
kilobyte, megabyte , gigabyte, terabyte
UDP is a ___ protocol.
remote
connectionless
connection oriented
reliable
Connectionless
User Datagram Protocol: UDP has no way of knowing payload is corrupt or made it. Not reliable
TCP is a ___ protocol.
unreliable
stationary
connection oriented
connectionless
connection oriented
TCP establishes a session with a ___ process.
forced connection
dual backup
three way handshake
best effort
three way handshake
TCP=Transmission control protocol
TCP uses an error checking process known as ___ .
ScanDisk
SAS
CRC
ChkDsk
CRC, Cyclic Redundancy Check
What type of data is generally sent using UDP(User Datagram Protocol)?
Email
Very important data
VoIP and streaming music
Files
VoIP and streaming music
-UDP is connectionless and unreliable. Does not guarantee delivery, or error checking.
What protocol is used to resolve IP addresses to MAC addresses?
Telnet
SSH
DHCP
ARP
ARP
-Address Resolution Protocol, used to map Network layer IP address to a MAC address on same network.
What protocol is used to upload and download files across the network?
Telnet
DHCP
SSH
FTP
FTP
-File transfer protocol
What protocol sends error messages and is used by ping and tracert commands?
ICMP
Telnet
DHCP
SSH
ICMP
-Internet Control Message Protocol: network layer protocol used to send error messages and ops information indicating issues during communications between devices on an IP network.
What protocol is used to send e-mails between clients and servers?
Telnet
DHCP
FTP
SMTP
SMTP-Simple Mail Transfer Protocol
What protocol is used to retrieve e-mail from a mail server?
DHCP
POP3
Telnet
SMTP
POP3-Post Office Protocol Version 3
What protocol is used to secure HTTPS data?
SSH
SSL
Telnet
DHCP
SSL-Secure Sockets Layer: Cryptographic protocol provides secure communications over a network.
FTP protocol uses which ports?
16 and 17
20 and 21
12 to 18
Any available port
20 and 21
The HTTP protocol uses which port?
80
87
53
40
80
What is the speed of Fast Ethernet?
10 Mb/s
1 Mb/s
100 Mb/s
1000 Mb/s
100 Mb/s
How many number of pairs do the UTP cables have?
6 pairs
5 pairs
4 pairs
8 pairs
4 pairs
What type of cable should be used to connect a computer to a switch?
Crossover
Coax
HDMI
Straight-through
Straight- through
How fast is a T1 line?
1.544 Mbps
44.736 Mbps
100 Mbps
56 Kbps
1.544 Mbps
802.11g (Wi-Fi 3) operates at what frequency?
4.2 GHz
2.4 GHz or 5 GHz
2.4 GHz
5 GHz
2.4 GHz
at 54 Mbps
How fast is a T3 line?
56 Kbps
1.544 Mbps
44.736 Mbps
100 Mbps
44.736 Mbps
11.802.11n (Wi-Fi 4) operates at what frequency?
4.2 GHz
5 GHz
2.4 GHz or 5 GHz
2.4
2.4 GHz or 5 GHz
at 300Mbps
How fast is 802.11b (Wi-Fi 1)?
54 Mbps
300 Mbps
11 Mbps
100 Mbps
11 Mbps = b
54 Mbps = g
300 Mbps =n
How fast is 802.11g (Wi-Fi 3)?
54 Mbps
300 Mbps
100 Mbps
11 Mbps
54 Mbps = g
11 Mbps = b
300 Mbps =n
How fast is 802.11n (Wi-Fi 4)?
11 Mbps
300 Mbps
100 Mbps
54 Mbps
300 Mbps= n
54 Mbps = g
11 Mbps = b
Which of the following is the least susceptible to lightning?
Fiber-optic
Shielded Twisted pair
Coaxial Cable
Unshielded Twisted pair
Fiber-optic
One method to manage network security is to divide the network into ___ .
collision domains
zones
WANs
elements
zones
What is the riskiest part of a network?
The perimeter
Subnets
Intranets
The internet
The internet
Which option provides the most secure wireless security protocol?
WPA
802.1x
WEP
WPA2
802.1x
Which of the following is the best definition of a virus?
Software that self-replicates
Software that causes damage to any files
Software that causes damage to system files
Software that attaches to e-mail
Software that self-replicates
What is the most important security advantage of NAT?
It blocks incoming ICMP packets
By default allows only outbound connections
It hides internal network addresses
It blocks all ICMP packets
It hides internal network addresses
What is the purpose of a certificate?
To verify that software is virus free
To validate the recipient of a software
To validate the sender of a digital signature or software
To guarantee that a signature is valid
To validate the sender of a digital signature or software
A computer user mostly interacts with ___ ?
all layers
the software layer
the application layer
the network layer
the application layer
What occurs in the presentation layer?
MAC address are handled
Binary to decimal conversion
Sessions are created
Data compression and encryption
Data compression and encryption
What occurs in the session layer?
Binary to decimal conversion
MAC address are handled
Sessions are created
Data compression and encryption
Sessions are created
The TCP and UDP protocols are used on what layer?
Control
Transport
Transmission
Application
Transport
The data link layer uses ___ to route frames.
broadcasts
hexadecimal code
IP addresses
MAC addresses
MAC addresses
The physical layer handles data as ___ .
120V AC
Morse code
binary
hexadecimal code
binary
An (unmanaged) switch works in the ___ layer.
data link
transport
physical
network
data link
Data is grouped into frames in the ___ layer.
data link
transport
physical
network
data link
What is volatile memory?
Memory that requires power to maintain its stored data.
Examples: RAM, cache memory, and registers in a CPU.
Which of the following device is used to connect two systems, especially if the systems use different protocols?
Bridge
Repeater
Gateway
Hub
Gateway
A distributed network configuration in which all data/information pass through a central computer is
Point-to-point network
Ring network
Bus network
Star network
Star network
Which of the following communications modes support two-way traffic but in only one direction of a time?
Simplex
Half-duplex
Full duplex
Three-quarters duplex
Half-duplex
Codec refers to:
Command declaration
Coder-decoder
Command decoding
Co-declaration
Coder-decoder
What device separates a single network into two segments but lets the two segments appear as one to higher protocols?
Bridge
Switch
Gateway
Router
Bridge
Bluetooth is an example of:
Local area network
Personal area network
Virtual private network
Wide area network
Personal area network
Which type of records contain the most information?
Patient portals
Electronic medical records (EMRs)
Electronic health records (EHRs)
Evidence-based records
Electronic health records (EHRs)
The term _________ refers to any computer component that is required to perform work.
kernel
bootstrap
resource
source code
resource
The storage element for a Static RAM is the?
diode
resistor
flip-flop
capacitor
flip-flop
A tape drive offers __________ access to data.
sequential
sporadic
timely
random
sequential
When machine instructions are being executed by a computer, the instruction phase followed by the execution phase is referred to as __________.
machine cycle
program cycle
task cycle
execution cycle
execution cycle
In serial digital data communications, what must be added to the data?
Start, stop and parity bit for error detection and correction
One method to manage network security is to divide the network into _______.
Zones
A tape drive offers __________ access to data.
sequential
TCP is a ___ protocol.
connection oriented
A distributed network configuration in which all data/information pass through a central computer is
Star Network