Healthcare IT 20% Flashcards

1
Q

The most desirable approach to security is one which is:

A

Layered and dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give an example of ROM memory?

A

CD
(CD-ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which document provides manufacturers with a means of disclosing the security-related features of their medical device?

A

MDS2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SATA, IDE, and SCSI are types of connectors for which type of hardware?

A

Harddrives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC stands for ___________.

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When using DOS, you must use the __________ command in order to change directories.

A

CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

802.11g (Wi-Fi 3) operates at what frequency?

-4.2 GHz
-2.4 GHz or 5 GHz
-5 GHz
-2.4 GHz

A

-2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of cable should be used to connect a computer to a switch?

-HDMI
-Crossover
-Patch
-Straight-through

A

-Straight-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the maximum length of cat5/cat5e/cat6
UTP cable?

-100 meters
-1 mile
-1000 meters
-10 meters

A

-100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UTP cables have what type of connector?

-BNC
-1/8 phono
-RCA
-RJ45

A

-RJ45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Referring to networking cables, what does UTP stand for?

-UltraNet Twin Parity
-Unshielded Twisted Pair
-User Technology Protocol
-Uncoupled Transient Protected

A

-Unshielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the speed of Gigabit Ethernet?

-10 Mb/s
-1000 Mb/s
-100 Mb/s
-1 Mb/s

A

-1000 Mb/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many bits make a byte?

4
12
16
8

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network interface controller (also known as a network interface card or network adapter) typically?

-connects a computer to a
network
-routes network traffic
between subnets
-tracks the location of other
computers connected to
the network
-tells the network what
protocol to use

A

connects a computer to a
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ______ can be hardware or software that controls incoming and outgoing network traffic.

router
gateway
switch
firewall

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _____ will pass broadcast traffic to all ports.

gateway
router
hub
switch

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The number of bits used by IPv6 address is:

32
128
16
64

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

LGA 1155, FM2 and AM3+ refer to ___ ?

Printer connection types
Hard drive interfaces
RAM interfaces
CPU socket types

A

CPU socket types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A common computer monitor connection is ___ ?
DVI
RJ-45
USB 2.0
Composite

A

DVI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Approximately how much RAM should a typical desktop computer have?

About 512 kB
More than 2 GB
About 1 GB
Less than 32 MB

A

More than 2 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identify 3 operating systems.
-Windows 7, Visual Basic,
OS X
-Windows XP, Linux, OS X
-Firefox, JAVA, Windows 7
-DOS, Unix, Firefox

A

-Windows XP, Linux, OS X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does SSD stand for?
-Solid State Drive
-Serial Storage Domain
-Secure Storage Database
-Server Software Driver

A

Solid State Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following are typically NOT constructed with LEDs?

Power supply
Display/monitor
Keyboard
RAM

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are common computer power supply output voltages?

3.3, 5, 12
12, 120, 240
1, 5, 10
1.5, 6, 9

A

3.3, 5, 12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

To troubleshoot a computer problem, listen for ___ during the boot up process.

-System error buzzer
-Morse code beeps or lights
-BIOS error beep codes or
lights
-Random clicking

A

BIOS error beep codes or
lights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What operation(s) does the BIOS perform?

-Boots the computer by initializing system devices and running the boot loader.

-Regulates power to the motherboard, hard drive and monitor.

-Monitors all voltages, input / output signals and browsing history.

-Controls the size of the hard drive.

A

Boots the computer by initializing system devices and running the boot loader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are some hardware components in a typical, modern computer?

-Motherboard, RAM, CPU, power supply, disk drive

-Floppy drive, CPU, power supply, BIOS

-Modem, router, power supply, disk drive

-RAID controller, VPN, CPU, power supply, disk drive

A

-Motherboard, RAM, CPU, power supply, disk drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is the protocol that provides communication across interconnected networks?

A. CSMA/CD

B. SMTP

C. TCP/IP

D. Routing table

A

C. TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The IEEE standard for Ethernet communication:

A. 802.11

B. 802.3

C. 803.11

D. 811.3

A

B. 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is a volatile memory
a. RAM
b. ROM
c. DPROM
d. BIOS

A

a. RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the function of computer I/O?

a. Carry data
b. Store Programs and Data
c. Interface with peripheral data
d. Fetch, decode, and

A

c. Interface with peripheral data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Switches are the modern counterpart of
a. Frames
b. Bridges
c. routers
d. repeaters

A

b. Bridges

Layer 2 OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What command is used to determine if a VLAN is functional?

A

Ping
-checks for successful communications between devices on VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The operating system responds to service requests by the hardware via?
a. Polling cycle
b. Software version
c. Interrupt request
d. Preprogrammed cycle

A

c. Interrupt request
-Requests attention or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What type of program replicates itself
a. Worm
b. Macro
c. Trojan
d. Database

A

a. Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is middleware?
a. A desktop peripheral device
b. A common Trojan computer virus
c. Software that connects two other separate applications
d. Software that serves as security monitoring applications

A

c. Software that connects two other separate applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Communication between a computer and a standard keyboard involves what mode of transmission?
a. Serial
b. Parallel
c. SATA
d. SCSI

A

a. Serial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The IEEE 802.11 standard is used for which of the following network applications?
a. Wireless LAN (WLAN) interfacing
b. Electronic Medical Record (EMR) storage
c. Virtual Private Network (VPN) firewall
d. Picture Archiving and Communication system (PACS)

A

a. Wireless LAN (WLAN) interfacing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What Network topology uses a token to communicate with?
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Mesh Topology

A

B. Ring Topology
-Also known as token ring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What function does a 15 pin cable perform?
A. HDMI Video
B. VGA Video
C. Composite Video
D. DVI Video

A

B. VGA Video
-VGA video uses a 15 pin D shaped connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What type of cable is used in the open space above a dropped ceiling?
A. Twisted Pair
B. Coaxial Cable
C. Fiber Optic Cable
D. Plenum Rated Cat 5

A

D. Plenum Rated Cat 5
-Plenum is the area above a dropped ceiling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What function does the I/O perform on a PC?
A Data Routing
B. Network Interfacing
C. Security Firewall
D Interface between the computer and peripheral devices

A

D Interface between the computer and peripheral devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What type of network topology is also referred to as a “Daisy Chain”?
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Mesh Topology

A

A. Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

True/False:
A repeater amplifies/regenerates signals but can’t route or segment?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What network device is useful for converting from fiber-optic to UTP cable?
A. Repeater
B. MAU
C. Hub
D. Subscriber Tip

A

A. Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the IEEE protocol for wireless LAN?
A. 802.3a
B. 802.11
C. 802.3b
D. 902.10

A

B. 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the function of DHCP in network addressing?
A. Digitally assign IP addresses on the network
B. Downgraded hosting communications protocol
C. Dynamically assign IP addresses on the network
D. Digital Hub Communication Protocol

A

C. Dynamically assign IP addresses on the network
(Dynamic Host Command Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What type of cable uses a “BNC” connector?
A. Cat 5 twisted pair
B. Cat 6 twisted pair
C. Fiber Optic
D. Coaxial Cable

A

D. Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A __________ is a network zone that’s located between an intranet and the internet.

Perimeter network
Satellite zone
Server zone
VLAN

A

Perimeter network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What protocol is used to transmit web pages across the internet?

HTTP
Telnet
SSH
DNS

A

HTTP

HTTP stands for Hypertext Transfer Protocol, and it’s the computer communication protocol that controls how web browsers interact with web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?

Subnet mask
MAC address
Default gateway
IP address

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A group of computers that’s been compromised and controlled for malicious intent is called a __________?

distributed network system
remote net
Honeypot
botnet

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A firewall will usually separate which two network zones?

Routers and switches
VLAN and VPN
User and server
Intranet and internet

A

Intranet and internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

In computer networking, a __________ is a communication endpoint. At the software level, within an operating system, a __________ is a logical construct that identifies a specific process or a type of network service.

Port; port
Repeater, repeater
Router; router
Firewall, firewall

A

Port; port

In computer networking, a port is a virtual starting and stopping point for network connections that is controlled by the operating system. Ports are used to identify where a network begins and ends, and to direct different types of traffic as they enter a device. For example, emails go to a different port number than web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The physical layer handles data as __________.

Morse code
hexadecimal code
120V AC
binary

A

binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The TCP and UDP protocols are used on what layer?

Transport
Application
Control
Transmission

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

In the OSI model, layers interact with __________?

adjoining layers
other random layers
no other layers
all other layers

A

adjoining layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

In the OSI model, a computer user mostly interacts with __________?

the network layer
the application layer
all layers
the software layer

A

the application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The technologist __________ station is used to review images after acquisition but before sending them to the radiologist.
Reading
File room
Pre-check
Quality control (QC)

A

Quality control (QC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

The __________ contains the master database of everything that is in the archive. It controls the receipt, retrieval, and distribution of the images it stores and also controls all the DICOM processes running within the archive.

Archive manager
Software manager
Data manager
Image manager

A

Image manager

61
Q

What term is used to describe how an exam is completed from order entry to transcribed report?

Completion
Archive
Workflow
Assignment

A

Workflow

62
Q

The ______________ is the most interactive part of a PACS and is used inside and outside of radiology.

Archive server
Reading workstation
File room workstation
Display workstation

A

Display workstation

*This question is on CRES

63
Q

PACS can receive images from any hospital department that send in a ___________ format.

Analog
DICOM
PDF
RAW

A

DICOM

64
Q

The acronym PACS stands for which of the following terms?

Picture arrival communication system
Picture archival computer system
Picture arrival computer system
Picture archiving and communication system

A

Picture archiving and communication system

65
Q

What protocol is used to secure HTTPS data?

SSH
DHCP
Telnet
SSL

A

SSL Secure Sockets Layer

Secure Sockets Layer (SSL) is a communication protocol that establishes a secure connection between two devices or applications on a network. SSL uses encryption to protect data that is transmitted across the web, and it also initiates an authentication process between two devices. SSL has been used to establish privacy, authentication, and data integrity for internet communications since 1995.

66
Q

The ___ protocol can increase network security by hiding intranet IP addresses.

trust but verify
TCP/IP
NAT
DHCP

A

NAT-NETWORK ADDRESS TRANSLATION

NAT is a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers.

67
Q

Which option provides the most secure wireless security protocol?

WPA
WPA2
WEP
802.1x

A

802.1x

802.1X is a network authentication protocol that verifies the identity of a user or device trying to connect to a network.

68
Q

How long is an IPv6 address?
128 bytes
128 bits
32 bits
64 bits

A

128 bits

69
Q

You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?
10 Mbps
100 kbps
2 Mbps
1 Mbps

A

10 Mbps

70
Q

Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
B
G
N
A

A

G =54Mps @ 2.4GHz

The IEEE 802.11g specification allows up to 54 Mbps transmission in the 2.4 GHz band.

71
Q

Which protocol does DHCP use at the Transport layer?
TCP
ARP
UDP
IP

A

UDP

Dynamic Host Configuration Protocol (DHCP) uses the User Datagram Protocol (UDP) at the transport layer

72
Q

Where is a hub specified in the OSI model?
Data Link layer
Session layer
Application layer
Physical layer

A

Physical layer

73
Q

Propagation time is:
Bandwidth/Queuing time
Propagation speed/Bandwidth
Distance/Propagation speed
Message size/ Bandwidth

A

Propagation speed/Bandwidth

74
Q

Transmission media are directly controlled by the:

physical layer
network layer
session layer
data link layer

A

physical layer

75
Q

In a network with dozens of switches, how many root bridges would you have?
1
2
5
12

A

1

76
Q

What is the frequency range of the IEEE 802.11a standard?
5Gbps
2.4GHz
2.4Gbps
5GHz

A

5GHz

77
Q

A nurse scanning the barcode on a patient tag rather than typing it into the system is an example of __________.

scanning automation
source data automation
item data automation
input automation

A

input automation

78
Q

What is the maximum cable length for shielded twisted-pair (STP) cable?
150 ft
100 ft
1000 m
100 m

A

100 m

79
Q

Which device has a “platen?”

modem
printer
monitor
touchpad

A

printer

80
Q

The program that the microprocessor uses to get the computer started after it’s turned on:

BIOS
NTFS
BASIC
POST

A

BIOS

81
Q

Four-Color model used for printing:

HDMI
RBG
CMYK
VGA

A

CMYK
The acronym stands for cyan, magenta, yellow, and key(black).

82
Q

Foundation protocol of the internet which allows computers to communicate over long distance networks:

FTP
PPP
TCP/IP
UDP

A

TCP/IP

83
Q

The environment in which a piece of software is executed is know as the computer’s:

platform
minimum requirements
specification
firmware

A

platform

84
Q

What computer component would NOT typically be stress tested for several hours to verify proper operation?

CPU
RAM
Network card
Hard drive

A

Network card

85
Q

A ___ will usually block broadcast traffic.

switch
router
client
hub

A

router

86
Q

A ___ is a specialized computer that only provides file-based data storage to other devices connected to the network.

firewall
workstation
server
network attached storage

A

network attached storage

87
Q

Using an adapter, it’s possible to connect computers in a network using the electrical wiring in a house or building.

False
True

A

True

88
Q

ESD would cause the most damage to which component?
Power supply
Monitor
Expansion board
Keyboard

A

Expansion board

89
Q

What does FDISK do?
recovers lost clusters on the hard drive
fixes bad sectors on the hard drive
performs low-level formatting of the hard drive
creates partitions on the hard drive

A

creates partitions on the hard drive

90
Q

What kind of connectors are used to connect a PC power supply to a hard drive?

molex
mini-molex
AT
P9

A

molex

91
Q

Parity is:

-the optimal transmission speed of data over a CAT 5 cable
-an extra bit stored with data in RAM that is used to check for errors when the data is read back
-the optimal transmission speed of data over a CAT 5 cable
-an byte stored in the FAT to indicated remaining slots

A

-an extra bit stored with data in RAM that is used to check for errors when the data is read back

92
Q

Which list below shows the terms ordered from smallest to largest.

gigabyte , megabyte, kilobyte, terabyte
megabyte, kilobyte, terabyte, gigabyte
megabyte, kilobyte, gigabyte, terabyte
kilobyte, megabyte , gigabyte, terabyte

A

kilobyte, megabyte , gigabyte, terabyte

93
Q

UDP is a ___ protocol.

remote
connectionless
connection oriented
reliable

A

Connectionless
User Datagram Protocol: UDP has no way of knowing payload is corrupt or made it. Not reliable

94
Q

TCP is a ___ protocol.

unreliable
stationary
connection oriented
connectionless

A

connection oriented

95
Q

TCP establishes a session with a ___ process.

forced connection
dual backup
three way handshake
best effort

A

three way handshake
TCP=Transmission control protocol

96
Q

TCP uses an error checking process known as ___ .

ScanDisk
SAS
CRC
ChkDsk

A

CRC, Cyclic Redundancy Check

97
Q

What type of data is generally sent using UDP(User Datagram Protocol)?

Email
Very important data
VoIP and streaming music
Files

A

VoIP and streaming music
-UDP is connectionless and unreliable. Does not guarantee delivery, or error checking.

98
Q

What protocol is used to resolve IP addresses to MAC addresses?

Telnet
SSH
DHCP
ARP

A

ARP
-Address Resolution Protocol, used to map Network layer IP address to a MAC address on same network.

99
Q

What protocol is used to upload and download files across the network?

Telnet
DHCP
SSH
FTP

A

FTP
-File transfer protocol

100
Q

What protocol sends error messages and is used by ping and tracert commands?

ICMP
Telnet
DHCP
SSH

A

ICMP
-Internet Control Message Protocol: network layer protocol used to send error messages and ops information indicating issues during communications between devices on an IP network.

101
Q

What protocol is used to send e-mails between clients and servers?

Telnet
DHCP
FTP
SMTP

A

SMTP-Simple Mail Transfer Protocol

102
Q

What protocol is used to retrieve e-mail from a mail server?

DHCP
POP3
Telnet
SMTP

A

POP3-Post Office Protocol Version 3

103
Q

What protocol is used to secure HTTPS data?

SSH
SSL
Telnet
DHCP

A

SSL-Secure Sockets Layer: Cryptographic protocol provides secure communications over a network.

104
Q

FTP protocol uses which ports?

16 and 17
20 and 21
12 to 18
Any available port

A

20 and 21

105
Q

The HTTP protocol uses which port?

80
87
53
40

A

80

106
Q

What is the speed of Fast Ethernet?

10 Mb/s
1 Mb/s
100 Mb/s
1000 Mb/s

A

100 Mb/s

107
Q

How many number of pairs do the UTP cables have?

6 pairs
5 pairs
4 pairs
8 pairs

A

4 pairs

108
Q

What type of cable should be used to connect a computer to a switch?

Crossover
Coax
HDMI
Straight-through

A

Straight- through

109
Q

How fast is a T1 line?

1.544 Mbps
44.736 Mbps
100 Mbps
56 Kbps

A

1.544 Mbps

110
Q

802.11g (Wi-Fi 3) operates at what frequency?

4.2 GHz
2.4 GHz or 5 GHz
2.4 GHz
5 GHz

A

2.4 GHz
at 54 Mbps

111
Q

How fast is a T3 line?

56 Kbps
1.544 Mbps
44.736 Mbps
100 Mbps

A

44.736 Mbps

112
Q

11.802.11n (Wi-Fi 4) operates at what frequency?
4.2 GHz
5 GHz
2.4 GHz or 5 GHz
2.4

A

2.4 GHz or 5 GHz
at 300Mbps

113
Q

How fast is 802.11b (Wi-Fi 1)?
54 Mbps
300 Mbps
11 Mbps
100 Mbps

A

11 Mbps = b

54 Mbps = g
300 Mbps =n

114
Q

How fast is 802.11g (Wi-Fi 3)?
54 Mbps
300 Mbps
100 Mbps
11 Mbps

A

54 Mbps = g

11 Mbps = b
300 Mbps =n

115
Q

How fast is 802.11n (Wi-Fi 4)?

11 Mbps
300 Mbps
100 Mbps
54 Mbps

A

300 Mbps= n

54 Mbps = g
11 Mbps = b

116
Q

Which of the following is the least susceptible to lightning?

Fiber-optic
Shielded Twisted pair
Coaxial Cable
Unshielded Twisted pair

A

Fiber-optic

117
Q

One method to manage network security is to divide the network into ___ .

collision domains
zones
WANs
elements

A

zones

118
Q

What is the riskiest part of a network?

The perimeter
Subnets
Intranets
The internet

A

The internet

119
Q

Which option provides the most secure wireless security protocol?

WPA
802.1x
WEP
WPA2

A

802.1x

120
Q

Which of the following is the best definition of a virus?

Software that self-replicates
Software that causes damage to any files
Software that causes damage to system files
Software that attaches to e-mail

A

Software that self-replicates

121
Q

What is the most important security advantage of NAT?

It blocks incoming ICMP packets
By default allows only outbound connections
It hides internal network addresses
It blocks all ICMP packets

A

It hides internal network addresses

122
Q

What is the purpose of a certificate?

To verify that software is virus free
To validate the recipient of a software
To validate the sender of a digital signature or software
To guarantee that a signature is valid

A

To validate the sender of a digital signature or software

123
Q

A computer user mostly interacts with ___ ?

all layers
the software layer
the application layer
the network layer

A

the application layer

124
Q

What occurs in the presentation layer?

MAC address are handled
Binary to decimal conversion
Sessions are created
Data compression and encryption

A

Data compression and encryption

125
Q

What occurs in the session layer?

Binary to decimal conversion
MAC address are handled
Sessions are created
Data compression and encryption

A

Sessions are created

126
Q

The TCP and UDP protocols are used on what layer?

Control
Transport
Transmission
Application

A

Transport

127
Q

The data link layer uses ___ to route frames.

broadcasts
hexadecimal code
IP addresses
MAC addresses

A

MAC addresses

128
Q

The physical layer handles data as ___ .

120V AC
Morse code
binary
hexadecimal code

A

binary

129
Q

An (unmanaged) switch works in the ___ layer.

data link
transport
physical
network

A

data link

130
Q

Data is grouped into frames in the ___ layer.
data link
transport
physical
network

A

data link

131
Q

What is volatile memory?

A

Memory that requires power to maintain its stored data.
Examples: RAM, cache memory, and registers in a CPU.

132
Q

Which of the following device is used to connect two systems, especially if the systems use different protocols?

Bridge
Repeater
Gateway
Hub

A

Gateway

133
Q

A distributed network configuration in which all data/information pass through a central computer is

Point-to-point network
Ring network
Bus network
Star network

A

Star network

134
Q

Which of the following communications modes support two-way traffic but in only one direction of a time?

Simplex
Half-duplex
Full duplex
Three-quarters duplex

A

Half-duplex

135
Q

Codec refers to:

Command declaration
Coder-decoder
Command decoding
Co-declaration

A

Coder-decoder

136
Q

What device separates a single network into two segments but lets the two segments appear as one to higher protocols?

Bridge
Switch
Gateway
Router

A

Bridge

137
Q

Bluetooth is an example of:

Local area network
Personal area network
Virtual private network
Wide area network

A

Personal area network

138
Q

Which type of records contain the most information?

Patient portals
Electronic medical records (EMRs)
Electronic health records (EHRs)
Evidence-based records

A

Electronic health records (EHRs)

139
Q

The term _________ refers to any computer component that is required to perform work.

kernel
bootstrap
resource
source code

A

resource

140
Q

The storage element for a Static RAM is the?

diode
resistor
flip-flop
capacitor

A

flip-flop

141
Q

A tape drive offers __________ access to data.

sequential
sporadic
timely
random

A

sequential

142
Q

When machine instructions are being executed by a computer, the instruction phase followed by the execution phase is referred to as __________.

machine cycle
program cycle
task cycle
execution cycle

A

execution cycle

143
Q

In serial digital data communications, what must be added to the data?

A

Start, stop and parity bit for error detection and correction

144
Q

One method to manage network security is to divide the network into _______.

A

Zones

145
Q

A tape drive offers __________ access to data.

A

sequential

146
Q

TCP is a ___ protocol.

A

connection oriented

147
Q

A distributed network configuration in which all data/information pass through a central computer is

A

Star Network

148
Q
A