Healthcare IT 20% Flashcards
The most desirable approach to security is one which is:
Layered and dynamic
Give an example of ROM memory?
CD
(CD-ROM)
Which document provides manufacturers with a means of disclosing the security-related features of their medical device?
MDS2
SATA, IDE, and SCSI are types of connectors for which type of hardware?
Harddrives
MAC stands for ___________.
Media Access Control
When using DOS, you must use the __________ command in order to change directories.
CD
802.11g (Wi-Fi 3) operates at what frequency?
-4.2 GHz
-2.4 GHz or 5 GHz
-5 GHz
-2.4 GHz
-2.4 GHz
What type of cable should be used to connect a computer to a switch?
-HDMI
-Crossover
-Patch
-Straight-through
-Straight-through
What is the maximum length of cat5/cat5e/cat6
UTP cable?
-100 meters
-1 mile
-1000 meters
-10 meters
-100 meters
UTP cables have what type of connector?
-BNC
-1/8 phono
-RCA
-RJ45
-RJ45
Referring to networking cables, what does UTP stand for?
-UltraNet Twin Parity
-Unshielded Twisted Pair
-User Technology Protocol
-Uncoupled Transient Protected
-Unshielded Twisted Pair
What is the speed of Gigabit Ethernet?
-10 Mb/s
-1000 Mb/s
-100 Mb/s
-1 Mb/s
-1000 Mb/s
How many bits make a byte?
4
12
16
8
8
A network interface controller (also known as a network interface card or network adapter) typically?
-connects a computer to a
network
-routes network traffic
between subnets
-tracks the location of other
computers connected to
the network
-tells the network what
protocol to use
connects a computer to a
network
A ______ can be hardware or software that controls incoming and outgoing network traffic.
router
gateway
switch
firewall
firewall
A _____ will pass broadcast traffic to all ports.
gateway
router
hub
switch
hub
The number of bits used by IPv6 address is:
32
128
16
64
128
LGA 1155, FM2 and AM3+ refer to ___ ?
Printer connection types
Hard drive interfaces
RAM interfaces
CPU socket types
CPU socket types
A common computer monitor connection is ___ ?
DVI
RJ-45
USB 2.0
Composite
DVI
Approximately how much RAM should a typical desktop computer have?
About 512 kB
More than 2 GB
About 1 GB
Less than 32 MB
More than 2 GB
Identify 3 operating systems.
-Windows 7, Visual Basic,
OS X
-Windows XP, Linux, OS X
-Firefox, JAVA, Windows 7
-DOS, Unix, Firefox
-Windows XP, Linux, OS X
What does SSD stand for?
-Solid State Drive
-Serial Storage Domain
-Secure Storage Database
-Server Software Driver
Solid State Drive
Which of the following are typically NOT constructed with LEDs?
Power supply
Display/monitor
Keyboard
RAM
RAM
What are common computer power supply output voltages?
3.3, 5, 12
12, 120, 240
1, 5, 10
1.5, 6, 9
3.3, 5, 12
To troubleshoot a computer problem, listen for ___ during the boot up process.
-System error buzzer
-Morse code beeps or lights
-BIOS error beep codes or
lights
-Random clicking
BIOS error beep codes or
lights
What operation(s) does the BIOS perform?
-Boots the computer by initializing system devices and running the boot loader.
-Regulates power to the motherboard, hard drive and monitor.
-Monitors all voltages, input / output signals and browsing history.
-Controls the size of the hard drive.
Boots the computer by initializing system devices and running the boot loader.
What are some hardware components in a typical, modern computer?
-Motherboard, RAM, CPU, power supply, disk drive
-Floppy drive, CPU, power supply, BIOS
-Modem, router, power supply, disk drive
-RAID controller, VPN, CPU, power supply, disk drive
-Motherboard, RAM, CPU, power supply, disk drive
Which of the following is the protocol that provides communication across interconnected networks?
A. CSMA/CD
B. SMTP
C. TCP/IP
D. Routing table
C. TCP/IP
The IEEE standard for Ethernet communication:
A. 802.11
B. 802.3
C. 803.11
D. 811.3
B. 802.3
Which of the following is a volatile memory
a. RAM
b. ROM
c. DPROM
d. BIOS
a. RAM
What is the function of computer I/O?
a. Carry data
b. Store Programs and Data
c. Interface with peripheral data
d. Fetch, decode, and
c. Interface with peripheral data
Switches are the modern counterpart of
a. Frames
b. Bridges
c. routers
d. repeaters
b. Bridges
Layer 2 OSI
What command is used to determine if a VLAN is functional?
Ping
-checks for successful communications between devices on VLAN
The operating system responds to service requests by the hardware via?
a. Polling cycle
b. Software version
c. Interrupt request
d. Preprogrammed cycle
c. Interrupt request
-Requests attention or service
What type of program replicates itself
a. Worm
b. Macro
c. Trojan
d. Database
a. Worm
What is middleware?
a. A desktop peripheral device
b. A common Trojan computer virus
c. Software that connects two other separate applications
d. Software that serves as security monitoring applications
c. Software that connects two other separate applications
Communication between a computer and a standard keyboard involves what mode of transmission?
a. Serial
b. Parallel
c. SATA
d. SCSI
a. Serial
The IEEE 802.11 standard is used for which of the following network applications?
a. Wireless LAN (WLAN) interfacing
b. Electronic Medical Record (EMR) storage
c. Virtual Private Network (VPN) firewall
d. Picture Archiving and Communication system (PACS)
a. Wireless LAN (WLAN) interfacing
What Network topology uses a token to communicate with?
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Mesh Topology
B. Ring Topology
-Also known as token ring.
What function does a 15 pin cable perform?
A. HDMI Video
B. VGA Video
C. Composite Video
D. DVI Video
B. VGA Video
-VGA video uses a 15 pin D shaped connector
What type of cable is used in the open space above a dropped ceiling?
A. Twisted Pair
B. Coaxial Cable
C. Fiber Optic Cable
D. Plenum Rated Cat 5
D. Plenum Rated Cat 5
-Plenum is the area above a dropped ceiling.
What function does the I/O perform on a PC?
A Data Routing
B. Network Interfacing
C. Security Firewall
D Interface between the computer and peripheral devices
D Interface between the computer and peripheral devices
What type of network topology is also referred to as a “Daisy Chain”?
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Mesh Topology
A. Bus Topology
True/False:
A repeater amplifies/regenerates signals but can’t route or segment?
True
What network device is useful for converting from fiber-optic to UTP cable?
A. Repeater
B. MAU
C. Hub
D. Subscriber Tip
A. Repeater
What is the IEEE protocol for wireless LAN?
A. 802.3a
B. 802.11
C. 802.3b
D. 902.10
B. 802.11
What is the function of DHCP in network addressing?
A. Digitally assign IP addresses on the network
B. Downgraded hosting communications protocol
C. Dynamically assign IP addresses on the network
D. Digital Hub Communication Protocol
C. Dynamically assign IP addresses on the network
(Dynamic Host Command Protocol)
What type of cable uses a “BNC” connector?
A. Cat 5 twisted pair
B. Cat 6 twisted pair
C. Fiber Optic
D. Coaxial Cable
D. Coaxial Cable
A __________ is a network zone that’s located between an intranet and the internet.
Perimeter network
Satellite zone
Server zone
VLAN
Perimeter network
What protocol is used to transmit web pages across the internet?
HTTP
Telnet
SSH
DNS
HTTP
HTTP stands for Hypertext Transfer Protocol, and it’s the computer communication protocol that controls how web browsers interact with web pages.
Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?
Subnet mask
MAC address
Default gateway
IP address
MAC address
A group of computers that’s been compromised and controlled for malicious intent is called a __________?
distributed network system
remote net
Honeypot
botnet
botnet
A firewall will usually separate which two network zones?
Routers and switches
VLAN and VPN
User and server
Intranet and internet
Intranet and internet
In computer networking, a __________ is a communication endpoint. At the software level, within an operating system, a __________ is a logical construct that identifies a specific process or a type of network service.
Port; port
Repeater, repeater
Router; router
Firewall, firewall
Port; port
In computer networking, a port is a virtual starting and stopping point for network connections that is controlled by the operating system. Ports are used to identify where a network begins and ends, and to direct different types of traffic as they enter a device. For example, emails go to a different port number than web pages.
The physical layer handles data as __________.
Morse code
hexadecimal code
120V AC
binary
binary
The TCP and UDP protocols are used on what layer?
Transport
Application
Control
Transmission
Transport
In the OSI model, layers interact with __________?
adjoining layers
other random layers
no other layers
all other layers
adjoining layers
In the OSI model, a computer user mostly interacts with __________?
the network layer
the application layer
all layers
the software layer
the application layer
The technologist __________ station is used to review images after acquisition but before sending them to the radiologist.
Reading
File room
Pre-check
Quality control (QC)
Quality control (QC)