HIT-001 Chapter 5 Flashcards

1
Q

1._____ is responsible for guaranteeing the data is received after traversing the network. _____ is responsible for reassembling those packets at the receiving end and for finding the path to use to get the packets across the network. Answer: __________________________________________________________

A
  1. TCP, IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.Pinging a domain name is a great tool for verifying if the ______ service is active. Answer: __________________________________________________________

A
  1. DNS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. An ______ is a segment of programming code that can be used by many programs. Answer: __________________________________________________________
A
  1. API s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4._____ is the most current and secure encryption available for wireless networks. Answer: __________________________________________________________

A
  1. WPA2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5.When a wireless network contains sensitive data, the _____ broadcasting is disabled. Answer: __________________________________________________________

A
  1. SSID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6._____ automatically assigns a dynamic IP address to a device when it joins a network. Answer: __________________________________________________________

A
  1. DHCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7.Both _____ and cloud solutions are offered as ______. Answer: __________________________________________________________

A
  1. ASPs, SaaS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8.______ and ______ are best used for copying a medical image to a disk to take to an off campus facility that cannot share data over the network securely. Answer: __________________________________________________________

A
  1. DVDs, CD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.What service does an ISP provide? Answer: __________________________________________________________

A
  1. An ISP is an organization that offers individuals and companies an entry point to the Internet by way of a WAN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2.What are the seven layers of the OSI model? Answer: __________________________________________________________ _________________________________________________________________

A
  1. Application layer, presentation layer, session layer, transport layer, network layer, data link layer, physical layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3.Which protocol is used to provide a window to view the desktop of another computer? Answer: __________________________________________________________

A
  1. RDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4.What is the purpose of the DNS? Answer: __________________________________________________________ _________________________________________________________________

A
  1. The DNS resolves domain names into the IP address that the network under- stands to reach the correct computer on the intranet or Internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

5.Why might a facility choose to use a cloud-based solution for HIS require- ments? Answer:

A
  1. Some healthcare facilities do not have the room or finances to house all the servers needed to run health information systems. Cloud computing and vir- tualization are two techniques designed to reduce the overall costs of these systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

6.What is the purpose for using Structured Query Language? Answer: __________________________________________________________

A
  1. SQL is a programming language used to manage data stored in databases.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

7.Why would a web page use PHP? Answer:

A
  1. PHP is an open source, server-side, HTML-embedded scripting language used to create dynamic web pages. PHP script creates a customized web page for each individual viewing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

8.What are some of the obstacles that must be considered when designing a wireless infrastructure? Answer:

A
  1. Some of the obstacles might include the following: Signal strength of each AP Shape of the building Types of materials used in the building, such as concrete walls, wooden walls, sheetrock, and lead-lined rooms in the Radiology department Elevators Number of floors
17
Q

9.Why did WPA2 replace WPA wireless encryption? Answer:

A

9.A flaw was discovered in TKIP because it reused weak designs from WEP to make it backward compatible. This weakness allows hackers to spoof data, or to falsify data on the network.

18
Q

10.What is the purpose of NAT when used by a router? Answer: __________________________________________________________ _________________________________________________________________

A

10.A router serves as a firewall to act like a middle man to prevent the detection of devices on the LAN by devices outside the LAN.

19
Q

11.What is the purpose of pinging another device on a network? Answer: __________________________________________________________ _________________________________________________________________

A

11.A ping command is used to send a request to another device to find out if the two devices can communicate on the network.

20
Q

12.What is the difference between a thick client and a thin client? Answer:

A

12.A thick client is used when an application is installed on the client computer. A thin client is used when an application is accessed by a computer but not in- stalled on the computer.

21
Q
  1. What are some issues to consider when supporting servers so that servers perform well and are protected? Answer: __________________________________________________________ _________________________________________________________________
A

13.Security risks, high traffic and load balancing, hardware and software specifica- tions required by vendors, and purging old logs.

22
Q

14.What is the difference between a differential backup and an incremental backup? Answer:

A

14.A differential backup backs up new and changed files and does not mark the files as having been backed up. An incremental back up backs up the files that have been created or changed since the last incremental backup and marks the files as having been backed up.

23
Q

15.What information should be documented when deploying a new computer, printer, or server for reference in case the device fails? Answer:

A

.The reference document should include the following: Brand Model Name on network Serial number OS version Static or DHCP IP address (If static, record the IP address used.) MAC address for wired and wireless connections Applications installed Printers installed

24
Q

16.Why is it important that virus definitions be updated regularly? Answer: __________________________________________________________ _________________________________________________________________

A

16.The antivirus software should have up-to-date virus definitions because new viruses are deployed daily.

25
Q

17.Why might a monitor need to use a DVI connection rather than a VGA connection? Answer:

A

17.Certain departments require higher quality or resolution. For example, for picture archiving and communication system (PACS) a larger monitor with higher resolution and quality should be used to view the details of a medical image, such as an MRI.

26
Q

18.When creating a change management documentation, what information should be included? Answer:

A

18.The change management documentation should include the following: Device name, model number, and location Replacement parts Scheduled start and finish time of the change Actual start and finish time of the change Number of users who will be affected The notification of change sent to users affected Whether downtime is required The results from testing the change The rollback plan in case of failure Manager or supervisor approval

27
Q

19.What are common peripheral devices found in a hospital supported by an HIT technician? Answer: __________________________________________________________ _________________________________________________________________

A

19.Common peripheral devices found in a hospital supported by HIT technicians include a barcode scanner, document scanner, card or badge scanner, or signa- ture pads.

28
Q

20.Why is it a security risk to allow access to e-PHI on smartphones? Answer:

A

20.Phones are easily misplaced, lost, or stolen, even more often than laptop com- puters. Any smartphone with access to e-PHI must be encrypted with pass- word protection and time lockout.

29
Q

2.Sometimes it is easy to lose track of which IP addresses are used on a network. It?s not a bad idea to occasionally run a network scanner to report all IP addresses currently in use on the network. On the internet, find freeware software on the for a network scanner to find IP addresses on the network you are connected to. What freeware software did you use? What IP addresses or how many IP address did you find in use on your network? Answer: __________________________________________________________ _________________________________________________________________

A
  1. Answers will vary. One option is found at http://www.microsoft.com/ resources/documentation/windows/xp/all/proddocs/en-us/windows_dos_copy. mspx?mfr=true. 1. Open a command prompt. 2. Right-click the title bar of the command prompt window, point to Edit, and then click Mark. 3. Click the beginning of the text you want to copy. 4. Press and hold down the Shift key, and then click the end of the text you want to copy. (Or you can click and drag the cursor to select the text.) 5. Right-click the title bar, point to Edit, and then click Copy. 6. Position the cursor where you want the text to be inserted: a. In an MS-DOS-based program, or in a command prompt window, right-click the title bar, point to Edit, and then click Paste. b. In a Windows-based program, click the Edit menu, and then click Paste.
30
Q

1.There are several ways to copy text from the command prompt window. In the chapter you learned two methods. Research on the Internet and find a third method for copying text from the command prompt window. Answer:

A
  1. Answers may vary. Here is a link for one option: http://www.radmin.com/ products/ipscanner/