CompTIA HIT-001 Dumps and Practice Tests

CompTIA Healthcare IT Technician Exam: HIT-001 Exam

  • HIT-001 Questions & Answers
  • Exam Code: HIT-001
  • Exam Name: CompTIA Healthcare IT Technician Exam
  • Updated: March 10, 2012
  • Q & A: 536 Q&As

QUESTION NO: 1
You are asked to design an information system in which the client-server platform is based on the following schematic. What type of architecture is incorporated within your information system?
A. Three-Tier Architecture
B. WAN Technology
C. Two-Tier Architecture
D. LAN Technology
Answer: A

QUESTION NO: 2
Which of the following measures the time a cathode-ray tube (CRT) electron beam takes to paint a screen from top to bottom?
A. Bus width
B. Dot Pitch
C. Video RAM size
D. Refresh rate
Answer: D

QUESTION NO: 3
One of the data fields within the HL7 specifications is for Provider Type. What does this mean?
A. It's the type of healthcare facility the patient is being seen in.
B. Specifies the major grouping of the service or occupation of the practitioner
C. It's the type of insurer providing insurance coverage for the patient.
D. Specifies the seniority level of the physician
Answer: B

QUESTION NO: 4
Information such as your name, date of birth and social security number are all considered to be protected health information. This information would fall into which of the following categories?
A. De-Indentified Health Information
B. Individually Identifiable Health Information
C. Archived Health Information
D. Demographic Health Information
Answer: D

QUESTION NO: 5
Which of the following is a project management tool that is characterized by circles connected by lines to indicate the sequence of event?
A. PERT Diagram
B. Gantt Chart
C. Venn Diagram
D. Critical Path
Answer: A

QUESTION NO: 6
Which of the following agencies is responsible for protecting the well being of all health care
workers?
A. The Joint Commission
B. Food and Drug Administration
C. Occupational Safety and Health Administration
D. Department of Health and Human Services
Answer: C

QUESTION NO: 7
A visiting IT professional is at an OBGYN practice and has been granted access to the computer system, but not the practice's paper records it's previous system of charting for patients. It's after standard work hours the IT professional is working late. He knows an ex-girlfriend used to be a patient at the practice and decides he wants to see her charts, since he can't find her in the computer. What simple Physical Safeguard would help fulfill HIPAA by protecting against the IT professional from accessing the practice's PHI?
A. The paper records are in locked the mobile charting cabinets in the check-in area.
B. The paper records are color coded.
C. The paper records are locked in storage room.
D. The paper records are kept in a series of drawers only known to the Privacy Officer.
Answer: C

QUESTION NO: 8
A dot matrix printer prints faded or light characters on the paper. What could be the most likely cause of the issue?
A. Incorrect printer driver
B. A print head pin that is stuck inside the print head
C. Bad printer port
D. Worn-out ribbon
Answer: D

QUESTION NO: 9
You are responsible for securing the network at a law firm. You are concerned about printer
security. What steps should you take to prevent printer security breaches? Each correct answer represents a complete solution. Choose two.
A. Remove the printer's driver from user computers.
B. Scan printer hard drives for spyware and viruses.
C. Secure any administrative connections (SSH, Telnet, etc.) to printers.
D. Limit print jobs.
Answer: B,C

QUESTION NO: 10
Which of the following types of budget incorporates the budgets of each individual business unit?
A. Organizational Budget
B. Operating Budget
C. Statistical Budget
D. Master Budget
Answer: D

QUESTION NO: 11
Which of the following database models is simply a collection of objects related by an object that has certain characteristics?
A. Enterprise Model
B. Network Model
C. Hierarchal Model
D. Object Oriented Model
Answer: D

QUESTION NO: 12
Which of the following traces and reports each router or gateway crossed by a TCP/IP packet on its way to the remote host?
A. Helix
B. PATHPING
C. TRACERT
D. Netstat
Answer: C

QUESTION NO: 13
According to HIPAA, how long must a medical practice retain a patient's medical records?
A. ten years
B. five years
C. three years
D. HIPAA does not mandate how long.
Answer: D

QUESTION NO: 14
Which of the following portable computer systems is used by smart phones for offering advanced OS capabilities? Each correct answer represents a complete solution. Choose all that apply.
A. SBC
B. SFF
C. Tablet PC
D. PDA
E. laptop
Answer: D

QUESTION NO: 15
You work in a healthcare clinic that has many patients that receive benefits from a state program that helps low-income families with the costs of healthcare. You have to work with the state office to check on the design and deployment of healthcare information systems that can help check eligibility policies and deploy electronic health records in treatment and billing. What is one of the names of this kind of program?
A. Medicare
B. Medicaid
C. Tricare
D. FEHB
Answer: B

QUESTION NO: 16
Which of the following commands can verify connectivity between two computers? Each correct answer represents a complete solution. Choose two.
A. NSLOOKUP
B. PING
C. IPCONFIG
D. TRACERT
Answer: B,D

QUESTION NO: 17
Which of the following is the most secure among the following encryption algorithms?
A. 3DES
B. RC4
C. AES
D. DES
Answer: C

QUESTION NO: 18
This group can apply for incentive payments for the adaption, implementation, upgrading and/or meaningful use of certified electronic health record technology, due to provisions of the Health Information Technology for Economic and Clinical Health Act of 2009. Each correct answer represents a complete solution. Choose all that apply.
A. Hospitals
B. Patients
C. Healthcare Clearinghouse
D. Eligible providers
Answer: A,D

QUESTION NO: 19
Which of the following types of health insurance allows the patient to direct his/her own care?
A. HMO
B. Indemnity Plan
C. Point of Service
D. PPO
Answer: B

QUESTION NO: 20
You are hired by an Office Manager at a branch of a home health care service company to help install software for client scheduling, billing and insurance coding and payroll preparation. The office manager is impressed with your work and recommends your work to the next level of administration within the organization. What position might that be? Each correct answer represents a complete solution. Choose all that apply.
A. Board of Directors
B. Billing Coordinator
C. Staffing Coordinator
D. President
Answer: B,C

QUESTION NO: 21
As part of your new job at a hospital, you are asked to obtain a copy of the form that would allow requests for patient health information so that it can be added to a database of scanned legal forms. What department would you go to in order to obtain this form?
A. Accounts payable
B. Release of Information Office
C. Health Information Management Services
D. Medical Records
Answer: B,C,D

QUESTION NO: 22
Which of the following is defined as the technical and procedural methods to control and manage confidential information?
A. Conformity
B. Privacy
C. Confidentiality
D. Data Security
Answer: D

QUESTION NO: 23
Your healthcare facility used to keep all healthcare records permanently, but the volume of
healthcare information has become you great your facility is developing a plan to destroy certain records after a suitable period of time. There is a broad range of state regulations and suggested professional standards for record retention. Which of these record types would likely be kept the longest?
A. Register of Births
B. Adult patient medical records
C. Diagnostic images (x-rays, etc.)
D. Fetal heart monitor records
Answer: A

QUESTION NO: 24
You are asked to install an information system in the Nuclear Medicine department in order to record the use of radioisotopes. Which type of information system would you install for this purpose?
A. Enterprise System
B. Intradepartmental System
C. External System
D. Departmental System
Answer: D

QUESTION NO: 25
Which of the following is the process of verifying and allowing a user on a network?
A. Encryption
B. Authorization
C. Authentication
D. Communication
Answer: C

QUESTION NO: 26
Which of the following would refer to the handling and storage of a patients CT scan?
A. EMTALA
B. Health Level 7
C. DICOM
D. HIPPA
Answer: C

QUESTION NO: 27
You need to undergo a surgical procedure to have your gallbladder removed. This surgical
procedure will not require a hospital stay. To which type of healthcare facilities would you go for this type of service?
A. Nonacute Care Facililty
B. Subacute Care Facility
C. Acute Care Facility
D. Ambulatory Care Facility
Answer: D

QUESTION NO: 28
Two employees, the billing supervisor and the insurance verification secretary, email each other regarding a patient's billing situation. Which of the following would be the least effective way to ensure the PHI of the patient?
A. Emailing using the employees email addresses that they have created for business purposes themselves.
B. Emailing directly to an in-office only email address, accessible only by the involved parties with passwords that maintain encryption.
C. Emailing and following with a phone call.
D. Emailing on the company's intranet.
Answer: A

QUESTION NO: 29
A medical practice knows that its billing office is open to public viewing because it is attached to the front welcome-desk as a time-saving device for communication between billing staff and front office staff. The practice knows that other patients' PHI billing information could easily be viewed by patients standing at the front desk, but chooses not to change the scenario. What kind of penalty could the practice face?
A. Minimum of $1,000
B. This is not a civil violation, only a criminal violation.
C. Minimum of $10,000
D. Minimum of $100
Answer: C

QUESTION NO: 30
You are working on installing a new workstation in an area in which medical assistants interact with patients and the public. What are two physical safeguards you can do during installation of the system to help keep protected health information safe at this workstation?
A. Video surveillance of the area surrounding the workstation, and role based access control
programs installed on the machine.
B. Configuring the server to deny access on to the machine after several failed attempts to log on with a user name, and preventing a workstation from being installed facing into a busy corridor.
C. Installing a privacy screen to prevent viewing from the side or above and user-based access control programs installed on the machine.
D. Installing a privacy screen to prevent viewing from the side or above, preventing a workstation from being installed facing into a busy corridor
Answer: D