Which of the following methods is acceptable for transmitting PHI?
A. Instant message
B. FTP
C. Voice over IP
D. Encrypted email
Hospitals and Private Practices have which of the following in common?
A. Only use third party providers
B. Only use CMS providers
C. Same percentages of compliance requirements
D. Clinicians require board certification
When a medical office would like to exchange critical information such as a credit card number, which of the following protocols can establish secure communication?
A. HTTP
B. SFTP
C. Telnet
D. HTTPS
Which of the following can be implemented to help prevent unauthorized computers from connecting to a company's wireless access point?
A. Enabling MAC address filtering
B. Enabling DNS on the wireless subnet
C. Disabling SSID broadcast
D. Enabling DHCP on the wireless subnet
Under HIPAA, a covered entity is defined as which of the following?
A. Health plan with fewer than 50 participants and is self-administered
B. Health plan that only offers Nursing Home fixed-indemnity policies
C. Health care provider who uses paper records
D. Health care provider who uses electronic transactions
Which of the following is the BEST way for a technician to secure a laptop on a doctor's desk in an office?
A. Lock the laptop using a cable lock.
B. Place the laptop in a locked office.
C. Ask another technician to watch the laptop.
D. Place the laptop in a locked cabinet.
A facility has a backup to tape procedure that saves multiple terabytes of data.
Which of the following methods would be considered MOST desirable for a fully operational restore state?
A. Full on Sunday and incremental every day
B. Full on Sunday and differential every day
C. Full on Sunday and alternating incremental and differential every other day
D. Full on Sunday and incremental every other day
A threat that will alter the operation of a computer to the detriment of the user, is BEST described as which of the following?
A. Malware threat
B. Spyware threat
C. Phishing threat
D. Social engineering threat
Which of the following refers to a security device with a periodically changing number that is used as part of a PC's authentication process?
A. Physical token
B. Biometric device
C. Installation key
D. Hardware lock
Which of the following will BEST ensure data is removed before recycling a PC?
A. Remove the hard drive and destroy it.
B. Reformat the hard drive to a clean state.
C. Degauss the hard drive several times.
D. Remove the memory and destroy it.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your HIT-001 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.