SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An area where surgical procedures are performer in a sterile environment.
OR (Operating Room)
Virus
Software Patch
Rogue Access Point
2. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Software Update
Bluesnarfing
Coaxial Cable
Archive Flag
3. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
SQL (Structured Query Language)
PGP
Rogue Access Point
Document Scanner
4. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
ipconfig
Schedule III Controlled Substance
Liability Waiver
Proxy Server
5. A physical security control system that has a door at each end of a secure chamber.
E/M Codes (Evaluation and Management Codes)
IEEE (Institute of Electrical and Electronic Engineers)
Custodian
Mantrap
6. See Host Computer
Software Update
SLA
Main Frame
Imaging
7. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
Host Computer
Short-stay Facility
IV Attack
WHO
8. A private network that is configured within a public network such as the Internet.
Host Computer
VPN (Virtual Private Network)
Logic Bomb
DBA (Database Administrator)
9. The standard language that defines how web pages are formatted and displayed.
Secure Shredding
Security Rule
HTML (Hypertext Markup Language)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
10. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
802.1x
Urgent Care Facility
Permission
Short-stay Facility
11. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Database Server
LAN (Local Area Network)
Acuity
Solid State Storage
12. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.
Eavesdropping
Liability
Structured Data
Data Wiping
13. Mechanism that are put in place to limit access to electronic health information.
PATA Connection
Surgical Center
Drone
Medical Record Controls
14. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
AP (Access Points)
Data Sanitation
FTP Server
Hoax
15. A file property that essentially indicates whether the file has been modified since the last back up.
OR (Operating Room)
Fiber
PCP Primary Care Physician
Archive Flag
16. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Social Engineering Attack
Private Practice
Biometrics
Scope of Practice
17. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
EAP (Extensible Authentication Protocol)
NAC (Network Access Control)
External Devices
IaaS (Infrastructure as a Service)
18. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Scope of Practice
Firewall
Superbill
Protected Health Information
19. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
Application Server
NDC ID (National Drug Code Identification)
Optical Disk
USB Connection
20. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
Meaningful Use
OCR (Optical Character Recognition)
DDoS (Distributed Denial of Service)
Switch
21. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Logic Bomb
Code Blue
ARP Poisoning
USB
22. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Database Server
Worm
Intermediate Care facility
Legal Health Record
23. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
Nursing Home
Assisted Living Facility
Stat
ISP (Internet Service Provider)
24. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
LEAP (Lightweight Extensible Authentication Protocol)
CPOE (Computerized Physician Order Entry)
Secure Chat
ISP (Internet Service Provider)
25. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Security Administrator
DNS Server
Teaching Hospital
26. A device that distributes and manages print jobs sent from client computers.
Non-profit Hospital
Print Server
Desktop Support
PHP
27. Software as a Service - A method that uses the cloud to provide application services to users.
IaaS (Infrastructure as a Service)
Data Wiping
SaaS
HHS (U.S. Department of Health and Human Services)
28. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Structured Data
Parallel Connection
ISP (Internet Service Provider)
L2TP (Layer Two Tunneling Protocol)
29. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
Liability
IDF (International Distribution Frame)
FireWire Connection
RADIUS
30. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
For-Profit Hospital
adware
PHP
802.11
31. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
Document Imaging
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Virtualization
Practice Management Software
32. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
Inpatient Treatment
Liability Waiver
NDC ID (National Drug Code Identification)
Integrity
33. A private room where a patient is examined and diagnosed by a medical practitioner.
CIA Triad(Confidentiality - Integrity - Availability)
ARP(Address Resolution Protocol)
Preceptor
Examination Room
34. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
Billing and Coding Software
SSTP (Secure Socket Tunneling Protocol)
Integrity
Physical Security Controls
35. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Security Rule
Long-stay Facility
Medical Coding
MDF (Main Distribution Frame)
36. A portable electronic security token that contains biometric user data - or other identification information.
DC (Domain Controller)
Keyfob
PEAP
Confidentiality
37. A formalized statement that defines how security will be implemented within a particular organization.
CCD(Continuity of Care Document)
Twisted Pair
Security Policy
Proxy Server
38. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Software Patch
CCD(Continuity of Care Document)
Spam
802.11a
39. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Covered Entity
antivirus software
BAA (Business Associate Agreement)
FTP (File Transfer Protocol)
40. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
Spam
Degaussing
802.11n
Differential Backup
41. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
For-Profit Hospital
Main Frame
Schedule III Controlled Substance
Tracking and Auditing Software
42. A personal computer storage decide that stores data optically - rather than magnetically.
Optical Disk
EMI (Electromagnetic Interference)
Certified EHR System
NIC (Network Interface Card )
43. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is required to provide services 24 hours a
802.11i
Archive Flag
Level IV Trauma Center
Scope of Practice
44. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
Time Server
External Devices
FTP (File Transfer Protocol)
Schedule II Controlled Substance
45. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
Fiber
Home Healthcare
Long-stay Facility
PHR (Personal Health Record)
46. A document that defines the authorized uses of PHI and how the information is to be used and managed.
NAC (Network Access Control)
Long-stay Facility
Medicare
BAA (Business Associate Agreement)
47. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.
ARP(Address Resolution Protocol)
Isolation Room
Medical Interfaces
USB
48. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
802.11g
Outpatient Treatment
Zombie
Level II Trauma Center
49. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
WTLS (Wireless Transport Layer Security)
Fax Server
Host Computer
HTML (Hypertext Markup Language)
50. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
Drone
DHCP (Dynamic Host Control Protocol)
lient-Server
Custodian