SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
Superbill
HITECH Health Information Technology for Economic and Clinical Health Act)
HHS (U.S. Department of Health and Human Services)
Network Administrator
2. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Level II Trauma Center
Remote Access
SSL (Secure Sockets Layer)
Document Scanner
3. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
Protected Health Information
Long-stay Facility
Privacy Rule
USB
4. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are
Bluetooth
Parallel Tracking Software
ARP Poisoning
ad hoc
5. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
Schedule III Controlled Substance
Schedule IV Controlled Substance
Specialized Hospital
Trojan Horse
6. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
Software Hotfix
Replay
ad hoc
ARRA (American Recovery and Reinvestment Act
7. Records that are not for public consumption and require appropriate release before they can be shared.
Ping
SSTP (Secure Socket Tunneling Protocol)
E/M Codes (Evaluation and Management Codes)
Private Health Record
8. Personal computer components that enable users to enter data or instructions into a computer.
802.11n
Teaching Hospital
Privacy Rule
Input Devices
9. The acuteness - or level of severity - of an illness or disease.
Acuity
Specialized Hospital
Medical Interfaces
Document Imaging
10. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.
IDS (Intrusion Detection System)
OCR (Optical Character Recognition)
UPS
Urgent Care Facility
11. A utility used to determine the route data takes to get to a particular destination.
PACS
Outpatient Treatment
L2TP (Layer Two Tunneling Protocol)
Tracert
12. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Web Server
Bluesnarfing
ARP(Address Resolution Protocol)
IV (Initialization Vector)
13. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
DHCP Server
Degaussing
SQL (Structured Query Language)
Structured Data
14. An area where all medical imaging procedures are conducted.
Imaging Center
War Chalking
802.11g
EHR (Electronic Health Record)
15. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Router
Continuing Care Facility
Structured Data
Replay
16. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.
Display Devices
Examination Room
Controlled substance
Scheduling Software
17. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
EAP (Extensible Authentication Protocol)
Level II Trauma Center
Tracert
ATA (Advanced Technology Attachment)
18. A method used to securely remove data from hard drives and other electronic storage devices.
Bedside Medication Verification
ad hoc
Document Imaging
Secure Shredding
19. A server that is primarily used to share - store - and access files.
Applications
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Drug Allergy
File Server
20. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Practice Management Software
Bluejacking
Fax Server
EAP (Extensible Authentication Protocol)
21. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Strong Password
Physical Security
NIC (Network Interface Card )
Confidentiality
22. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.
Port Scanning
Integrity
SQL (Structured Query Language)
Flash
23. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
Imaging Center
Desktop Support
CPOE (Computerized Physician Order Entry)
Superbill
24. Software components that allow users to perform specific tasks and job functions on a computer.
Metadata
Liability
Applications
File Server
25. A formalized statement that defines how security will be implemented within a particular organization.
Custodian
CMS (Centers for Medicare and Medicaid Services)
Security Policy
External Devices
26. A personal computer storage decide that stores data optically - rather than magnetically.
Level V Trauma Center
Level II Trauma Center
Switch
Optical Disk
27. Software as a Service - A method that uses the cloud to provide application services to users.
Biometrics
Bluejacking
Strong Password
SaaS
28. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Centralized
Sniffing
AP (Access Points)
CPT (Current Procedural Terminology)
29. Authentication schemes based on individuals' physical characters.
Urgent Care Facility
Ping
XML (EXtensible Markup Language)
Biometrics
30. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
IV (Initialization Vector)
Interference
MDF (Main Distribution Frame)
Scheduling Software
31. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Parallel Tracking Software
ARRA (American Recovery and Reinvestment Act
Covered Entity
Trojan Horse
32. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
SLA
P2P
Assisted Living Facility
WEP (Wired Equivalency Protocol)
33. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
RFP (Request for Proposal)
FDA (Food and Drug Administration)
Parallel Tracking Software
Privacy Rule
34. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.
Logical Access Control
ISP (Internet Service Provider)
Liability Waiver
General/Community Hospital
35. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
Integrity
USB Connection
PCP Primary Care Physician
Server Load
36. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
Camera
EMI (Electromagnetic Interference)
NAC (Network Access Control)
Urgent Care Facility
37. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
Medical Coding
Wireless Security
Parallel Connection
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
38. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
MDF (Main Distribution Frame)
ASP (Active Server Pages)
PHP
39. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
Secure Chat
DHCP Server
Trojan Horse
Inpatient Treatment
40. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
Medical Interfaces
USB Connection
ED (Emergency Department)
Superbill
41. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
Preceptor
Bedside Medication Verification
Network Administrator
802.11g
42. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
Biometrics
HL7
Wireless Security
IV (Initialization Vector)
43. A family of specification developed by the IEEE for wireless LAN technology.
Practice Management Software
Human Interface Devices
Controlled substance
802.11
44. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Scope of Practice
Replay
Physical Security
NIC (Network Interface Card )
45. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.
Preceptor
mbulatory care
Public Health Record
LAN (Local Area Network)
46. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
PaaS
Internet Modem
Public Health Record
Medical Record Controls
47. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.
Liability
CCHIT(Certification Commission for Health Information Technology)
ARP(Address Resolution Protocol)
Barcode Scanner
48. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
Stat
SQL (Structured Query Language)
DNS (Domain Name System)
BAA (Business Associate Agreement)
49. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
Schedule V Controlled Substance
Medical Record Controls
PACS
API (Application Programming Interface)
50. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
Controlled substance
CIA Triad(Confidentiality - Integrity - Availability)
Superbill
Twisted Pair