SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A facility equipped to treat patients suffering traumatic injuries.
FireWire Connection
NAC (Network Access Control)
VPN Protocol
Trauma Center
2. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Medication Reconciliation
Integrity
Port Scanning
Superbill
3. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
802.11i
Schedule II Controlled Substance
Bluesnarfing
Preceptor
4. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
PHI
PATA Connection
Scheduling Software
DC (Domain Controller)
5. A company that provides access to the Internet.
Privacy Rule
VPN (Virtual Private Network)
ISP (Internet Service Provider)
SNOMED CT
6. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Hospice Care
Public Health Record
Human Interface Devices
Sensitivity Label
7. Electronic messages sent between users or groups.
Email
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Phishing
NIST (National Institute of Standards and Technology)
8. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
Degaussing
PAN (Personal Area Network)
Private Health Insurers
9. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
DHCP Server
Site Survey
War Chalking
IDF (International Distribution Frame)
10. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
Billing and Coding Software
USB Connection
Level III Trauma Center
Fire Suppression
11. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Metadata
Physical Security Controls
Pharming
12. Any adverse reaction to a medication being taken.
Drone
Liability Waiver
BAA (Business Associate Agreement)
Drug Allergy
13. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
VoIP (Voice over IP)
IEEE (Institute of Electrical and Electronic Engineers)
Document Scanner
WAN (Wide Area Network )
14. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
Flash
Man-in-the-middle
Level III Trauma Center
EAP (Extensible Authentication Protocol)
15. A server that stores files and programs.
PGP
Public Hospital
Desktop Support
Storage Server
16. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
PHP
IEEE (Institute of Electrical and Electronic Engineers)
Replay
Secure File Transfer Protocol
17. The official record that an organization would release if requested.
ipconfig
Legal Health Record
ad hoc
For-Profit Hospital
18. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.
Isolation Room
Break Glass Access
Server Load
PPP (Point-to-Point Protocol)
19. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
SATA Connection
Remote Access
Assisted Living Facility
FireWire Connection
20. Records that are not for public consumption and require appropriate release before they can be shared.
Private Health Record
Email
Camera
FTP (File Transfer Protocol)
21. Software protection systems in an organization.
Differential Backup
802.11b
Logical Security
Data Sanitation
22. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
Firewall
Outpatient Treatment
Security Rule
Schedule I Controlled Substance
23. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
Host Computer
Inpatient Treatment
E/M Codes (Evaluation and Management Codes)
Surgical Center
24. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
Billing and Coding Software
Serial Connection
For-Profit Hospital
Medical Record Controls
25. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Host Computer
Private Practice
SATA Connection
26. Unwanted software that collects personal user data from a system and transmits it to a third party.
General/Community Hospital
Teaching Hospital
PaaS
Spyware
27. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
SaaS
Sensitivity Label
Medical Coding
USB
28. A server that displays web pages to clients.
Mail Server
NAC (Network Access Control)
PATA Connection
Web Server
29. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
Non-profit Hospital
Mail Server
EHR (Electronic Health Record)
ipconfig
30. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.
Optical Disk
EHR (Electronic Health Record)
MDF (Main Distribution Frame)
Incremental Backup
31. A server that proves the most accurate actual time to all clients in a computer network.
Time Server
HL7
Biometrics
Covered Entity
32. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
IDF (International Distribution Frame)
Secure Shredding
Differential Backup
ED (Emergency Department)
33. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
PPP (Point-to-Point Protocol)
Proxy Server
Scheduling Software
PEAP
34. The official ANSI term for IDE drives.
Secure Shredding
Sniffing
ATA (Advanced Technology Attachment)
Server Utilization
35. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
National Drug Code Directory
Document Imaging
Encryption
Schedule III Controlled Substance
36. A protocol used to connect to and access a remote computer.
Document Imaging
Float Room
RDP (Remote Desktop Protocol)
Permission
37. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Bluesnarfing
DRP (Disaster Recovery Plan)
Specialized Hospital
Privacy Rule
38. A family of specification developed by the IEEE for wireless LAN technology.
Solid State Storage
Server Utilization
802.11
Data Sanitation
39. A server that provides database services to other computers in a network.
Bluetooth
Medication Reconciliation
Database Server
EMI (Electromagnetic Interference)
40. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Bluejacking
Final Rule
File Server
SLA
41. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
FDA (Food and Drug Administration)
SSH
Billing and Coding Software
Transitive Access
42. An IT role that is responsible for the network infrastructure and components withing an organization.
HHS (U.S. Department of Health and Human Services)
ipconfig
Network Administrator
Database Server
43. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
HL7
DHCP (Dynamic Host Control Protocol)
Controlled substance
Schedule III Controlled Substance
44. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.
HTTPS (Hypertext Transfer Protocol Secure)
Metadata
ROI Department
Examination Room
45. Personal computer components that enable users to enter data or instructions into a computer.
EAP (Extensible Authentication Protocol)
Input Devices
IDF (International Distribution Frame)
Rogue Access Point
46. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Firewall
Differential Backup
Logic Bomb
Covered Entity
47. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
Network Administrator
Imaging
Acuity
FTP (File Transfer Protocol)
48. A method used to remove any sensitive data from a mobile device and permanently delete it.
Float Room
War Chalking
Data Wiping
The Joint Commission
49. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
MDF (Main Distribution Frame)
Security Rule
Drone
Controlled substance
50. A security protocol created by the IEEE task group to replace WEP.
DBA (Database Administrator)
IDF (International Distribution Frame)
Schedule II Controlled Substance
TKIP (Temporary Key Integrity Protocol)