SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
DBA (Database Administrator)
SQL (Structured Query Language)
Network Administrator
P2P
2. A device that distributes and manages print jobs sent from client computers.
antivirus software
ipconfig
Print Server
PACS
3. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
SNOMED CT
SATA Connection
War Chalking
mbulatory care
4. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
DNS (Domain Name System)
802.1x
DBA (Database Administrator)
Mail Server
5. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Specialized Hospital
Bluetooth
Bluejacking
Social Engineering Attack
6. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.
Security Administrator
802.1x
VoIP (Voice over IP)
Public Hospital
7. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
Meaningful Use
Transitive Access
802.11a
802.11
8. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
RFP (Request for Proposal)
SSH
Inpatient Treatment
lient-Server
9. A Specialized file server that is designed and dedicated to support only data storage needs.
NAS (Network Attached Storage)
Schedule II Controlled Substance
WAN (Wide Area Network )
USB
10. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Encryption
VPN Protocol
EAP (Extensible Authentication Protocol)
PAN (Personal Area Network)
11. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.
Twisted Pair
IaaS (Infrastructure as a Service)
Coaxial Cable
HITECH Health Information Technology for Economic and Clinical Health Act)
12. A utility used to determine the route data takes to get to a particular destination.
Tracert
Security Rule
Scheduling Software
Pharming
13. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
DoS (Denial of Service attack)
Imaging Center
OCR (Optical Character Recognition)
Float Room
14. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.
Bedside Medication Verification
Schedule I Controlled Substance
Liability Waiver
Main Frame
15. A document that defines the authorized uses of PHI and how the information is to be used and managed.
Long-stay Facility
Liability
BAA (Business Associate Agreement)
Eligible Provider
16. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
OCR (Optical Character Recognition)
NIST (National Institute of Standards and Technology)
Logical Access Control
Change Management
17. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
802.11a
Tracert
Availability
Phishing
18. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
RADIUS
SATA Connection
Covered Entity
Superbill
19. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
Wireless Security
MOU (Memorandum of Understanding)
Document Imaging
PHR (Personal Health Record)
20. A VPN protocol that is an extension of the PPP remote access protocol.
Rogue Access Point
PPTP (Point-to-Point Tunneling Protocol)
For-Profit Hospital
Medicaid
21. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.
Long-stay Facility
Billing Clearinghouse
Logical Access Control
Application Server
22. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Confidentiality
Float Room
PCP Primary Care Physician
Fire Suppression
23. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
Scope of Practice
IM (Instant Messaging)
ARRA (American Recovery and Reinvestment Act
Isolation Room
24. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
API (Application Programming Interface)
Twisted Pair
WTLS (Wireless Transport Layer Security)
Barcode Scanner
25. A method used to remove any sensitive data from a mobile device and permanently delete it.
Data Wiping
Specialized Hospital
DNS (Domain Name System)
FTP Server
26. A team of clinicians assigned to work with a specific patient at any given time.
Availability
Solid State Storage
PaaS
Treatment Team
27. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
Controlled substance
Liability
Mixed Mode
Wireless Security
28. Records that are not for public consumption and require appropriate release before they can be shared.
Integrity
Private Health Record
Virtualization
TTL
29. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
WEP (Wired Equivalency Protocol)
Level I Trauma Center
Print Server
Zombie
30. Personal computer components that enable users to view the text and graphical data output from a computer.
Human Interface Devices
Display Devices
Trojan Horse
SSTP (Secure Socket Tunneling Protocol)
31. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
Document Scanner
PaaS
Schedule I Controlled Substance
CPOE (Computerized Physician Order Entry)
32. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Tracert
Strong Password
Urgent Care Facility
IV (Initialization Vector)
33. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
Worm
Router
FDA (Food and Drug Administration)
Host Computer
34. A hospital specialized to treat a specific disease or condition or a specific type of patient.
Specialized Hospital
Level IV Trauma Center
Medical Record Controls
Storage Server
35. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
PCP Primary Care Physician
Session Hijacking
NAC (Network Access Control)
Bluesnarfing
36. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Archive Flag
ICMP (Internet Control Message Protocol)
Schedule IV Controlled Substance
Ping
37. A security setting that determines the level of access a user or group account has to be particular resource.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Internet Modem
Man-in-the-middle
Permission
38. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Zombie
Covered Entity
Sniffing
Logical Security
39. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
Inpatient Treatment
ISP (Internet Service Provider)
Integrity
PGP
40. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
Final Rule
Fire Suppression
MDF (Main Distribution Frame)
Nursing Home
41. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
General/Community Hospital
IM (Instant Messaging)
Non-profit Hospital
Code Blue
42. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.
Parallel Tracking Software
Medical Coding
Hoax
Barcode Scanner
43. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
ONC (Office of the National Coordinator)
Medicare
Schedule III Controlled Substance
Urgent Care Facility
44. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
DHCP (Dynamic Host Control Protocol)
Serial Connection
Card/Badge Scanner
Intermediate Care facility
45. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
CIA Triad(Confidentiality - Integrity - Availability)
E/M Codes (Evaluation and Management Codes)
Daily Backup
Physical Security Controls
46. A TCP/IP utility used to verity the network connectivity of a computer.
The Joint Commission
Ping
PHP
DC (Domain Controller)
47. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Logical Security
PEAP
Hoax
Daily Backup
48. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Site Survey
Treatment Team
Port Scanning
Superbill
49. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Security Rule
Replay
AP (Access Points)
Preceptor
50. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
Document Imaging
Firewall
802.11b
Bluesnarfing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests