SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
RADIUS
NAS (Network Attached Storage)
NDC ID (National Drug Code Identification)
Document Scanner
2. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
AP (Access Points)
Scope of Practice
SSTP (Secure Socket Tunneling Protocol)
Private Health Record
3. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Private Health Insurers
Intermediate Care facility
Rogue Access Point
IEEE (Institute of Electrical and Electronic Engineers)
4. A network that connects wireless devices in a very close proximity but not though a wireless access point.
PAN (Personal Area Network)
ASP (Active Server Pages)
EHR (Electronic Health Record)
Schedule III Controlled Substance
5. Records that are released for public viewing.
IEEE (Institute of Electrical and Electronic Engineers)
Mixed Mode
Public Health Record
HTTPS (Hypertext Transfer Protocol Secure)
6. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
LEAP (Lightweight Extensible Authentication Protocol)
Internet Modem
Coaxial Cable
MOU (Memorandum of Understanding)
7. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
ARRA (American Recovery and Reinvestment Act
Bedside Medication Verification
CMS (Centers for Medicare and Medicaid Services)
CPT (Current Procedural Terminology)
8. A security protocol that uses certificates for authentication and encryption to protect web communication.
SSH
SSL (Secure Sockets Layer)
NIST (National Institute of Standards and Technology)
Code Blue
9. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
PACS
Change Management
Schedule III Controlled Substance
USB
10. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
Optical Disk
Man-in-the-middle
Secure Chat
War Chalking
11. A widely adopted markup language used in many documents - websites - and web applications.
API (Application Programming Interface)
PATA Connection
XML (EXtensible Markup Language)
Differential Backup
12. Systems that store networking hardware and provide networking services to local area networks within a medical environment.
Medical Coding
IaaS (Infrastructure as a Service)
Tracking and Auditing Software
IDF (International Distribution Frame)
13. A family of specification developed by the IEEE for wireless LAN technology.
NAS (Network Attached Storage)
Drone
Cloud Computing
802.11
14. Secure Shell - A protocol for secure remote logon and secure transfer of data.
SLA
DBA (Database Administrator)
SSH
Availability
15. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Centralized
Internet Modem
BAA (Business Associate Agreement)
DNS (Domain Name System)
16. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
Security Policy
Medical Coding
Custodian
SLA
17. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
Fiber
PPP (Point-to-Point Protocol)
OCR (Optical Character Recognition)
18. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Hoax
Coaxial Cable
Level I Trauma Center
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
19. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Application Server
Sniffing
Medical Record Controls
802.11
20. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Hospice Care
Pharming
Worm
FireWire Connection
21. Software as a Service - A method that uses the cloud to provide application services to users.
ARP(Address Resolution Protocol)
SaaS
ARRA (American Recovery and Reinvestment Act
IDF (International Distribution Frame)
22. Mechanism that are put in place to limit access to electronic health information.
Short-stay Facility
Medical Record Controls
Availability
Hardware Attack
23. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.
Proxy Server
Data Sanitation
ad hoc
PPP (Point-to-Point Protocol)
24. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
Isolation Room
TKIP (Temporary Key Integrity Protocol)
adware
802.11a
25. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
Firewall
Surgical Center
Server Load
MDF (Main Distribution Frame)
26. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
Non-profit Hospital
CCD(Continuity of Care Document)
Host Computer
Network Administrator
27. A personal computer storage decide that stores data optically - rather than magnetically.
Optical Disk
Main Frame
Final Rule
Interference
28. The U.S. Agency charged with protecting the health of the population and providing various human services.
HHS (U.S. Department of Health and Human Services)
RADIUS
E/M Codes (Evaluation and Management Codes)
EHR (Electronic Health Record)
29. A utility used to determine the route data takes to get to a particular destination.
FireWire Connection
LEAP (Lightweight Extensible Authentication Protocol)
Input Devices
Tracert
30. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Isolation Room
Router
Software Patch
DDoS (Distributed Denial of Service)
31. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
SNOMED CT
Acuity
Strong Password
Signature Pads
32. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Superbill
Private Health Insurers
Worm
Medicaid
33. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.
Acuity
ONC (Office of the National Coordinator)
Certified EHR System
The Joint Commission
34. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
Proxy Server
Desktop Support
PACS
Schedule V Controlled Substance
35. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.
Acuity
Trojan Horse
Break Glass Access
SATA Connection
36. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
IaaS (Infrastructure as a Service)
IV Attack
Optical Disk
DHCP Server
37. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Tape Drive
Application Server
Break Glass Access
Trauma Center
38. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
E/M Codes (Evaluation and Management Codes)
Packet Sniffing
Bluetooth
SATA Connection
39. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
802.11
e-Prescribing
Rogue Access Point
Web Server
40. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Pharming
Secure File Transfer Protocol
CIA Triad(Confidentiality - Integrity - Availability)
Home Healthcare
41. A server that is primarily used to share - store - and access files.
IM (Instant Messaging)
PHI
File Server
Parallel Tracking Software
42. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
Cloud Computing
RHIO (Regional Health Information Organization)
EAP (Extensible Authentication Protocol)
CCR (Continuity of Care Record)
43. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
Full Backup
For-Profit Hospital
Level II Trauma Center
HL7
44. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
Secure File Transfer Protocol
Phishing
FTP Server
Imaging
45. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.
Schedule I Controlled Substance
Trauma Center
Billing Clearinghouse
Mixed Mode
46. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
Ping
Physical Security Controls
XML (EXtensible Markup Language)
lient-Server
47. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Proxy Server
PPP (Point-to-Point Protocol)
ARP Poisoning
Liability
48. A LAN implementation in which nodes use a wireless network card to connect to other stations.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
LAN (Local Area Network)
Level III Trauma Center
IDS (Intrusion Detection System)
49. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
Level II Trauma Center
Final Rule
Security Administrator
HITECH Health Information Technology for Economic and Clinical Health Act)
50. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
Schedule II Controlled Substance
antivirus software
Level III Trauma Center
OCR (Optical Character Recognition)