SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
Print Server
PaaS
Eavesdropping
Schedule V Controlled Substance
2. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
Medical Coding
Long-stay Facility
Medication Reconciliation
DBA (Database Administrator)
3. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Mail Server
Bluejacking
Man-in-the-middle
Acuity
4. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
OCR (Optical Character Recognition)
Software Hotfix
Optical Disk
E/M Codes (Evaluation and Management Codes)
5. A type of network that is established spontaneously through a peer-to-peer wireless connection.
Mantrap
ad hoc
Human Interface Devices
Level III Trauma Center
6. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Long-stay Facility
UPS
Acuity
WHO
7. A device that provides network connectivity capabilities for computer systems.
Port Scanning
Document Imaging
NIC (Network Interface Card )
SQL (Structured Query Language)
8. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
PaaS
Eavesdropping
Nursing Home
FDA (Food and Drug Administration)
9. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
Packet Sniffing
Float Room
Bluejacking
802.11
10. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
Mantrap
SSL (Secure Sockets Layer)
802.11b
Router
11. Application code that enables various applications to communicate with each other.
WEP (Wired Equivalency Protocol)
Physical Security
API (Application Programming Interface)
Firewall
12. Any medical treatment or services provided on an outpatient basis.
E/M Codes (Evaluation and Management Codes)
ARRA (American Recovery and Reinvestment Act
HL7
mbulatory care
13. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Main Frame
Firewall
DNS (Domain Name System)
Hoax
14. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
PHI
ipconfig
Teaching Hospital
Phishing
15. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
Nursing Home
IDS (Intrusion Detection System)
Level II Trauma Center
USB
16. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.
802.11n
War Driving
Short-stay Facility
Urgent Care Facility
17. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Protected Health Information
Billing and Coding Software
Security Administrator
Availability
18. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
CIA Triad(Confidentiality - Integrity - Availability)
Certified EHR System
Urgent Care Facility
External Devices
19. A server that receives email request from hosts on a network - and redirects them to the intended recipient.
ISP (Internet Service Provider)
War Driving
PPTP (Point-to-Point Tunneling Protocol)
Mail Server
20. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Systems Administrator
Liability
IEEE (Institute of Electrical and Electronic Engineers)
Scheduling Software
21. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
E/M Codes (Evaluation and Management Codes)
EMI (Electromagnetic Interference)
The Joint Commission
Switch
22. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
Imaging
Medical Interfaces
Legal Health Record
TKIP (Temporary Key Integrity Protocol)
23. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Logic Bomb
FTP Server
Secure Chat
Break Glass Access
24. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Virtualization
mbulatory care
Storage Server
Eavesdropping
25. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
OR (Operating Room)
Network Administrator
Non-profit Hospital
802.11g
26. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
CMS (Centers for Medicare and Medicaid Services)
Barcode Scanner
Fiber
Meaningful Use
27. A method used to remove any sensitive data from a mobile device and permanently delete it.
Proxy Server
Preceptor
PCP Primary Care Physician
Data Wiping
28. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
Biometrics
OR (Operating Room)
802.11a
PGP
29. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Zombie
Superbill
Centralized
ONC (Office of the National Coordinator)
30. Data that is added to a patient EMR to allow for quick searching and file location.
CPOE (Computerized Physician Order Entry)
Metadata
NIST (National Institute of Standards and Technology)
mbulatory care
31. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.
Phishing
Billing and Coding Software
Drug Allergy
Zombie
32. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Secure Shredding
Hospice Care
PEAP
Isolation Room
33. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Billing Clearinghouse
Biometrics
lient-Server
Worm
34. An AES cipher-based encryption protocol used in WPA2.
Tape Drive
Trojan Horse
Router
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
35. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's
DC (Domain Controller)
Eavesdropping
Storage Server
PPTP (Point-to-Point Tunneling Protocol)
36. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'
SCSI (Small Computer Systems Interface)
Float Room
Nursing Home
Bluesnarfing
37. A personal computer storage decide that stores data optically - rather than magnetically.
Optical Disk
802.11n
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Structured Data
38. A method used to securely remove data from hard drives and other electronic storage devices.
ISP (Internet Service Provider)
Preceptor
Secure Shredding
Home Healthcare
39. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
Parallel Connection
Software Hotfix
Break Glass Access
Stat
40. The U.S. federal program to provide healthcare for certain low-income individual and families.
External Devices
Billing Clearinghouse
Medicaid
802.11i
41. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Biometrics
Remote Access
Level IV Trauma Center
Level II Trauma Center
42. A method that uses the cloud to provide any or all infrastructure needs.
Physical Security Controls
Site Survey
IaaS (Infrastructure as a Service)
MDF (Main Distribution Frame)
43. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
Surgical Center
adware
Assisted Living Facility
Coaxial Cable
44. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
DNS Server
CPT (Current Procedural Terminology)
Virtualization
PACS
45. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
War Chalking
SSTP (Secure Socket Tunneling Protocol)
Session Hijacking
Human Interface Devices
46. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
ARRA (American Recovery and Reinvestment Act
802.11b
DNS Server
Bluesnarfing
47. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
Permission
Server Utilization
Billing Clearinghouse
OCR (Optical Character Recognition)
48. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Parallel Connection
Pharming
Drug Allergy
Security Administrator
49. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Packet Sniffing
Sniffing
Virus
DC (Domain Controller)
50. A private network that is configured within a public network such as the Internet.
VPN (Virtual Private Network)
Ping
adware
NAC (Network Access Control)