SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
SLA
Level V Trauma Center
ED (Emergency Department)
Social Engineering Attack
2. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
IDS (Intrusion Detection System)
Superbill
Assisted Living Facility
Medical Coding
3. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
File Server
DBA (Database Administrator)
Flash
SSTP (Secure Socket Tunneling Protocol)
4. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
PaaS
Bedside Medication Verification
Billing and Coding Software
Barcode Scanner
5. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
WEP (Wired Equivalency Protocol)
Covered Entity
Secure Shredding
Flash
6. An AES cipher-based encryption protocol used in WPA2.
ARRA (American Recovery and Reinvestment Act
XML (EXtensible Markup Language)
PAN (Personal Area Network)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
7. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
CIA Triad(Confidentiality - Integrity - Availability)
MDF (Main Distribution Frame)
Trauma Center
Virtualization
8. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
Transitive Access
Centralized
CPOE (Computerized Physician Order Entry)
The Joint Commission
9. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
USB Connection
Coaxial Cable
OR (Operating Room)
Eligible Provider
10. An area where surgical procedures are performer in a sterile environment.
OR (Operating Room)
IEEE (Institute of Electrical and Electronic Engineers)
EMI (Electromagnetic Interference)
RHIO (Regional Health Information Organization)
11. A communication protocol that enables the transfer of files between a user's workstation and a remote host
FTP (File Transfer Protocol)
Logic Bomb
USB
Logical Security
12. A team of clinicians assigned to work with a specific patient at any given time.
RDP (Remote Desktop Protocol)
Software Hotfix
Treatment Team
Liability Waiver
13. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
External Devices
Public Health Record
Schedule II Controlled Substance
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
14. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
EMI (Electromagnetic Interference)
Procedure Room
RHIO (Regional Health Information Organization)
OCR (Optical Character Recognition)
15. Records that are not for public consumption and require appropriate release before they can be shared.
Private Health Record
802.1x
SSL (Secure Sockets Layer)
Break Glass Access
16. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
Software Hotfix
ONC (Office of the National Coordinator)
802.11a
TTL
17. Cisco Systems' proprietary EAP implementation.
LEAP (Lightweight Extensible Authentication Protocol)
CIA Triad(Confidentiality - Integrity - Availability)
RFP (Request for Proposal)
Logical Security
18. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
Non-profit Hospital
Liability Waiver
Continuing Care Facility
ipconfig
19. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
SCSI (Small Computer Systems Interface)
CMS (Centers for Medicare and Medicaid Services)
802.11g
For-Profit Hospital
20. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
DRP (Disaster Recovery Plan)
ARP Poisoning
Desktop Support
Recover Room
21. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
Cloud Computing
Privacy Rule
P2P
Specialized Hospital
22. Mechanism that are put in place to limit access to electronic health information.
ARP Poisoning
Medical Record Controls
Trojan Horse
Schedule IV Controlled Substance
23. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
SNOMED CT
Surgical Center
IDF (International Distribution Frame)
PaaS
24. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.
Document Imaging
Serial Connection
Coaxial Cable
CMS (Centers for Medicare and Medicaid Services)
25. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
Home Healthcare
Differential Backup
ipconfig
Eligible Provider
26. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
RADIUS
802.11n
PPP (Point-to-Point Protocol)
IV (Initialization Vector)
27. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.
USB
ISP (Internet Service Provider)
e-Prescribing
Incremental Backup
28. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
Metadata
Private Health Insurers
MOU (Memorandum of Understanding)
Logical Access Control
29. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Time Server
Medication Reconciliation
Centralized
PPP (Point-to-Point Protocol)
30. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Certified EHR System
DoS (Denial of Service attack)
Software Hotfix
Level III Trauma Center
31. Personal computer components that enable users to enter data or instructions into a computer.
Input Devices
Medical Interfaces
WHO
802.1x
32. A security protocol created by the IEEE task group to replace WEP.
802.1x
Logic Bomb
TKIP (Temporary Key Integrity Protocol)
NDC ID (National Drug Code Identification)
33. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
Print Server
Session Hijacking
Certified EHR System
SATA Connection
34. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
Procedure Room
SSTP (Secure Socket Tunneling Protocol)
Level V Trauma Center
e-Prescribing
35. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Eavesdropping
802.11i
Drone
War Driving
36. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
Billing and Coding Software
Parallel Tracking Software
Camera
Virtualization
37. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Spam
Interference
802.11a
DNS Server
38. A protocol used to connect to and access a remote computer.
RHIO (Regional Health Information Organization)
PCP Primary Care Physician
RDP (Remote Desktop Protocol)
Hospice Care
39. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
Data Wiping
Private Health Insurers
Intermediate Care facility
Imaging Center
40. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
IM (Instant Messaging)
SSTP (Secure Socket Tunneling Protocol)
Inpatient Treatment
Port Scanning
41. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
Card/Badge Scanner
Barcode Scanner
Medical Interfaces
IDS (Intrusion Detection System)
42. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.
Email
Man-in-the-middle
Camera
Logical Security
43. A security designation that determines the clearance for an information zone within the EHR system.
PPTP (Point-to-Point Tunneling Protocol)
Sensitivity Label
Session Hijacking
Router
44. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Mantrap
Signature Pads
HL7
Serial Connection
45. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
WTLS (Wireless Transport Layer Security)
General/Community Hospital
PHI
Security Policy
46. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Worm
OCR (Optical Character Recognition)
Formulary Checking
War Chalking
47. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
Bluejacking
RHIO (Regional Health Information Organization)
Interference
Twisted Pair
48. A network that displays characteristics of more than one of the three standard network models.
Mixed Mode
Home Healthcare
AP (Access Points)
Rogue Access Point
49. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Twisted Pair
DBA (Database Administrator)
IEEE (Institute of Electrical and Electronic Engineers)
Rogue Access Point
50. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.
PATA Connection
Interference
MDF (Main Distribution Frame)
Privacy Rule
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests