SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.
Teaching Hospital
Examination Room
802.11b
Bedside Medication Verification
2. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Stat
Surgical Center
CCHIT(Certification Commission for Health Information Technology)
Spam
3. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Bedside Medication Verification
LEAP (Lightweight Extensible Authentication Protocol)
OCR (Optical Character Recognition)
Mail Server
4. Cisco Systems' proprietary EAP implementation.
Print Server
LEAP (Lightweight Extensible Authentication Protocol)
ad hoc
Level III Trauma Center
5. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Outpatient Treatment
Strong Password
Rogue Access Point
UPS
6. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Schedule IV Controlled Substance
Packet Sniffing
MDF (Main Distribution Frame)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
7. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
Data Sanitation
SQL (Structured Query Language)
FireWire Connection
Private Health Insurers
8. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Data Wiping
Level I Trauma Center
Bluesnarfing
PaaS
9. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
SSTP (Secure Socket Tunneling Protocol)
NIC (Network Interface Card )
External Devices
ATA (Advanced Technology Attachment)
10. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
Schedule II Controlled Substance
Packet Sniffing
P2P
National Drug Code Directory
11. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
Level II Trauma Center
CCD(Continuity of Care Document)
CMS (Centers for Medicare and Medicaid Services)
RADIUS
12. A network that displays characteristics of more than one of the three standard network models.
Billing and Coding Software
Float Room
Mixed Mode
RADIUS
13. A portable electronic security token that contains biometric user data - or other identification information.
Meaningful Use
Keyfob
Drone
TCP/IP (Transmission Control Protocol/ Internet Protocol)
14. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
Optical Disk
Desktop Support
Recover Room
Schedule V Controlled Substance
15. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
Application Server
Non-profit Hospital
DNS Server
Hoax
16. Electronic conversion of hard copy documents to digital form.
Document Imaging
Tracert
Billing and Coding Software
Superbill
17. A team of clinicians assigned to work with a specific patient at any given time.
Structured Data
Availability
Liability
Treatment Team
18. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
Controlled substance
RDP (Remote Desktop Protocol)
OCR (Optical Character Recognition)
Application Server
19. A Protocol used to automatically assign IP addressing information to IP network computers.
Bluejacking
War Driving
DHCP (Dynamic Host Control Protocol)
Incremental Backup
20. A standard that adds AES security to the 802.11 standard
802.11i
Data Wiping
Medication Reconciliation
Acuity
21. A server that proves the most accurate actual time to all clients in a computer network.
DNS (Domain Name System)
Solid State Storage
ARP Poisoning
Time Server
22. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
CPT (Current Procedural Terminology)
Intermediate Care facility
IM (Instant Messaging)
Flash
23. An area where surgical procedures are performer in a sterile environment.
Trauma Center
OR (Operating Room)
Inpatient Treatment
VPN Protocol
24. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Email
ARRA (American Recovery and Reinvestment Act
RHIO (Regional Health Information Organization)
Application Server
25. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
ICMP (Internet Control Message Protocol)
USB Connection
Social Engineering Attack
26. An area where all medical imaging procedures are conducted.
Imaging Center
Encryption
PPTP (Point-to-Point Tunneling Protocol)
Application Server
27. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Short-stay Facility
Practice Management Software
Centralized
The Joint Commission
28. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
Structured Data
Software Update
Social Engineering Attack
SQL (Structured Query Language)
29. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Level III Trauma Center
Eavesdropping
Spam
Port Scanning
30. Hardware components that enable users to interact with computers.
Procedure Room
Tracert
DDoS (Distributed Denial of Service)
Human Interface Devices
31. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
Non-profit Hospital
FireWire Connection
Virtualization
PATA Connection
32. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
Schedule III Controlled Substance
SQL (Structured Query Language)
E/M Codes (Evaluation and Management Codes)
Logic Bomb
33. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.
Differential Backup
Cloud Computing
Urgent Care Facility
Schedule II Controlled Substance
34. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
802.11a
Rogue Access Point
Billing and Coding Software
PAN (Personal Area Network)
35. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Replay
Internet Modem
API (Application Programming Interface)
IDS (Intrusion Detection System)
36. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
Switch
DDoS (Distributed Denial of Service)
Wireless Security
Hardware Attack
37. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
ED (Emergency Department)
Packet Sniffing
Urgent Care Facility
Teaching Hospital
38. An Instant messaging service that uses strong encryption to send and receive secure messages.
Ping
Intermediate Care facility
Secure Chat
Spam
39. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
NAC (Network Access Control)
Level IV Trauma Center
Virus
Scope of Practice
40. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Tracert
National Drug Code Directory
Security Administrator
PEAP
41. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Ping
Wireless Security
Billing and Coding Software
Covered Entity
42. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
Specialized Hospital
L2TP (Layer Two Tunneling Protocol)
Change Management
802.11n
43. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
Private Health Insurers
Systems Administrator
Permission
Virus
44. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's
Flash
Strong Password
Level I Trauma Center
DC (Domain Controller)
45. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
XML (EXtensible Markup Language)
SLA
Availability
NDC ID (National Drug Code Identification)
46. A programming and query language common to many large scale database systems.
Spyware
Schedule I Controlled Substance
SQL (Structured Query Language)
Keyfob
47. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Level III Trauma Center
Bluesnarfing
CIA Triad(Confidentiality - Integrity - Availability)
Database Server
48. A widely adopted markup language used in many documents - websites - and web applications.
Remote Access
Worm
DNS Server
XML (EXtensible Markup Language)
49. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.
The Joint Commission
RADIUS
Liability
Security Administrator
50. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
Logic Bomb
Flash
Hospice Care
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests