SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Strong Password
Degaussing
Applications
Treatment Team
2. An AES cipher-based encryption protocol used in WPA2.
CCR (Continuity of Care Record)
WTLS (Wireless Transport Layer Security)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Permission
3. Personal computer components that enable users to view the text and graphical data output from a computer.
802.11g
Display Devices
Inpatient Treatment
PHP
4. The official record that an organization would release if requested.
Legal Health Record
Level III Trauma Center
Medical Interfaces
RDP (Remote Desktop Protocol)
5. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
PEAP
Medical Interfaces
Stat
Physical Security Controls
6. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
PHI
Man-in-the-middle
Medical Coding
Full Backup
7. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
SSL (Secure Sockets Layer)
LAN (Local Area Network)
ASP (Active Server Pages)
Full Backup
8. A protocol used to connect to and access a remote computer.
Private Health Insurers
PAN (Personal Area Network)
RDP (Remote Desktop Protocol)
Cloud Computing
9. Mechanism that are put in place to limit access to electronic health information.
Integrity
Switch
Email
Medical Record Controls
10. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
TTL
Security Policy
Data Sanitation
11. A Protocol used to automatically assign IP addressing information to IP network computers.
Protected Health Information
Intermediate Care facility
TTL
DHCP (Dynamic Host Control Protocol)
12. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
ED (Emergency Department)
Signature Pads
PGP
Security Rule
13. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.
Flash
ipconfig
IDF (International Distribution Frame)
Integrity
14. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
CPOE (Computerized Physician Order Entry)
Spam
PEAP
Software Patch
15. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
Medication Reconciliation
CMS (Centers for Medicare and Medicaid Services)
Fax Printer
Outpatient Treatment
16. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Solid State Storage
Medication Reconciliation
Encryption
Eavesdropping
17. A server that displays web pages to clients.
EMI (Electromagnetic Interference)
WHO
Web Server
War Driving
18. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.
PHP
Level II Trauma Center
Systems Administrator
Short-stay Facility
19. A device that connects multiple network that use the same protocol.
Host Computer
Wireless Security
Router
BAA (Business Associate Agreement)
20. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Medicare
Teaching Hospital
Display Devices
802.11n
21. Data that is added to a patient EMR to allow for quick searching and file location.
WAN (Wide Area Network )
Metadata
IM (Instant Messaging)
DDoS (Distributed Denial of Service)
22. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
Home Healthcare
FTP Server
The Joint Commission
Assisted Living Facility
23. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
LAN (Local Area Network)
802.11i
Code Blue
Coaxial Cable
24. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Covered Entity
PEAP
Structured Data
Level IV Trauma Center
25. Application code that enables various applications to communicate with each other.
API (Application Programming Interface)
Spyware
Intermediate Care facility
Solid State Storage
26. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
Legal Health Record
Hoax
TTL
Drone
27. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
L2TP (Layer Two Tunneling Protocol)
E/M Codes (Evaluation and Management Codes)
Covered Entity
Archive Flag
28. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
Serial Connection
Zombie
Logic Bomb
HHS (U.S. Department of Health and Human Services)
29. A programming and query language common to many large scale database systems.
SQL (Structured Query Language)
Site Survey
PaaS
Server Load
30. The standard language that defines how web pages are formatted and displayed.
USB
HTML (Hypertext Markup Language)
SLA
USB Connection
31. Authentication schemes based on individuals' physical characters.
Mixed Mode
IDF (International Distribution Frame)
Biometrics
adware
32. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
War Chalking
e-Prescribing
Systems Administrator
Time Server
33. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
VoIP (Voice over IP)
ATA (Advanced Technology Attachment)
DNS Server
ED (Emergency Department)
34. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.
Controlled substance
Proxy Server
LAN (Local Area Network)
Medical Coding
35. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Sniffing
Schedule V Controlled Substance
RDP (Remote Desktop Protocol)
Logical Security
36. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
Server Utilization
AP (Access Points)
PPTP (Point-to-Point Tunneling Protocol)
Protected Health Information
37. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
HTTPS (Hypertext Transfer Protocol Secure)
PCP Primary Care Physician
Man-in-the-middle
DC (Domain Controller)
38. A protocol that provides VPN functionality.
CCD(Continuity of Care Document)
VPN Protocol
Imaging Center
IDS (Intrusion Detection System)
39. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
National Drug Code Directory
Medical Interfaces
TCP/IP (Transmission Control Protocol/ Internet Protocol)
antivirus software
40. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.
SSH
RADIUS
Formulary Checking
Serial Connection
41. A server that stores files and programs.
For-Profit Hospital
Storage Server
Billing Clearinghouse
Server Load
42. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Protected Health Information
USB
SSTP (Secure Socket Tunneling Protocol)
Parallel Connection
43. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.
Site Survey
mbulatory care
EAP (Extensible Authentication Protocol)
VPN Protocol
44. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
Change Management
802.11
lient-Server
RDP (Remote Desktop Protocol)
45. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Scheduling Software
PPTP (Point-to-Point Tunneling Protocol)
Site Survey
Rogue Access Point
46. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.
Urgent Care Facility
TKIP (Temporary Key Integrity Protocol)
Web Server
SaaS
47. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
Imaging
DBA (Database Administrator)
Schedule I Controlled Substance
Liability Waiver
48. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
NAC (Network Access Control)
MDF (Main Distribution Frame)
PPTP (Point-to-Point Tunneling Protocol)
Document Scanner
49. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Data Wiping
PEAP
DBA (Database Administrator)
HDD (Hard Disk Drive)
50. A type of network that is established spontaneously through a peer-to-peer wireless connection.
ad hoc
ARP(Address Resolution Protocol)
Worm
Scheduling Software