SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Level I Trauma Center
Scheduling Software
Integrity
Encryption
2. A server that contains at least one DHCP scope.
DHCP Server
OCR (Optical Character Recognition)
DBA (Database Administrator)
Eligible Provider
3. A personal computer storage device that stores data magnetically on a removable tape.
Tape Drive
Card/Badge Scanner
e-Prescribing
DHCP Server
4. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Level III Trauma Center
War Driving
IDF (International Distribution Frame)
Structured Data
5. A portable electronic security token that contains biometric user data - or other identification information.
ATA (Advanced Technology Attachment)
External Devices
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Keyfob
6. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Eavesdropping
Nursing Home
Billing and Coding Software
SSTP (Secure Socket Tunneling Protocol)
7. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Final Rule
General/Community Hospital
Strong Password
DRP (Disaster Recovery Plan)
8. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Bluejacking
Tracking and Auditing Software
IDS (Intrusion Detection System)
Mail Server
9. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
Fiber
Privacy Rule
Remote Access
CCR (Continuity of Care Record)
10. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
SQL (Structured Query Language)
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Logical Security
AP (Access Points)
11. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
Coaxial Cable
Internet Modem
Optical Disk
Acuity
12. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
Medical Coding
Schedule IV Controlled Substance
Software Hotfix
CPT (Current Procedural Terminology)
13. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.
SATA Connection
Nursing Home
SaaS
802.11i
14. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Trojan Horse
adware
Schedule V Controlled Substance
Serial Connection
15. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
ONC (Office of the National Coordinator)
War Chalking
Document Imaging
Session Hijacking
16. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
Public Health Record
RFP (Request for Proposal)
Desktop Support
DRP (Disaster Recovery Plan)
17. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Availability
HTML (Hypertext Markup Language)
Scheduling Software
Private Practice
18. A server that is primarily used to share - store - and access files.
Data Wiping
ARP(Address Resolution Protocol)
File Server
Preceptor
19. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
Bluesnarfing
Web Server
Transitive Access
FTP Server
20. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
NDC ID (National Drug Code Identification)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
ONC (Office of the National Coordinator)
Flash
21. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Imaging
adware
Medicare
Pharming
22. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Continuing Care Facility
Schedule I Controlled Substance
Logic Bomb
RADIUS
23. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
EAP (Extensible Authentication Protocol)
Server Load
IDF (International Distribution Frame)
CPT (Current Procedural Terminology)
24. An implementation in which voice signals are transmitter over IP networks.
VoIP (Voice over IP)
Card/Badge Scanner
War Driving
Display Devices
25. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
DDoS (Distributed Denial of Service)
USB Connection
PATA Connection
Integrity
26. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
WAN (Wide Area Network )
HIPAA (Health Insurance Portability and Accountability Act)
IV (Initialization Vector)
SLA
27. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Private Practice
SSH
Replay
Solid State Storage
28. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
Private Health Insurers
Continuing Care Facility
Logic Bomb
Assisted Living Facility
29. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
PaaS
E/M Codes (Evaluation and Management Codes)
Certified EHR System
RHIO (Regional Health Information Organization)
30. Software components that allow users to perform specific tasks and job functions on a computer.
Schedule IV Controlled Substance
API (Application Programming Interface)
Systems Administrator
Applications
31. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
Tape Drive
RADIUS
File Server
SaaS
32. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
Physical Security Controls
VoIP (Voice over IP)
PHR (Personal Health Record)
Virtualization
33. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
Trauma Center
Software Patch
PEAP
PCP Primary Care Physician
34. Software as a Service - A method that uses the cloud to provide application services to users.
SaaS
Bedside Medication Verification
lient-Server
MOU (Memorandum of Understanding)
35. The U.S. federal program to provide healthcare for certain low-income individual and families.
Port Scanning
Medicaid
CCD(Continuity of Care Document)
802.11
36. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
L2TP (Layer Two Tunneling Protocol)
E/M Codes (Evaluation and Management Codes)
MOU (Memorandum of Understanding)
NIST (National Institute of Standards and Technology)
37. A standard that adds AES security to the 802.11 standard
PaaS
PCP Primary Care Physician
Web Server
802.11i
38. Authentication schemes based on individuals' physical characters.
Biometrics
HTTPS (Hypertext Transfer Protocol Secure)
Home Healthcare
Tracking and Auditing Software
39. A server that stores files and programs.
Float Room
Level IV Trauma Center
Storage Server
Integrity
40. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
Meaningful Use
WTLS (Wireless Transport Layer Security)
Mixed Mode
lient-Server
41. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
FireWire Connection
802.1x
Break Glass Access
SATA Connection
42. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
Acuity
Serial Connection
Medication Reconciliation
Display Devices
43. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
Protected Health Information
Desktop Support
LEAP (Lightweight Extensible Authentication Protocol)
Network Administrator
44. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Worm
Formulary Checking
Site Survey
ICMP (Internet Control Message Protocol)
45. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
NAS (Network Attached Storage)
PGP
802.11a
Wireless Security
46. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Examination Room
PATA Connection
Centralized
DDoS (Distributed Denial of Service)
47. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.
Formulary Checking
Camera
PCP Primary Care Physician
Isolation Room
48. A method used to securely remove data from hard drives and other electronic storage devices.
Secure Shredding
Outpatient Treatment
Display Devices
Input Devices
49. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
Custodian
ARP(Address Resolution Protocol)
Host Computer
Physical Security
50. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
Security Rule
Server Utilization
Procedure Room
Medical Coding
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests