SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Strong Password
Long-stay Facility
API (Application Programming Interface)
Rogue Access Point
2. A device that distributes and manages print jobs sent from client computers.
National Drug Code Directory
USB Connection
Print Server
adware
3. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
Desktop Support
EAP (Extensible Authentication Protocol)
Eavesdropping
Public Hospital
4. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
Fax Server
Secure File Transfer Protocol
Security Policy
5. A method used to remove any sensitive data from a mobile device and permanently delete it.
IM (Instant Messaging)
CCD(Continuity of Care Document)
Break Glass Access
Data Wiping
6. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Public Health Record
Card/Badge Scanner
Bedside Medication Verification
HDD (Hard Disk Drive)
7. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.
File Server
Flash
Imaging
Short-stay Facility
8. A standard that adds AES security to the 802.11 standard
Software Update
PATA Connection
ARP Poisoning
802.11i
9. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
FireWire Connection
SSL (Secure Sockets Layer)
802.11g
Hospice Care
10. A system that extinguishes fire using special gases.
Fire Suppression
Protected Health Information
HTTPS (Hypertext Transfer Protocol Secure)
Structured Data
11. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
Controlled substance
Meaningful Use
Stat
WHO
12. A team of clinicians assigned to work with a specific patient at any given time.
Treatment Team
Rogue Access Point
VPN Protocol
Float Room
13. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
Medicare
802.11n
Inpatient Treatment
NIC (Network Interface Card )
14. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
HIPAA (Health Insurance Portability and Accountability Act)
CCR (Continuity of Care Record)
Level I Trauma Center
Desktop Support
15. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Data Sanitation
Scope of Practice
Change Management
War Driving
16. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
Network Administrator
RADIUS
Billing Clearinghouse
CPOE (Computerized Physician Order Entry)
17. A protocol that provides VPN functionality.
Break Glass Access
SSTP (Secure Socket Tunneling Protocol)
Level II Trauma Center
VPN Protocol
18. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
Meaningful Use
SaaS
Port Scanning
WEP (Wired Equivalency Protocol)
19. A personal computer storage device that uses fixed media and magnetic data storage.
HDD (Hard Disk Drive)
National Drug Code Directory
Controlled substance
WEP (Wired Equivalency Protocol)
20. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.
Structured Data
Tracking and Auditing Software
UPS
Display Devices
21. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
Preceptor
SSL (Secure Sockets Layer)
DNS Server
NAC (Network Access Control)
22. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
Fax Server
Incremental Backup
Schedule IV Controlled Substance
Social Engineering Attack
23. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
Short-stay Facility
Data Sanitation
SNOMED CT
IaaS (Infrastructure as a Service)
24. Systems that store networking hardware and provide networking services to local area networks within a medical environment.
Port Scanning
DNS Server
Bluejacking
IDF (International Distribution Frame)
25. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
USB Connection
Schedule IV Controlled Substance
Sensitivity Label
Inpatient Treatment
26. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
General/Community Hospital
TCP/IP (Transmission Control Protocol/ Internet Protocol)
NIST (National Institute of Standards and Technology)
EMI (Electromagnetic Interference)
27. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
ICMP (Internet Control Message Protocol)
AP (Access Points)
Cloud Computing
ED (Emergency Department)
28. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Continuing Care Facility
Solid State Storage
DRP (Disaster Recovery Plan)
HTTPS (Hypertext Transfer Protocol Secure)
29. A family of specification developed by the IEEE for wireless LAN technology.
EHR (Electronic Health Record)
Schedule IV Controlled Substance
DNS (Domain Name System)
802.11
30. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
PCP Primary Care Physician
adware
CPOE (Computerized Physician Order Entry)
Data Sanitation
31. Any medical treatment or services provided on an outpatient basis.
IV Attack
Private Health Record
mbulatory care
CCHIT(Certification Commission for Health Information Technology)
32. A document that defines the authorized uses of PHI and how the information is to be used and managed.
PHI
antivirus software
BAA (Business Associate Agreement)
Eligible Provider
33. A device that connects multiple network that use the same protocol.
Router
HHS (U.S. Department of Health and Human Services)
Tracking and Auditing Software
Level V Trauma Center
34. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Protected Health Information
Non-profit Hospital
RFP (Request for Proposal)
Bluesnarfing
35. A security protocol that uses certificates for authentication and encryption to protect web communication.
SSL (Secure Sockets Layer)
DoS (Denial of Service attack)
Physical Security
Web Server
36. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
Logical Security
ARP(Address Resolution Protocol)
Examination Room
Public Hospital
37. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
NDC ID (National Drug Code Identification)
RHIO (Regional Health Information Organization)
Rogue Access Point
Nursing Home
38. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.
Document Imaging
Strong Password
Interference
Sniffing
39. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Fiber
Scope of Practice
IEEE (Institute of Electrical and Electronic Engineers)
Parallel Connection
40. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
Recover Room
Firewall
Schedule II Controlled Substance
IEEE (Institute of Electrical and Electronic Engineers)
41. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
Schedule I Controlled Substance
IDF (International Distribution Frame)
FireWire Connection
SCSI (Small Computer Systems Interface)
42. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
SSH
CCD(Continuity of Care Document)
IV Attack
Final Rule
43. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
Procedure Room
antivirus software
802.1x
LEAP (Lightweight Extensible Authentication Protocol)
44. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.
NDC ID (National Drug Code Identification)
PHP
DoS (Denial of Service attack)
Schedule I Controlled Substance
45. A backup that backs up all selected files regardless of the state of the archived bit.
Fax Printer
WHO
ROI Department
Full Backup
46. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
ASP (Active Server Pages)
Private Health Insurers
Server Utilization
Security Administrator
47. The standard language that defines how web pages are formatted and displayed.
PCP Primary Care Physician
Eligible Provider
HTML (Hypertext Markup Language)
Procedure Room
48. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
For-Profit Hospital
NAC (Network Access Control)
PHP
Security Policy
49. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Medicare
Eavesdropping
Transitive Access
Applications
50. A device used to convert paper to electronic format and then associates the file with the proper patient.
Document Scanner
Server Utilization
FTP (File Transfer Protocol)
Logical Security