SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
Barcode Scanner
Nursing Home
Medical Interfaces
Private Practice
2. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
Billing and Coding Software
Logical Access Control
PACS
External Devices
3. A server that receives email request from hosts on a network - and redirects them to the intended recipient.
Availability
WHO
Mail Server
PEAP
4. A private network that is configured within a public network such as the Internet.
TTL
Certified EHR System
VPN (Virtual Private Network)
RDP (Remote Desktop Protocol)
5. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec
Custodian
Virus
Server Load
Physical Security
6. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
Server Utilization
DNS Server
NAC (Network Access Control)
DHCP (Dynamic Host Control Protocol)
7. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
ICMP (Internet Control Message Protocol)
802.11a
AP (Access Points)
Remote Access
8. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Code Blue
802.1x
Physical Security Controls
Card/Badge Scanner
9. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
For-Profit Hospital
PHP
Schedule IV Controlled Substance
Scheduling Software
10. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
DC (Domain Controller)
Logical Access Control
File Server
Physical Security
11. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
lient-Server
Code Blue
PATA Connection
Document Imaging
12. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
Schedule III Controlled Substance
Hardware Attack
Short-stay Facility
Acuity
13. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
Parallel Connection
Man-in-the-middle
Wireless Security
Procedure Room
14. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
RADIUS
Medical Coding
Bluesnarfing
Continuing Care Facility
15. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
Legal Health Record
lient-Server
Barcode Scanner
VPN Protocol
16. The U.S. federal program to provide healthcare for certain low-income individual and families.
EHR (Electronic Health Record)
Medicaid
Private Health Insurers
Logic Bomb
17. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
LEAP (Lightweight Extensible Authentication Protocol)
Replay
OR (Operating Room)
Final Rule
18. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
Specialized Hospital
Fiber
WTLS (Wireless Transport Layer Security)
NIST (National Institute of Standards and Technology)
19. Any medical treatment or services provided on an outpatient basis.
mbulatory care
Legal Health Record
DoS (Denial of Service attack)
IM (Instant Messaging)
20. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
Switch
Medicare
Session Hijacking
Ping
21. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Acuity
SaaS
Logical Access Control
Differential Backup
22. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
Fire Suppression
Document Scanner
Medical Coding
Virtualization
23. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
Sniffing
NIST (National Institute of Standards and Technology)
802.11g
Eligible Provider
24. A protocol that provides VPN functionality.
Fire Suppression
VPN Protocol
EHR (Electronic Health Record)
Tracking and Auditing Software
25. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
CPT (Current Procedural Terminology)
Logical Security
Virtualization
Continuing Care Facility
26. A document that defines the authorized uses of PHI and how the information is to be used and managed.
Medical Record Controls
BAA (Business Associate Agreement)
Metadata
Human Interface Devices
27. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
AP (Access Points)
NAC (Network Access Control)
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
CCD(Continuity of Care Document)
28. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
CCHIT(Certification Commission for Health Information Technology)
Liability
IEEE (Institute of Electrical and Electronic Engineers)
Superbill
29. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
SaaS
NDC ID (National Drug Code Identification)
Schedule I Controlled Substance
Structured Data
30. A widely adopted markup language used in many documents - websites - and web applications.
Bluesnarfing
XML (EXtensible Markup Language)
Document Scanner
Physical Security Controls
31. Software protection systems in an organization.
Twisted Pair
Transitive Access
VoIP (Voice over IP)
Logical Security
32. A standard that adds AES security to the 802.11 standard
Covered Entity
Scheduling Software
802.11i
Port Scanning
33. A network that displays characteristics of more than one of the three standard network models.
Meaningful Use
Mixed Mode
Ping
e-Prescribing
34. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Remote Access
Bluetooth
Superbill
Level I Trauma Center
35. A security designation that determines the clearance for an information zone within the EHR system.
Sensitivity Label
Software Update
VoIP (Voice over IP)
Security Policy
36. Mechanism that are put in place to limit access to electronic health information.
CIA Triad(Confidentiality - Integrity - Availability)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Schedule IV Controlled Substance
Medical Record Controls
37. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
CPOE (Computerized Physician Order Entry)
Tracking and Auditing Software
Bedside Medication Verification
ARP(Address Resolution Protocol)
38. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
Stat
Preceptor
PACS
IM (Instant Messaging)
39. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.
Float Room
Isolation Room
Display Devices
802.1x
40. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
Practice Management Software
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
FDA (Food and Drug Administration)
Fax Printer
41. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Specialized Hospital
Packet Sniffing
MOU (Memorandum of Understanding)
NIST (National Institute of Standards and Technology)
42. A device that connects multiple network that use the same protocol.
Router
802.11
802.11b
PEAP
43. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
P2P
Secure Shredding
HL7
Man-in-the-middle
44. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
DRP (Disaster Recovery Plan)
Data Sanitation
CPT (Current Procedural Terminology)
P2P
45. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
IEEE (Institute of Electrical and Electronic Engineers)
Security Policy
Private Health Insurers
Print Server
46. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.
PHI
NAS (Network Attached Storage)
Teaching Hospital
Superbill
47. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
Network Administrator
CCD(Continuity of Care Document)
OCR (Optical Character Recognition)
Public Hospital
48. A residential facility for patients who need constant medical or nursing care and supervision.
Fire Suppression
Nursing Home
Sniffing
Mixed Mode
49. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
Code Blue
Secure Shredding
ARP Poisoning
Nursing Home
50. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
Applications
WHO
War Chalking
L2TP (Layer Two Tunneling Protocol)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests