SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
PATA Connection
Data Sanitation
Break Glass Access
Outpatient Treatment
2. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.
Short-stay Facility
Controlled substance
Signature Pads
Site Survey
3. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
Billing and Coding Software
E/M Codes (Evaluation and Management Codes)
Barcode Scanner
Time Server
4. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Transitive Access
Port Scanning
Signature Pads
Final Rule
5. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
Teaching Hospital
WTLS (Wireless Transport Layer Security)
Trauma Center
War Chalking
6. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
RHIO (Regional Health Information Organization)
Recover Room
PPTP (Point-to-Point Tunneling Protocol)
Virus
7. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
E/M Codes (Evaluation and Management Codes)
SNOMED CT
CCR (Continuity of Care Record)
802.11b
8. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
Schedule IV Controlled Substance
Structured Data
Private Health Insurers
CPT (Current Procedural Terminology)
9. An AES cipher-based encryption protocol used in WPA2.
Liability Waiver
SSTP (Secure Socket Tunneling Protocol)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
HITECH Health Information Technology for Economic and Clinical Health Act)
10. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
Schedule II Controlled Substance
ad hoc
Server Utilization
Storage Server
11. A backup that backs up all selected files regardless of the state of the archived bit.
Full Backup
Firewall
IDS (Intrusion Detection System)
Mixed Mode
12. An implementation in which voice signals are transmitter over IP networks.
VoIP (Voice over IP)
Coaxial Cable
Logical Security
Serial Connection
13. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Interference
PHR (Personal Health Record)
WAN (Wide Area Network )
Remote Access
14. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
Specialized Hospital
SCSI (Small Computer Systems Interface)
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
XML (EXtensible Markup Language)
15. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
IaaS (Infrastructure as a Service)
Medicare
Incremental Backup
LEAP (Lightweight Extensible Authentication Protocol)
16. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
Scope of Practice
IDS (Intrusion Detection System)
ICMP (Internet Control Message Protocol)
Medicaid
17. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
Non-profit Hospital
Coaxial Cable
Parallel Tracking Software
DC (Domain Controller)
18. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
SSTP (Secure Socket Tunneling Protocol)
ad hoc
Confidentiality
lient-Server
19. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
L2TP (Layer Two Tunneling Protocol)
P2P
PCP Primary Care Physician
Superbill
20. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.
Data Sanitation
adware
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Schedule I Controlled Substance
21. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
Optical Disk
L2TP (Layer Two Tunneling Protocol)
Fire Suppression
IV Attack
22. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.
Phishing
PEAP
RADIUS
Packet Sniffing
23. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Internet Modem
Encryption
RHIO (Regional Health Information Organization)
CCHIT(Certification Commission for Health Information Technology)
24. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Integrity
Availability
Coaxial Cable
Secure File Transfer Protocol
25. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
EAP (Extensible Authentication Protocol)
Fiber
PHP
Eligible Provider
26. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
Privacy Rule
CCD(Continuity of Care Document)
Hardware Attack
Assisted Living Facility
27. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.
Level I Trauma Center
Stat
Drug Allergy
Formulary Checking
28. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
RHIO (Regional Health Information Organization)
Host Computer
Imaging
DHCP Server
29. A device used for patient billing to capture an electronic signature.
Server Utilization
Formulary Checking
L2TP (Layer Two Tunneling Protocol)
Signature Pads
30. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.
Security Rule
SATA Connection
Level II Trauma Center
PaaS
31. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
BAA (Business Associate Agreement)
Fire Suppression
Systems Administrator
Switch
32. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
The Joint Commission
Practice Management Software
Confidentiality
SQL (Structured Query Language)
33. Systems that store networking hardware and provide networking services to local area networks within a medical environment.
IDF (International Distribution Frame)
Virtualization
Level II Trauma Center
Barcode Scanner
34. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
802.11a
Public Health Record
lient-Server
WEP (Wired Equivalency Protocol)
35. A security designation that determines the clearance for an information zone within the EHR system.
Sensitivity Label
Certified EHR System
CMS (Centers for Medicare and Medicaid Services)
VPN (Virtual Private Network)
36. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Software Patch
802.11
Medicaid
e-Prescribing
37. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.
Storage Server
Hoax
TTL
Break Glass Access
38. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.
Teaching Hospital
War Chalking
For-Profit Hospital
Transitive Access
39. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
Host Computer
adware
Specialized Hospital
Centralized
40. A formalized statement that defines how security will be implemented within a particular organization.
Virus
Security Policy
Transitive Access
Applications
41. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Replay
OCR (Optical Character Recognition)
SATA Connection
42. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
API (Application Programming Interface)
PHR (Personal Health Record)
Secure Chat
Metadata
43. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
L2TP (Layer Two Tunneling Protocol)
802.11
Protected Health Information
PAN (Personal Area Network)
44. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Covered Entity
SLA
DHCP Server
PEAP
45. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
Privacy Rule
Change Management
Software Hotfix
ARP Poisoning
46. A backup that backs up all selected files on a daily basis.
Daily Backup
Certified EHR System
Hardware Attack
HIPAA (Health Insurance Portability and Accountability Act)
47. Software as a Service - A method that uses the cloud to provide application services to users.
SaaS
HDD (Hard Disk Drive)
Applications
DC (Domain Controller)
48. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Availability
IaaS (Infrastructure as a Service)
Application Server
USB Connection
49. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Main Frame
Liability
Sensitivity Label
Software Update
50. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Bluesnarfing
e-Prescribing
Spam
Medicaid