SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any adverse reaction to a medication being taken.
File Server
Hardware Attack
RHIO (Regional Health Information Organization)
Drug Allergy
2. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec
Differential Backup
CPOE (Computerized Physician Order Entry)
Virus
RADIUS
3. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
Serial Connection
CPT (Current Procedural Terminology)
Email
Site Survey
4. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
ED (Emergency Department)
Flash
Medication Reconciliation
Physical Security
5. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Social Engineering Attack
Availability
War Chalking
Daily Backup
6. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Code Blue
Treatment Team
HITECH Health Information Technology for Economic and Clinical Health Act)
Continuing Care Facility
7. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
CPOE (Computerized Physician Order Entry)
Full Backup
Non-profit Hospital
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
8. A physical security control system that has a door at each end of a secure chamber.
Mantrap
SSL (Secure Sockets Layer)
Network Administrator
ED (Emergency Department)
9. The role - department - or individual that is formally responsible for a health record.
Solid State Storage
Phishing
Custodian
Fax Printer
10. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
CIA Triad(Confidentiality - Integrity - Availability)
Schedule III Controlled Substance
Zombie
Change Management
11. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
War Chalking
ATA (Advanced Technology Attachment)
Secure File Transfer Protocol
WEP (Wired Equivalency Protocol)
12. A formalized statement that defines how security will be implemented within a particular organization.
Strong Password
ASP (Active Server Pages)
Security Policy
Mantrap
13. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
DNS (Domain Name System)
Schedule III Controlled Substance
The Joint Commission
Billing Clearinghouse
14. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Bluejacking
Strong Password
Security Administrator
Permission
15. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
Schedule II Controlled Substance
Secure File Transfer Protocol
SLA
antivirus software
16. A programming and query language common to many large scale database systems.
Cloud Computing
ISP (Internet Service Provider)
SQL (Structured Query Language)
General/Community Hospital
17. A standard that adds AES security to the 802.11 standard
802.11i
Level III Trauma Center
Document Imaging
Billing Clearinghouse
18. A server that stores files and programs.
NAC (Network Access Control)
E/M Codes (Evaluation and Management Codes)
Optical Disk
Storage Server
19. A security protocol created by the IEEE task group to replace WEP.
NIC (Network Interface Card )
Web Server
TKIP (Temporary Key Integrity Protocol)
Urgent Care Facility
20. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
FireWire Connection
DNS (Domain Name System)
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Medicare
21. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Serial Connection
Permission
Medical Coding
ipconfig
22. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
PEAP
WHO
Custodian
Hardware Attack
23. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Differential Backup
HTML (Hypertext Markup Language)
Pharming
ICMP (Internet Control Message Protocol)
24. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
Twisted Pair
Input Devices
Security Rule
Degaussing
25. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Web Server
SSH
Encryption
TTL
26. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
SaaS
e-Prescribing
Bedside Medication Verification
802.11n
27. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
Medicaid
Social Engineering Attack
L2TP (Layer Two Tunneling Protocol)
Legal Health Record
28. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
Change Management
AP (Access Points)
IM (Instant Messaging)
Level I Trauma Center
29. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
VoIP (Voice over IP)
Level III Trauma Center
Home Healthcare
NAC (Network Access Control)
30. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
802.11g
War Driving
Logical Access Control
NAC (Network Access Control)
31. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Signature Pads
Proxy Server
CCHIT(Certification Commission for Health Information Technology)
CCR (Continuity of Care Record)
32. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Availability
Scope of Practice
Spam
CCHIT(Certification Commission for Health Information Technology)
33. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Eavesdropping
Formulary Checking
Imaging
Level IV Trauma Center
34. A residential facility for patients who need constant medical or nursing care and supervision.
Nursing Home
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
e-Prescribing
Secure Shredding
35. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
EMI (Electromagnetic Interference)
Covered Entity
CMS (Centers for Medicare and Medicaid Services)
Solid State Storage
36. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
Teaching Hospital
Data Sanitation
ARRA (American Recovery and Reinvestment Act
Level V Trauma Center
37. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
HHS (U.S. Department of Health and Human Services)
Imaging
Mixed Mode
CPT (Current Procedural Terminology)
38. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
FDA (Food and Drug Administration)
Schedule II Controlled Substance
NAS (Network Attached Storage)
Hospice Care
39. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Logic Bomb
Intermediate Care facility
Internet Modem
Security Rule
40. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
CPOE (Computerized Physician Order Entry)
Home Healthcare
ad hoc
ONC (Office of the National Coordinator)
41. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Rogue Access Point
Medical Record Controls
SCSI (Small Computer Systems Interface)
Hoax
42. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
Logical Access Control
Secure Shredding
Privacy Rule
Isolation Room
43. An Instant messaging service that uses strong encryption to send and receive secure messages.
Tracking and Auditing Software
Secure Chat
Tracert
Software Hotfix
44. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
DRP (Disaster Recovery Plan)
ARP Poisoning
CIA Triad(Confidentiality - Integrity - Availability)
mbulatory care
45. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
Eligible Provider
Server Load
Firewall
Mantrap
46. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
EAP (Extensible Authentication Protocol)
Virtualization
Document Imaging
Security Rule
47. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Display Devices
Medical Record Controls
Treatment Team
Private Practice
48. A private room where a patient is examined and diagnosed by a medical practitioner.
PACS
Bluejacking
Examination Room
Break Glass Access
49. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
Biometrics
PATA Connection
Specialized Hospital
Integrity
50. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.
ED (Emergency Department)
Imaging Center
Liability
Privacy Rule