SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mechanism that are put in place to limit access to electronic health information.
Software Patch
FTP (File Transfer Protocol)
Medical Record Controls
Outpatient Treatment
2. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Application Server
Mixed Mode
Trojan Horse
Isolation Room
3. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are
Preceptor
Bluetooth
DBA (Database Administrator)
Parallel Tracking Software
4. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.
HTTPS (Hypertext Transfer Protocol Secure)
RDP (Remote Desktop Protocol)
Public Hospital
Secure File Transfer Protocol
5. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
Mixed Mode
Man-in-the-middle
NIST (National Institute of Standards and Technology)
Logical Security
6. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
VPN (Virtual Private Network)
RHIO (Regional Health Information Organization)
Home Healthcare
CMS (Centers for Medicare and Medicaid Services)
7. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
FTP (File Transfer Protocol)
Logical Security
Rogue Access Point
Recover Room
8. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Keyfob
USB
e-Prescribing
Data Sanitation
9. The U.S. federal program to provide healthcare for certain low-income individual and families.
ROI Department
802.11n
Medicaid
File Server
10. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
ipconfig
Spam
EAP (Extensible Authentication Protocol)
WHO
11. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
Software Update
Final Rule
Parallel Tracking Software
Private Health Insurers
12. A method used to securely remove data from hard drives and other electronic storage devices.
Secure Shredding
Hardware Attack
Liability Waiver
Legal Health Record
13. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
DHCP (Dynamic Host Control Protocol)
Sniffing
Wireless Security
Privacy Rule
14. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
DNS (Domain Name System)
Secure Chat
CCR (Continuity of Care Record)
Router
15. A device that provides network connectivity capabilities for computer systems.
Document Imaging
NIC (Network Interface Card )
Solid State Storage
MOU (Memorandum of Understanding)
16. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
SATA Connection
Session Hijacking
EAP (Extensible Authentication Protocol)
Biometrics
17. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Differential Backup
Card/Badge Scanner
Medical Interfaces
NAS (Network Attached Storage)
18. A widely adopted markup language used in many documents - websites - and web applications.
Tracking and Auditing Software
XML (EXtensible Markup Language)
SQL (Structured Query Language)
Drone
19. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
HTTPS (Hypertext Transfer Protocol Secure)
Secure Shredding
Metadata
Outpatient Treatment
20. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Code Blue
Intermediate Care facility
Hospice Care
Document Scanner
21. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Software Patch
Sensitivity Label
Internet Modem
Barcode Scanner
22. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
lient-Server
USB
Billing and Coding Software
Logical Access Control
23. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
Site Survey
Systems Administrator
HIPAA (Health Insurance Portability and Accountability Act)
802.11a
24. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
ED (Emergency Department)
802.11b
EHR (Electronic Health Record)
VPN Protocol
25. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
Security Administrator
Software Hotfix
Input Devices
Human Interface Devices
26. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
Physical Security Controls
Bedside Medication Verification
PGP
Packet Sniffing
27. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
Document Scanner
Barcode Scanner
CCHIT(Certification Commission for Health Information Technology)
Virtualization
28. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Logic Bomb
Hospice Care
Port Scanning
Billing and Coding Software
29. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
Desktop Support
PGP
PPP (Point-to-Point Protocol)
National Drug Code Directory
30. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Billing and Coding Software
Proxy Server
NDC ID (National Drug Code Identification)
Phishing
31. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.
Medicare
EAP (Extensible Authentication Protocol)
The Joint Commission
Level I Trauma Center
32. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Cloud Computing
Trojan Horse
Confidentiality
Firewall
33. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Parallel Connection
SCSI (Small Computer Systems Interface)
P2P
SSL (Secure Sockets Layer)
34. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
e-Prescribing
Legal Health Record
ipconfig
Isolation Room
35. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
NIC (Network Interface Card )
OR (Operating Room)
Pharming
Network Administrator
36. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
Acuity
WAN (Wide Area Network )
Float Room
Physical Security Controls
37. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
Logic Bomb
ISP (Internet Service Provider)
The Joint Commission
Medication Reconciliation
38. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
War Chalking
RDP (Remote Desktop Protocol)
USB
802.1x
39. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Short-stay Facility
Keyfob
WAN (Wide Area Network )
EHR (Electronic Health Record)
40. A VPN protocol that is an extension of the PPP remote access protocol.
Incremental Backup
Signature Pads
PPTP (Point-to-Point Tunneling Protocol)
Ping
41. A facility equipped to treat patients suffering traumatic injuries.
Privacy Rule
Trauma Center
Eligible Provider
Formulary Checking
42. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Session Hijacking
Bedside Medication Verification
IV (Initialization Vector)
Virus
43. An Instant messaging service that uses strong encryption to send and receive secure messages.
Level III Trauma Center
Secure Chat
Proxy Server
For-Profit Hospital
44. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
PHR (Personal Health Record)
Trauma Center
Medication Reconciliation
Teaching Hospital
45. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
802.11b
Internet Modem
DRP (Disaster Recovery Plan)
Private Health Record
46. A device that distributes and manages print jobs sent from client computers.
Security Administrator
Print Server
Software Patch
API (Application Programming Interface)
47. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
Data Wiping
L2TP (Layer Two Tunneling Protocol)
ISP (Internet Service Provider)
Print Server
48. A protocol used to connect to and access a remote computer.
RDP (Remote Desktop Protocol)
Port Scanning
HTML (Hypertext Markup Language)
Mixed Mode
49. A server that is primarily used to share - store - and access files.
SNOMED CT
Examination Room
File Server
Liability Waiver
50. A server that stores files and programs.
Controlled substance
Storage Server
Virtualization
The Joint Commission