SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
Change Management
Short-stay Facility
SaaS
PHP
2. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
Fax Printer
WEP (Wired Equivalency Protocol)
802.11n
Medical Record Controls
3. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.
Systems Administrator
802.11a
Site Survey
Billing Clearinghouse
4. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
External Devices
For-Profit Hospital
USB Connection
Storage Server
5. Cisco Systems' proprietary EAP implementation.
Integrity
Tape Drive
LEAP (Lightweight Extensible Authentication Protocol)
802.11b
6. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
For-Profit Hospital
National Drug Code Directory
Custodian
Hardware Attack
7. The acuteness - or level of severity - of an illness or disease.
Treatment Team
Acuity
Firewall
Host Computer
8. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
Optical Disk
Recover Room
Schedule III Controlled Substance
SSTP (Secure Socket Tunneling Protocol)
9. A private room where a patient is examined and diagnosed by a medical practitioner.
Examination Room
Trauma Center
Solid State Storage
ED (Emergency Department)
10. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.
PHP
Parallel Tracking Software
Imaging
Acuity
11. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
Meaningful Use
Hospice Care
Logic Bomb
ICMP (Internet Control Message Protocol)
12. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Eligible Provider
Fax Printer
General/Community Hospital
Firewall
13. A programming and query language common to many large scale database systems.
Differential Backup
SQL (Structured Query Language)
Applications
BAA (Business Associate Agreement)
14. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
Isolation Room
Surgical Center
Database Server
General/Community Hospital
15. A backup that backs up all selected files regardless of the state of the archived bit.
Full Backup
Twisted Pair
National Drug Code Directory
PATA Connection
16. A protocol that provides VPN functionality.
UPS
Bluesnarfing
RDP (Remote Desktop Protocol)
VPN Protocol
17. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
IaaS (Infrastructure as a Service)
SLA
Worm
Software Hotfix
18. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
802.1x
ICMP (Internet Control Message Protocol)
Scope of Practice
Eligible Provider
19. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
Short-stay Facility
CCD(Continuity of Care Document)
Eligible Provider
Billing and Coding Software
20. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
ISP (Internet Service Provider)
Teaching Hospital
Bluesnarfing
21. A server that contains at least one DHCP scope.
XML (EXtensible Markup Language)
Hoax
Sniffing
DHCP Server
22. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
ipconfig
Eligible Provider
Drug Allergy
Long-stay Facility
23. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
Secure File Transfer Protocol
OR (Operating Room)
DBA (Database Administrator)
Schedule III Controlled Substance
24. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
Scheduling Software
802.11b
Drone
802.1x
25. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.
NAS (Network Attached Storage)
PATA Connection
Trojan Horse
PaaS
26. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
Level II Trauma Center
For-Profit Hospital
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Bedside Medication Verification
27. A Protocol used to automatically assign IP addressing information to IP network computers.
Integrity
DHCP (Dynamic Host Control Protocol)
ARP(Address Resolution Protocol)
Mantrap
28. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
ASP (Active Server Pages)
802.11n
DNS (Domain Name System)
Mantrap
29. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
Non-profit Hospital
PACS
mbulatory care
CPT (Current Procedural Terminology)
30. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Mixed Mode
Site Survey
Archive Flag
Serial Connection
31. A formalized statement that defines how security will be implemented within a particular organization.
Teaching Hospital
Security Policy
Liability
War Chalking
32. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
ARP Poisoning
Input Devices
Desktop Support
Bedside Medication Verification
33. The U.S. federal program to provide healthcare for certain low-income individual and families.
Specialized Hospital
Medicaid
SaaS
SSL (Secure Sockets Layer)
34. A facility equipped to treat patients suffering traumatic injuries.
National Drug Code Directory
Software Patch
External Devices
Trauma Center
35. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
ROI Department
Schedule III Controlled Substance
Encryption
PCP Primary Care Physician
36. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
Scheduling Software
Home Healthcare
Private Health Insurers
Desktop Support
37. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
External Devices
Differential Backup
Server Load
Private Practice
38. Software as a Service - A method that uses the cloud to provide application services to users.
File Server
DHCP (Dynamic Host Control Protocol)
SaaS
Controlled substance
39. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
Surgical Center
Logical Access Control
Fax Printer
Email
40. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
Level II Trauma Center
Metadata
Tracking and Auditing Software
Scheduling Software
41. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
Private Health Insurers
Email
General/Community Hospital
Main Frame
42. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.
L2TP (Layer Two Tunneling Protocol)
Protected Health Information
Switch
Intermediate Care facility
43. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Long-stay Facility
Software Patch
Strong Password
Email
44. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.
Availability
PGP
Flash
Rogue Access Point
45. A method used to remove any sensitive data from a mobile device and permanently delete it.
Medical Coding
HDD (Hard Disk Drive)
Packet Sniffing
Data Wiping
46. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
War Driving
Inpatient Treatment
Hospice Care
Specialized Hospital
47. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.
Logical Access Control
Schedule V Controlled Substance
IaaS (Infrastructure as a Service)
Fiber
48. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Solid State Storage
Medical Interfaces
Tracking and Auditing Software
Flash
49. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.
Phishing
VPN (Virtual Private Network)
Sensitivity Label
Inpatient Treatment
50. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Legal Health Record
WEP (Wired Equivalency Protocol)
PEAP
SSL (Secure Sockets Layer)