SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A Protocol used to automatically assign IP addressing information to IP network computers.
DHCP Server
DHCP (Dynamic Host Control Protocol)
Database Server
Port Scanning
2. Secure Shell - A protocol for secure remote logon and secure transfer of data.
Switch
SSH
TKIP (Temporary Key Integrity Protocol)
IDF (International Distribution Frame)
3. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
Superbill
Level IV Trauma Center
Stat
ATA (Advanced Technology Attachment)
4. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
Drone
Session Hijacking
WHO
Secure Shredding
5. A network that displays characteristics of more than one of the three standard network models.
Mixed Mode
PEAP
Bedside Medication Verification
Human Interface Devices
6. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.
Twisted Pair
Urgent Care Facility
HDD (Hard Disk Drive)
SSH
7. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
Meaningful Use
For-Profit Hospital
DBA (Database Administrator)
Certified EHR System
8. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
PHP
Web Server
VPN (Virtual Private Network)
OCR (Optical Character Recognition)
9. A document that lists agreed upon actions between two parties.
AP (Access Points)
Schedule III Controlled Substance
CPT (Current Procedural Terminology)
MOU (Memorandum of Understanding)
10. Data that is added to a patient EMR to allow for quick searching and file location.
FTP (File Transfer Protocol)
Pharming
Metadata
FDA (Food and Drug Administration)
11. A physical security control system that has a door at each end of a secure chamber.
Schedule IV Controlled Substance
Private Health Insurers
Medicare
Mantrap
12. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
XML (EXtensible Markup Language)
Data Sanitation
WAN (Wide Area Network )
SaaS
13. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.
Meaningful Use
Isolation Room
Public Hospital
Acuity
14. See Host Computer
HTTPS (Hypertext Transfer Protocol Secure)
Main Frame
CMS (Centers for Medicare and Medicaid Services)
RADIUS
15. A server that is primarily used to share - store - and access files.
Private Practice
File Server
Parallel Connection
Drug Allergy
16. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Pharming
802.11i
Virtualization
SSH
17. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.
MDF (Main Distribution Frame)
Document Scanner
CCHIT(Certification Commission for Health Information Technology)
AP (Access Points)
18. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
PAN (Personal Area Network)
Bedside Medication Verification
Procedure Room
Fax Server
19. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
WEP (Wired Equivalency Protocol)
EMI (Electromagnetic Interference)
Fire Suppression
The Joint Commission
20. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
National Drug Code Directory
NDC ID (National Drug Code Identification)
Privacy Rule
Physical Security Controls
21. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
Private Health Insurers
Incremental Backup
NAC (Network Access Control)
Assisted Living Facility
22. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
ARP(Address Resolution Protocol)
Acuity
FireWire Connection
P2P
23. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Covered Entity
Spam
ATA (Advanced Technology Attachment)
Billing and Coding Software
24. A device that connects multiple network that use the same protocol.
Billing and Coding Software
Tracking and Auditing Software
Level IV Trauma Center
Router
25. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
PACS
Billing and Coding Software
Internet Modem
P2P
26. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
Parallel Connection
War Chalking
Non-profit Hospital
Schedule II Controlled Substance
27. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Display Devices
Pharming
Continuing Care Facility
EMI (Electromagnetic Interference)
28. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
Trauma Center
802.1x
Spyware
Print Server
29. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
Confidentiality
L2TP (Layer Two Tunneling Protocol)
Software Update
SLA
30. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
Application Server
Eligible Provider
WEP (Wired Equivalency Protocol)
Trauma Center
31. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Medicare
SNOMED CT
Bedside Medication Verification
Physical Security
32. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
Man-in-the-middle
Logical Access Control
NIC (Network Interface Card )
33. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
Drone
War Chalking
Sensitivity Label
E/M Codes (Evaluation and Management Codes)
34. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
Phishing
Bedside Medication Verification
L2TP (Layer Two Tunneling Protocol)
SCSI (Small Computer Systems Interface)
35. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
Controlled substance
IaaS (Infrastructure as a Service)
Print Server
802.11g
36. A device that distributes and manages print jobs sent from client computers.
Packet Sniffing
SaaS
HL7
Print Server
37. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
BAA (Business Associate Agreement)
API (Application Programming Interface)
CPOE (Computerized Physician Order Entry)
RHIO (Regional Health Information Organization)
38. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
Parallel Connection
Stat
Session Hijacking
ISP (Internet Service Provider)
39. A private network that is configured within a public network such as the Internet.
Drug Allergy
Superbill
DoS (Denial of Service attack)
VPN (Virtual Private Network)
40. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
Software Update
Proxy Server
Wireless Security
TTL
41. A widely adopted markup language used in many documents - websites - and web applications.
XML (EXtensible Markup Language)
Integrity
ipconfig
USB Connection
42. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Degaussing
DRP (Disaster Recovery Plan)
Ping
Level I Trauma Center
43. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
National Drug Code Directory
Controlled substance
SaaS
Metadata
44. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Final Rule
IEEE (Institute of Electrical and Electronic Engineers)
Worm
Bedside Medication Verification
45. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
Switch
HHS (U.S. Department of Health and Human Services)
Hardware Attack
HITECH Health Information Technology for Economic and Clinical Health Act)
46. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'
SCSI (Small Computer Systems Interface)
General/Community Hospital
FDA (Food and Drug Administration)
SSTP (Secure Socket Tunneling Protocol)
47. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Public Hospital
Security Administrator
For-Profit Hospital
Scope of Practice
48. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
Final Rule
Logical Security
Home Healthcare
Security Rule
49. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Permission
SCSI (Small Computer Systems Interface)
Outpatient Treatment
IEEE (Institute of Electrical and Electronic Engineers)
50. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
Schedule II Controlled Substance
File Server
Schedule III Controlled Substance
Logical Access Control
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests