SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
PAN (Personal Area Network)
AP (Access Points)
Metadata
Physical Security Controls
2. Electronic messages sent between users or groups.
FireWire Connection
Session Hijacking
Inpatient Treatment
Email
3. A network that connects wireless devices in a very close proximity but not though a wireless access point.
Email
HTTPS (Hypertext Transfer Protocol Secure)
PAN (Personal Area Network)
Tracert
4. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
Secure Chat
SNOMED CT
Database Server
Barcode Scanner
5. A Protocol used to automatically assign IP addressing information to IP network computers.
802.11a
Keyfob
DHCP (Dynamic Host Control Protocol)
Host Computer
6. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
ARRA (American Recovery and Reinvestment Act
Secure Chat
mbulatory care
Rogue Access Point
7. A physical security control system that has a door at each end of a secure chamber.
Mantrap
Eavesdropping
Schedule III Controlled Substance
RDP (Remote Desktop Protocol)
8. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
NAS (Network Attached Storage)
Break Glass Access
Fire Suppression
IV (Initialization Vector)
9. A server that proves the most accurate actual time to all clients in a computer network.
Privacy Rule
Encryption
Time Server
Teaching Hospital
10. A family of specification developed by the IEEE for wireless LAN technology.
For-Profit Hospital
802.11
NIC (Network Interface Card )
Change Management
11. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Firewall
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Scheduling Software
Data Sanitation
12. A protocol that provides VPN functionality.
VPN Protocol
WTLS (Wireless Transport Layer Security)
PAN (Personal Area Network)
General/Community Hospital
13. A VPN protocol that is an extension of the PPP remote access protocol.
PPTP (Point-to-Point Tunneling Protocol)
FireWire Connection
VPN Protocol
Availability
14. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
P2P
VPN Protocol
Drone
ARP Poisoning
15. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
Secure Chat
Fax Printer
Medication Reconciliation
National Drug Code Directory
16. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Scheduling Software
Billing and Coding Software
PaaS
Spam
17. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.
CIA Triad(Confidentiality - Integrity - Availability)
Controlled substance
Imaging
Acuity
18. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
DHCP (Dynamic Host Control Protocol)
Pharming
Private Practice
Inpatient Treatment
19. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
SNOMED CT
HTML (Hypertext Markup Language)
Schedule II Controlled Substance
SSL (Secure Sockets Layer)
20. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
IEEE (Institute of Electrical and Electronic Engineers)
ED (Emergency Department)
Physical Security Controls
ipconfig
21. A server that receives email request from hosts on a network - and redirects them to the intended recipient.
Scheduling Software
Practice Management Software
Mail Server
Internet Modem
22. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
Desktop Support
Firewall
HITECH Health Information Technology for Economic and Clinical Health Act)
Recover Room
23. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
Intermediate Care facility
e-Prescribing
Treatment Team
Bedside Medication Verification
24. The amount of work a server performs on a regular basis.
Assisted Living Facility
PPTP (Point-to-Point Tunneling Protocol)
Server Load
Medical Interfaces
25. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
NAC (Network Access Control)
Level III Trauma Center
General/Community Hospital
Level I Trauma Center
26. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Software Update
Medicare
Metadata
Signature Pads
27. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
BAA (Business Associate Agreement)
Billing and Coding Software
Surgical Center
Data Sanitation
28. A programming and query language common to many large scale database systems.
Private Health Record
USB
Liability Waiver
SQL (Structured Query Language)
29. Cisco Systems' proprietary EAP implementation.
Treatment Team
Replay
File Server
LEAP (Lightweight Extensible Authentication Protocol)
30. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Bluejacking
Medication Reconciliation
Final Rule
Urgent Care Facility
31. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Short-stay Facility
Print Server
E/M Codes (Evaluation and Management Codes)
NDC ID (National Drug Code Identification)
32. A backup that backs up all selected files regardless of the state of the archived bit.
Storage Server
Full Backup
Bedside Medication Verification
NAC (Network Access Control)
33. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
Imaging Center
IV (Initialization Vector)
Integrity
LAN (Local Area Network)
34. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec
Float Room
Virus
MOU (Memorandum of Understanding)
Privacy Rule
35. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.
General/Community Hospital
ISP (Internet Service Provider)
PCP Primary Care Physician
Specialized Hospital
36. A method used to remove any sensitive data from a mobile device and permanently delete it.
DHCP Server
Interference
NDC ID (National Drug Code Identification)
Data Wiping
37. A type of network that is established spontaneously through a peer-to-peer wireless connection.
ad hoc
Metadata
Interference
Virtualization
38. A device used to convert paper to electronic format and then associates the file with the proper patient.
Document Scanner
Tracking and Auditing Software
ED (Emergency Department)
Recover Room
39. A widely adopted markup language used in many documents - websites - and web applications.
Level III Trauma Center
Float Room
XML (EXtensible Markup Language)
L2TP (Layer Two Tunneling Protocol)
40. The acuteness - or level of severity - of an illness or disease.
Strong Password
Mail Server
Continuing Care Facility
Acuity
41. A protocol used to connect to and access a remote computer.
Strong Password
RDP (Remote Desktop Protocol)
ONC (Office of the National Coordinator)
CIA Triad(Confidentiality - Integrity - Availability)
42. Secure Shell - A protocol for secure remote logon and secure transfer of data.
Replay
Remote Access
Recover Room
SSH
43. An area where surgical procedures are performer in a sterile environment.
OR (Operating Room)
Social Engineering Attack
PaaS
Public Hospital
44. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Medical Record Controls
IEEE (Institute of Electrical and Electronic Engineers)
Spyware
Database Server
45. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
Switch
Fax Server
Software Update
NIST (National Institute of Standards and Technology)
46. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
802.11n
Applications
ad hoc
Medical Coding
47. A backup that backs up all selected files on a daily basis.
Formulary Checking
Parallel Connection
Daily Backup
Specialized Hospital
48. A network that displays characteristics of more than one of the three standard network models.
SLA
Mixed Mode
Barcode Scanner
Formulary Checking
49. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.
Change Management
SATA Connection
Stat
Interference
50. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Parallel Connection
Differential Backup
MDF (Main Distribution Frame)
Level I Trauma Center