SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Data Wiping
Fiber
Eavesdropping
E/M Codes (Evaluation and Management Codes)
2. A server that proves the most accurate actual time to all clients in a computer network.
Replay
Time Server
DC (Domain Controller)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
3. The standard language that defines how web pages are formatted and displayed.
Level I Trauma Center
Level V Trauma Center
HTML (Hypertext Markup Language)
802.11
4. Unwanted software that collects personal user data from a system and transmits it to a third party.
Sniffing
Custodian
Spyware
Eavesdropping
5. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.
Cloud Computing
Strong Password
Spyware
ipconfig
6. A device that has multiple network ports and combines multiple physical network segments into a single logical network.
ATA (Advanced Technology Attachment)
Time Server
ONC (Office of the National Coordinator)
Switch
7. A method used to securely remove data from hard drives and other electronic storage devices.
Acuity
Certified EHR System
Secure Shredding
FireWire Connection
8. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Level III Trauma Center
Scope of Practice
War Driving
Teaching Hospital
9. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.
Server Load
Physical Security
SATA Connection
Flash
10. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
Preceptor
Software Hotfix
SNOMED CT
Stat
11. A hospital specialized to treat a specific disease or condition or a specific type of patient.
Degaussing
Specialized Hospital
lient-Server
Scheduling Software
12. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
VPN Protocol
Assisted Living Facility
ipconfig
WEP (Wired Equivalency Protocol)
13. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Spam
Host Computer
Long-stay Facility
Bluetooth
14. A physical security control system that has a door at each end of a secure chamber.
Mantrap
CCR (Continuity of Care Record)
BAA (Business Associate Agreement)
Specialized Hospital
15. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
Port Scanning
Bedside Medication Verification
ED (Emergency Department)
Signature Pads
16. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
Surgical Center
Biometrics
Host Computer
Secure Shredding
17. A team of clinicians assigned to work with a specific patient at any given time.
Private Health Record
ARP Poisoning
Treatment Team
802.1x
18. A TCP/IP utility used to verity the network connectivity of a computer.
PEAP
Ping
Input Devices
VPN Protocol
19. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.
Hospice Care
MOU (Memorandum of Understanding)
Stat
Camera
20. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Level I Trauma Center
Nursing Home
Bluetooth
PHR (Personal Health Record)
21. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
Superbill
SSTP (Secure Socket Tunneling Protocol)
Logical Security
Schedule V Controlled Substance
22. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Liability Waiver
ipconfig
Solid State Storage
Nursing Home
23. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.
SSL (Secure Sockets Layer)
USB
DoS (Denial of Service attack)
Solid State Storage
24. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Remote Access
Site Survey
Optical Disk
Schedule IV Controlled Substance
25. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.
Public Hospital
RFP (Request for Proposal)
Systems Administrator
Interference
26. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
Integrity
Liability
Fiber
Desktop Support
27. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
Social Engineering Attack
DC (Domain Controller)
IDS (Intrusion Detection System)
802.11b
28. An area where surgical procedures are performer in a sterile environment.
OR (Operating Room)
Isolation Room
DRP (Disaster Recovery Plan)
Inpatient Treatment
29. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.
Eavesdropping
Hoax
EMI (Electromagnetic Interference)
Recover Room
30. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
USB
Trojan Horse
Strong Password
FireWire Connection
31. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
ARRA (American Recovery and Reinvestment Act
Schedule III Controlled Substance
Short-stay Facility
Serial Connection
32. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
Display Devices
Router
Change Management
EAP (Extensible Authentication Protocol)
33. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
Scheduling Software
Data Sanitation
802.1x
Sniffing
34. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
CCD(Continuity of Care Document)
Email
Desktop Support
Session Hijacking
35. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
IaaS (Infrastructure as a Service)
Software Update
OCR (Optical Character Recognition)
Imaging
36. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
For-Profit Hospital
DNS (Domain Name System)
Level I Trauma Center
BAA (Business Associate Agreement)
37. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
Encryption
Home Healthcare
VPN Protocol
Wireless Security
38. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
802.11n
DRP (Disaster Recovery Plan)
Display Devices
Assisted Living Facility
39. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.
DHCP Server
mbulatory care
Twisted Pair
RDP (Remote Desktop Protocol)
40. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.
802.11g
Isolation Room
LEAP (Lightweight Extensible Authentication Protocol)
Cloud Computing
41. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
PAN (Personal Area Network)
DBA (Database Administrator)
WTLS (Wireless Transport Layer Security)
Schedule IV Controlled Substance
42. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
WTLS (Wireless Transport Layer Security)
Human Interface Devices
HL7
Zombie
43. A communication protocol that enables the transfer of files between a user's workstation and a remote host
Meaningful Use
FTP (File Transfer Protocol)
Bedside Medication Verification
VoIP (Voice over IP)
44. A file property that essentially indicates whether the file has been modified since the last back up.
Proxy Server
Archive Flag
Bedside Medication Verification
Hospice Care
45. A device that connects multiple network that use the same protocol.
DBA (Database Administrator)
Router
PHI
Privacy Rule
46. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
Camera
Medical Interfaces
ROI Department
Fax Printer
47. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Application Server
ARRA (American Recovery and Reinvestment Act
DRP (Disaster Recovery Plan)
Data Wiping
48. A formalized statement that defines how security will be implemented within a particular organization.
Security Policy
Data Sanitation
Virus
Eavesdropping
49. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
CMS (Centers for Medicare and Medicaid Services)
Home Healthcare
Examination Room
CIA Triad(Confidentiality - Integrity - Availability)
50. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
SSH
P2P
ARP Poisoning
antivirus software
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests