SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Bluejacking
SCSI (Small Computer Systems Interface)
VoIP (Voice over IP)
Private Practice
2. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Strong Password
Applications
Superbill
Covered Entity
3. A method that uses the cloud to provide any or all infrastructure needs.
IaaS (Infrastructure as a Service)
Eavesdropping
SSTP (Secure Socket Tunneling Protocol)
Teaching Hospital
4. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
Superbill
CPOE (Computerized Physician Order Entry)
ATA (Advanced Technology Attachment)
PHR (Personal Health Record)
5. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
Privacy Rule
802.11n
Desktop Support
Drone
6. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
MOU (Memorandum of Understanding)
Bluesnarfing
External Devices
Private Practice
7. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
802.11a
EMI (Electromagnetic Interference)
Firewall
mbulatory care
8. A server that is primarily used to share - store - and access files.
Medical Record Controls
File Server
IEEE (Institute of Electrical and Electronic Engineers)
WHO
9. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
ROI Department
Level III Trauma Center
Privacy Rule
Examination Room
10. Records that are released for public viewing.
Input Devices
Database Server
802.11i
Public Health Record
11. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
Bluetooth
SSTP (Secure Socket Tunneling Protocol)
USB Connection
Practice Management Software
12. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
Covered Entity
Procedure Room
IV Attack
Rogue Access Point
13. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
PPTP (Point-to-Point Tunneling Protocol)
Mantrap
PaaS
MOU (Memorandum of Understanding)
14. A portable electronic security token that contains biometric user data - or other identification information.
Keyfob
Storage Server
Float Room
Secure Chat
15. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Strong Password
Systems Administrator
EMI (Electromagnetic Interference)
Secure Shredding
16. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Home Healthcare
API (Application Programming Interface)
Degaussing
Mantrap
17. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
NAS (Network Attached Storage)
ASP (Active Server Pages)
Hoax
PEAP
18. A method used to securely remove data from hard drives and other electronic storage devices.
Formulary Checking
Worm
Secure Shredding
Firewall
19. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
WTLS (Wireless Transport Layer Security)
Imaging
IM (Instant Messaging)
Strong Password
20. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
LEAP (Lightweight Extensible Authentication Protocol)
HITECH Health Information Technology for Economic and Clinical Health Act)
Short-stay Facility
Bedside Medication Verification
21. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
CCD(Continuity of Care Document)
CPT (Current Procedural Terminology)
Server Load
ROI Department
22. A security protocol that uses certificates for authentication and encryption to protect web communication.
PGP
SSL (Secure Sockets Layer)
FDA (Food and Drug Administration)
Software Hotfix
23. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
USB Connection
Daily Backup
Procedure Room
antivirus software
24. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
Treatment Team
PAN (Personal Area Network)
Strong Password
802.11g
25. An implementation in which voice signals are transmitter over IP networks.
Private Health Insurers
External Devices
Virtualization
VoIP (Voice over IP)
26. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Data Sanitation
Level III Trauma Center
Formulary Checking
Stat
27. A device that distributes and manages print jobs sent from client computers.
Drone
Home Healthcare
Medical Coding
Print Server
28. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.
ATA (Advanced Technology Attachment)
Meaningful Use
Schedule II Controlled Substance
AP (Access Points)
29. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Schedule IV Controlled Substance
EMI (Electromagnetic Interference)
P2P
ISP (Internet Service Provider)
30. Any medical treatment or services provided on an outpatient basis.
Fax Server
mbulatory care
National Drug Code Directory
HDD (Hard Disk Drive)
31. Unwanted software that collects personal user data from a system and transmits it to a third party.
Phishing
Software Update
Spyware
API (Application Programming Interface)
32. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
802.11i
e-Prescribing
WTLS (Wireless Transport Layer Security)
Final Rule
33. A standard that adds AES security to the 802.11 standard
ARP Poisoning
IM (Instant Messaging)
802.11i
PPP (Point-to-Point Protocol)
34. A network that displays characteristics of more than one of the three standard network models.
Replay
Integrity
802.11
Mixed Mode
35. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
CCR (Continuity of Care Record)
Social Engineering Attack
Differential Backup
UPS
36. Authentication schemes based on individuals' physical characters.
Switch
PHI
CCR (Continuity of Care Record)
Biometrics
37. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Degaussing
Privacy Rule
Practice Management Software
Spam
38. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
802.11g
Bluetooth
War Chalking
Session Hijacking
39. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
Level I Trauma Center
ED (Emergency Department)
WAN (Wide Area Network )
VoIP (Voice over IP)
40. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
Print Server
ipconfig
DHCP (Dynamic Host Control Protocol)
ad hoc
41. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
FDA (Food and Drug Administration)
802.11g
Medical Coding
EMI (Electromagnetic Interference)
42. A private network that is configured within a public network such as the Internet.
VPN (Virtual Private Network)
PACS
Man-in-the-middle
Teaching Hospital
43. A residential facility for patients who need constant medical or nursing care and supervision.
Home Healthcare
Nursing Home
HL7
HIPAA (Health Insurance Portability and Accountability Act)
44. A server that proves the most accurate actual time to all clients in a computer network.
Security Administrator
Time Server
DC (Domain Controller)
MOU (Memorandum of Understanding)
45. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
Internet Modem
ONC (Office of the National Coordinator)
LEAP (Lightweight Extensible Authentication Protocol)
Outpatient Treatment
46. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
VoIP (Voice over IP)
BAA (Business Associate Agreement)
EHR (Electronic Health Record)
Centralized
47. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
ATA (Advanced Technology Attachment)
IV (Initialization Vector)
Parallel Connection
Time Server
48. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Server Utilization
Medicaid
Availability
Schedule I Controlled Substance
49. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Application Server
Coaxial Cable
WAN (Wide Area Network )
Security Rule
50. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
DNS (Domain Name System)
ISP (Internet Service Provider)
Systems Administrator
Data Sanitation