SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
Data Wiping
DNS Server
DoS (Denial of Service attack)
IV (Initialization Vector)
2. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
EAP (Extensible Authentication Protocol)
Document Scanner
HL7
Differential Backup
3. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
Firewall
Logic Bomb
Packet Sniffing
Serial Connection
4. A device used to convert paper to electronic format and then associates the file with the proper patient.
Logical Security
Assisted Living Facility
Availability
Document Scanner
5. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.
Drone
Hoax
Code Blue
SSH
6. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Biometrics
Scope of Practice
Internet Modem
Sniffing
7. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
RADIUS
Level V Trauma Center
Logical Access Control
Examination Room
8. A server that provides database services to other computers in a network.
Isolation Room
Database Server
IDS (Intrusion Detection System)
ROI Department
9. A security protocol created by the IEEE task group to replace WEP.
TKIP (Temporary Key Integrity Protocol)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Wireless Security
Level II Trauma Center
10. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'
PEAP
SCSI (Small Computer Systems Interface)
SLA
Incremental Backup
11. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.
IM (Instant Messaging)
UPS
Server Load
Centralized
12. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
PGP
Centralized
CPT (Current Procedural Terminology)
ATA (Advanced Technology Attachment)
13. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
UPS
Metadata
NDC ID (National Drug Code Identification)
PEAP
14. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.
Recover Room
Procedure Room
Intermediate Care facility
Metadata
15. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
IV (Initialization Vector)
HTTPS (Hypertext Transfer Protocol Secure)
Serial Connection
Imaging Center
16. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
lient-Server
RDP (Remote Desktop Protocol)
Private Health Record
SSTP (Secure Socket Tunneling Protocol)
17. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
UPS
Replay
Level II Trauma Center
Eligible Provider
18. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
CMS (Centers for Medicare and Medicaid Services)
Phishing
HHS (U.S. Department of Health and Human Services)
Bluesnarfing
19. An Instant messaging service that uses strong encryption to send and receive secure messages.
NIC (Network Interface Card )
Medicaid
Scope of Practice
Secure Chat
20. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
VPN Protocol
Scheduling Software
Availability
Security Rule
21. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
Final Rule
Trauma Center
National Drug Code Directory
Practice Management Software
22. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.
PACS
The Joint Commission
HL7
WEP (Wired Equivalency Protocol)
23. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.
Public Hospital
ROI Department
HHS (U.S. Department of Health and Human Services)
E/M Codes (Evaluation and Management Codes)
24. A server that is primarily used to share - store - and access files.
SNOMED CT
File Server
SSH
Spam
25. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Parallel Tracking Software
Hospice Care
E/M Codes (Evaluation and Management Codes)
Remote Access
26. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.
API (Application Programming Interface)
Card/Badge Scanner
War Driving
IM (Instant Messaging)
27. The U.S. Agency charged with protecting the health of the population and providing various human services.
USB Connection
HHS (U.S. Department of Health and Human Services)
Print Server
CCD(Continuity of Care Document)
28. Software as a Service - A method that uses the cloud to provide application services to users.
Non-profit Hospital
Signature Pads
Schedule III Controlled Substance
SaaS
29. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.
PACS
Fiber
CCD(Continuity of Care Document)
Medical Interfaces
30. A system that extinguishes fire using special gases.
Fire Suppression
Zombie
API (Application Programming Interface)
ARP(Address Resolution Protocol)
31. A personal computer storage device that uses fixed media and magnetic data storage.
HDD (Hard Disk Drive)
Level IV Trauma Center
Short-stay Facility
API (Application Programming Interface)
32. A family of specification developed by the IEEE for wireless LAN technology.
Coaxial Cable
802.11a
802.11
Logical Security
33. Personal computer components that enable users to view the text and graphical data output from a computer.
SSH
Display Devices
Private Health Record
VPN (Virtual Private Network)
34. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
Privacy Rule
Protected Health Information
SATA Connection
Degaussing
35. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
Metadata
Eavesdropping
Hospice Care
For-Profit Hospital
36. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Degaussing
Drug Allergy
Change Management
Home Healthcare
37. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
NAC (Network Access Control)
Remote Access
Practice Management Software
Medicare
38. Data that is added to a patient EMR to allow for quick searching and file location.
HTML (Hypertext Markup Language)
Metadata
Certified EHR System
Remote Access
39. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
Email
Practice Management Software
UPS
Interference
40. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Scheduling Software
PEAP
Treatment Team
Mantrap
41. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Tracert
Physical Security Controls
e-Prescribing
Long-stay Facility
42. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
Pharming
Human Interface Devices
IV Attack
USB Connection
43. A method used to securely remove data from hard drives and other electronic storage devices.
Secure Shredding
Teaching Hospital
HL7
Serial Connection
44. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Float Room
802.11b
antivirus software
Eavesdropping
45. A hospital specialized to treat a specific disease or condition or a specific type of patient.
WHO
Break Glass Access
Specialized Hospital
Serial Connection
46. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Privacy Rule
Sniffing
RDP (Remote Desktop Protocol)
Inpatient Treatment
47. A private room where a patient is examined and diagnosed by a medical practitioner.
Trauma Center
Bluetooth
Examination Room
mbulatory care
48. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
HIPAA (Health Insurance Portability and Accountability Act)
SNOMED CT
Medical Coding
Formulary Checking
49. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
FireWire Connection
NIST (National Institute of Standards and Technology)
SQL (Structured Query Language)
Interference
50. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
DBA (Database Administrator)
mbulatory care
Logical Access Control
Level V Trauma Center