SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
Data Wiping
Logic Bomb
DNS Server
Public Health Record
2. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
lient-Server
Final Rule
Centralized
SATA Connection
3. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
Preceptor
Meaningful Use
Privacy Rule
Human Interface Devices
4. A portable electronic security token that contains biometric user data - or other identification information.
Schedule III Controlled Substance
Keyfob
For-Profit Hospital
Input Devices
5. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec
Nursing Home
War Driving
Virus
DBA (Database Administrator)
6. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.
USB
Time Server
Replay
Social Engineering Attack
7. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Card/Badge Scanner
Confidentiality
Mixed Mode
Secure File Transfer Protocol
8. A protocol used to connect to and access a remote computer.
Eavesdropping
RDP (Remote Desktop Protocol)
Pharming
ASP (Active Server Pages)
9. A security setting that determines the level of access a user or group account has to be particular resource.
Permission
Logical Access Control
EHR (Electronic Health Record)
RFP (Request for Proposal)
10. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Ping
Scope of Practice
Isolation Room
e-Prescribing
11. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
IEEE (Institute of Electrical and Electronic Engineers)
HIPAA (Health Insurance Portability and Accountability Act)
Confidentiality
National Drug Code Directory
12. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.
Strong Password
PHI
Privacy Rule
Barcode Scanner
13. The official record that an organization would release if requested.
Interference
Legal Health Record
802.1x
PHI
14. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Schedule V Controlled Substance
VPN Protocol
NDC ID (National Drug Code Identification)
Packet Sniffing
15. A team of clinicians assigned to work with a specific patient at any given time.
Treatment Team
Daily Backup
Sensitivity Label
Display Devices
16. A type of network that is established spontaneously through a peer-to-peer wireless connection.
802.11a
PPP (Point-to-Point Protocol)
Schedule II Controlled Substance
ad hoc
17. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
API (Application Programming Interface)
Level I Trauma Center
Treatment Team
Schedule IV Controlled Substance
18. A file property that essentially indicates whether the file has been modified since the last back up.
LEAP (Lightweight Extensible Authentication Protocol)
Archive Flag
Break Glass Access
Integrity
19. World Health Organization - A division of the United Nations that manages the authority of international public health.
802.11g
Host Computer
WHO
mbulatory care
20. A personal computer storage device that stores data magnetically on a removable tape.
Tape Drive
NAS (Network Attached Storage)
WAN (Wide Area Network )
Cloud Computing
21. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
Schedule V Controlled Substance
mbulatory care
Eligible Provider
HDD (Hard Disk Drive)
22. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
Hardware Attack
VPN (Virtual Private Network)
Fax Server
Level IV Trauma Center
23. A device used to convert paper to electronic format and then associates the file with the proper patient.
Remote Access
Application Server
ED (Emergency Department)
Document Scanner
24. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
Scope of Practice
SCSI (Small Computer Systems Interface)
Level II Trauma Center
ICMP (Internet Control Message Protocol)
25. An EHR system that had been certified by ONC
Certified EHR System
Differential Backup
Signature Pads
802.11b
26. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
Parallel Connection
Examination Room
Rogue Access Point
TCP/IP (Transmission Control Protocol/ Internet Protocol)
27. Data that fits into a well-defined data model.
Controlled substance
Structured Data
Drug Allergy
adware
28. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
Liability Waiver
FDA (Food and Drug Administration)
HHS (U.S. Department of Health and Human Services)
Site Survey
29. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
P2P
Home Healthcare
IaaS (Infrastructure as a Service)
Medication Reconciliation
30. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Proxy Server
Rogue Access Point
War Driving
Schedule III Controlled Substance
31. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
Privacy Rule
Desktop Support
Virtualization
CCD(Continuity of Care Document)
32. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
SNOMED CT
Virtualization
Proxy Server
Nursing Home
33. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Confidentiality
Bedside Medication Verification
Public Hospital
Medical Record Controls
34. A device that provides network connectivity capabilities for computer systems.
NIC (Network Interface Card )
ROI Department
Site Survey
DHCP Server
35. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
HITECH Health Information Technology for Economic and Clinical Health Act)
SSL (Secure Sockets Layer)
Fax Printer
CCD(Continuity of Care Document)
36. Cisco Systems' proprietary EAP implementation.
Transitive Access
Practice Management Software
LEAP (Lightweight Extensible Authentication Protocol)
Trojan Horse
37. A communication protocol that enables the transfer of files between a user's workstation and a remote host
SCSI (Small Computer Systems Interface)
ED (Emergency Department)
Signature Pads
FTP (File Transfer Protocol)
38. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
ICMP (Internet Control Message Protocol)
FireWire Connection
ARP Poisoning
Logic Bomb
39. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Print Server
WHO
Security Rule
Data Sanitation
40. A server that receives email request from hosts on a network - and redirects them to the intended recipient.
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Specialized Hospital
Mail Server
PHR (Personal Health Record)
41. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
War Chalking
SATA Connection
IDS (Intrusion Detection System)
Display Devices
42. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.
antivirus software
PHI
Transitive Access
Controlled substance
43. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
Schedule III Controlled Substance
Recover Room
Private Health Insurers
PaaS
44. A Specialized file server that is designed and dedicated to support only data storage needs.
Ping
NAS (Network Attached Storage)
Host Computer
Private Health Insurers
45. A method used to remove any sensitive data from a mobile device and permanently delete it.
Data Wiping
ISP (Internet Service Provider)
SaaS
adware
46. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
IDF (International Distribution Frame)
Change Management
USB Connection
PEAP
47. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
Display Devices
Final Rule
USB Connection
802.11b
48. Software protection systems in an organization.
Logical Security
Medication Reconciliation
Phishing
Wireless Security
49. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
Security Administrator
EMI (Electromagnetic Interference)
ipconfig
802.11
50. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
RHIO (Regional Health Information Organization)
Integrity
Assisted Living Facility
802.11n
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests