SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Document Scanner
Continuing Care Facility
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
NIST (National Institute of Standards and Technology)
2. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Scheduling Software
HITECH Health Information Technology for Economic and Clinical Health Act)
Time Server
Fax Printer
3. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
WHO
Confidentiality
Billing and Coding Software
Bedside Medication Verification
4. Electronic conversion of hard copy documents to digital form.
MDF (Main Distribution Frame)
Mantrap
802.11
Document Imaging
5. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Code Blue
DDoS (Distributed Denial of Service)
Float Room
Treatment Team
6. A formalized statement that defines how security will be implemented within a particular organization.
lient-Server
HHS (U.S. Department of Health and Human Services)
Security Policy
TCP/IP (Transmission Control Protocol/ Internet Protocol)
7. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.
Wireless Security
Logical Access Control
adware
Interference
8. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Continuing Care Facility
Rogue Access Point
Bluesnarfing
EHR (Electronic Health Record)
9. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Secure Shredding
Private Practice
802.1x
Differential Backup
10. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.
CCHIT(Certification Commission for Health Information Technology)
RHIO (Regional Health Information Organization)
ISP (Internet Service Provider)
Serial Connection
11. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
adware
TTL
Public Hospital
Practice Management Software
12. A hospital specialized to treat a specific disease or condition or a specific type of patient.
Logic Bomb
Specialized Hospital
BAA (Business Associate Agreement)
Applications
13. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Eavesdropping
Logical Access Control
Phishing
NAC (Network Access Control)
14. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.
Archive Flag
Schedule I Controlled Substance
Billing and Coding Software
Controlled substance
15. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.
CMS (Centers for Medicare and Medicaid Services)
Nursing Home
Packet Sniffing
Isolation Room
16. A document that defines the authorized uses of PHI and how the information is to be used and managed.
IM (Instant Messaging)
802.11a
BAA (Business Associate Agreement)
Urgent Care Facility
17. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Stat
ARP(Address Resolution Protocol)
Rogue Access Point
Ping
18. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
Router
Isolation Room
DDoS (Distributed Denial of Service)
PACS
19. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Level IV Trauma Center
EAP (Extensible Authentication Protocol)
Pharming
Strong Password
20. Authentication schemes based on individuals' physical characters.
Biometrics
Email
Schedule IV Controlled Substance
Man-in-the-middle
21. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
Drone
802.11
LEAP (Lightweight Extensible Authentication Protocol)
ARP(Address Resolution Protocol)
22. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Data Sanitation
Liability
Liability Waiver
Replay
23. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
Logical Security
Eavesdropping
Preceptor
IDS (Intrusion Detection System)
24. Any adverse reaction to a medication being taken.
Treatment Team
Drug Allergy
ONC (Office of the National Coordinator)
ad hoc
25. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.
The Joint Commission
Level V Trauma Center
Spam
Intermediate Care facility
26. An area where all medical imaging procedures are conducted.
Acuity
WHO
Tracert
Imaging Center
27. A security designation that determines the clearance for an information zone within the EHR system.
FireWire Connection
EAP (Extensible Authentication Protocol)
IM (Instant Messaging)
Sensitivity Label
28. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.
Encryption
OCR (Optical Character Recognition)
War Chalking
Flash
29. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
Software Patch
Public Hospital
Schedule V Controlled Substance
Signature Pads
30. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Practice Management Software
antivirus software
DNS (Domain Name System)
Home Healthcare
31. The role - department - or individual that is formally responsible for a health record.
ED (Emergency Department)
Custodian
Eavesdropping
Schedule I Controlled Substance
32. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
Superbill
Inpatient Treatment
Degaussing
Mantrap
33. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.
ICMP (Internet Control Message Protocol)
Incremental Backup
Covered Entity
Email
34. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
Security Administrator
Fax Server
Change Management
CCR (Continuity of Care Record)
35. The management of performance levels of servers to ensure that critical operations are highly available to resources.
Logical Security
Server Utilization
Data Wiping
Full Backup
36. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
Site Survey
Card/Badge Scanner
Short-stay Facility
Signature Pads
37. Personal computer components that enable users to view the text and graphical data output from a computer.
ARRA (American Recovery and Reinvestment Act
LAN (Local Area Network)
Display Devices
Practice Management Software
38. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
Nursing Home
FDA (Food and Drug Administration)
Wireless Security
Security Rule
39. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.
Human Interface Devices
802.11b
Formulary Checking
Drug Allergy
40. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Drug Allergy
Medical Coding
Break Glass Access
DHCP Server
41. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
Systems Administrator
Surgical Center
HL7
Privacy Rule
42. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
EAP (Extensible Authentication Protocol)
RHIO (Regional Health Information Organization)
Urgent Care Facility
Port Scanning
43. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
802.11i
PHI
Private Practice
Cloud Computing
44. A method that uses the cloud to provide any or all infrastructure needs.
IaaS (Infrastructure as a Service)
Medicaid
Web Server
CCHIT(Certification Commission for Health Information Technology)
45. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
War Driving
Isolation Room
Server Utilization
46. A device that connects multiple network that use the same protocol.
Security Rule
Router
Secure File Transfer Protocol
Recover Room
47. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
802.11n
DBA (Database Administrator)
NIC (Network Interface Card )
LAN (Local Area Network)
48. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Serial Connection
Ping
CCD(Continuity of Care Document)
Level V Trauma Center
49. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
Recover Room
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Proxy Server
Logic Bomb
50. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Strong Password
Software Update
Signature Pads
VPN (Virtual Private Network)