SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A document that defines the authorized uses of PHI and how the information is to be used and managed.
Medical Record Controls
BAA (Business Associate Agreement)
DHCP (Dynamic Host Control Protocol)
PPTP (Point-to-Point Tunneling Protocol)
2. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Application Server
Drug Allergy
DRP (Disaster Recovery Plan)
Availability
3. A TCP/IP utility used to verity the network connectivity of a computer.
Remote Access
E/M Codes (Evaluation and Management Codes)
Ping
Medical Coding
4. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
DNS (Domain Name System)
Medication Reconciliation
FTP (File Transfer Protocol)
SQL (Structured Query Language)
5. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Recover Room
Medicare
6. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
e-Prescribing
Imaging
Bluetooth
Host Computer
7. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
Wireless Security
Applications
Email
Pharming
8. A facility equipped to treat patients suffering traumatic injuries.
Trauma Center
TTL
ONC (Office of the National Coordinator)
War Chalking
9. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
Session Hijacking
Virtualization
EHR (Electronic Health Record)
DDoS (Distributed Denial of Service)
10. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
FireWire Connection
Phishing
Applications
FDA (Food and Drug Administration)
11. A document that lists agreed upon actions between two parties.
Host Computer
MOU (Memorandum of Understanding)
Medical Record Controls
Remote Access
12. A private room where a patient is examined and diagnosed by a medical practitioner.
Trauma Center
Specialized Hospital
Examination Room
IDF (International Distribution Frame)
13. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
USB Connection
Continuing Care Facility
Centralized
The Joint Commission
14. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
PAN (Personal Area Network)
VPN Protocol
Social Engineering Attack
Break Glass Access
15. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.
WEP (Wired Equivalency Protocol)
Break Glass Access
Public Hospital
Phishing
16. A file property that essentially indicates whether the file has been modified since the last back up.
L2TP (Layer Two Tunneling Protocol)
Treatment Team
Archive Flag
ASP (Active Server Pages)
17. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
Packet Sniffing
RFP (Request for Proposal)
EMI (Electromagnetic Interference)
SSH
18. Data that is added to a patient EMR to allow for quick searching and file location.
National Drug Code Directory
ONC (Office of the National Coordinator)
Metadata
MDF (Main Distribution Frame)
19. A device that connects multiple network that use the same protocol.
SNOMED CT
Router
Secure Shredding
Trojan Horse
20. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Twisted Pair
Data Sanitation
HIPAA (Health Insurance Portability and Accountability Act)
Outpatient Treatment
21. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.
HITECH Health Information Technology for Economic and Clinical Health Act)
Print Server
Teaching Hospital
DBA (Database Administrator)
22. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
Port Scanning
PGP
ASP (Active Server Pages)
HTML (Hypertext Markup Language)
23. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
VoIP (Voice over IP)
Secure Chat
Custodian
Man-in-the-middle
24. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.
Level II Trauma Center
Liability
TKIP (Temporary Key Integrity Protocol)
Twisted Pair
25. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
Schedule I Controlled Substance
Float Room
Ping
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
26. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
HIPAA (Health Insurance Portability and Accountability Act)
Virtualization
Worm
API (Application Programming Interface)
27. The acuteness - or level of severity - of an illness or disease.
Acuity
SaaS
Flash
Examination Room
28. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
DNS (Domain Name System)
Protected Health Information
802.11b
Custodian
29. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
Change Management
Internet Modem
Assisted Living Facility
Bluejacking
30. The fundamental security goal of ensuring that electronic data is not altered or tampered with.
API (Application Programming Interface)
SSL (Secure Sockets Layer)
Integrity
lient-Server
31. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
Treatment Team
Private Health Insurers
PHI
NIC (Network Interface Card )
32. A security designation that determines the clearance for an information zone within the EHR system.
Barcode Scanner
OR (Operating Room)
Sensitivity Label
Practice Management Software
33. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
XML (EXtensible Markup Language)
Home Healthcare
adware
WTLS (Wireless Transport Layer Security)
34. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Break Glass Access
Application Server
802.1x
ISP (Internet Service Provider)
35. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
RADIUS
Worm
FTP Server
Home Healthcare
36. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
Mixed Mode
ipconfig
Logical Security
PHR (Personal Health Record)
37. A security protocol that uses certificates for authentication and encryption to protect web communication.
SSL (Secure Sockets Layer)
PaaS
Data Wiping
Controlled substance
38. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
Rogue Access Point
Privacy Rule
Bluetooth
Encryption
39. Secure Shell - A protocol for secure remote logon and secure transfer of data.
Cloud Computing
SSH
Examination Room
Time Server
40. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
PPTP (Point-to-Point Tunneling Protocol)
Packet Sniffing
Software Hotfix
For-Profit Hospital
41. Records that are not for public consumption and require appropriate release before they can be shared.
Private Health Record
CCR (Continuity of Care Record)
VPN (Virtual Private Network)
Drug Allergy
42. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.
UPS
Card/Badge Scanner
NIST (National Institute of Standards and Technology)
Drone
43. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
CCD(Continuity of Care Document)
MDF (Main Distribution Frame)
SNOMED CT
Private Health Insurers
44. A type of network that is established spontaneously through a peer-to-peer wireless connection.
P2P
Medical Interfaces
Remote Access
ad hoc
45. The amount of work a server performs on a regular basis.
Server Load
PHI
FTP (File Transfer Protocol)
National Drug Code Directory
46. Unwanted software that collects personal user data from a system and transmits it to a third party.
Spyware
Custodian
Centralized
Pharming
47. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
Bedside Medication Verification
FireWire Connection
PACS
E/M Codes (Evaluation and Management Codes)
48. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
HITECH Health Information Technology for Economic and Clinical Health Act)
Zombie
Daily Backup
Urgent Care Facility
49. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
Urgent Care Facility
Medicaid
ONC (Office of the National Coordinator)
Practice Management Software
50. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
802.11
Cloud Computing
Port Scanning
AP (Access Points)