SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.
Liability
IDS (Intrusion Detection System)
PaaS
Packet Sniffing
2. A method used to remove any sensitive data from a mobile device and permanently delete it.
Public Hospital
War Driving
Data Wiping
EHR (Electronic Health Record)
3. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Serial Connection
VPN Protocol
Continuing Care Facility
Cloud Computing
4. A portable electronic security token that contains biometric user data - or other identification information.
OR (Operating Room)
Stat
PACS
Keyfob
5. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
802.11n
LAN (Local Area Network)
Mail Server
CCR (Continuity of Care Record)
6. A server that displays web pages to clients.
FDA (Food and Drug Administration)
PEAP
Mantrap
Web Server
7. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.
The Joint Commission
Time Server
Level V Trauma Center
Tape Drive
8. A device used for patient billing to capture an electronic signature.
Document Scanner
Signature Pads
RADIUS
Private Practice
9. Data that is added to a patient EMR to allow for quick searching and file location.
Site Survey
Private Health Insurers
Physical Security Controls
Metadata
10. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Protected Health Information
Strong Password
Secure Chat
Meaningful Use
11. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Proxy Server
BAA (Business Associate Agreement)
DC (Domain Controller)
Hoax
12. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP Poisoning
IEEE (Institute of Electrical and Electronic Engineers)
Protected Health Information
Scope of Practice
13. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
Network Administrator
Logical Security
IDS (Intrusion Detection System)
XML (EXtensible Markup Language)
14. A backup that backs up all selected files on a daily basis.
Daily Backup
Software Update
WHO
National Drug Code Directory
15. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
PATA Connection
Strong Password
Level I Trauma Center
HIPAA (Health Insurance Portability and Accountability Act)
16. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
Transitive Access
PPP (Point-to-Point Protocol)
Social Engineering Attack
Level II Trauma Center
17. A server that is primarily used to share - store - and access files.
File Server
Fire Suppression
Serial Connection
IDS (Intrusion Detection System)
18. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.
BAA (Business Associate Agreement)
IM (Instant Messaging)
Billing Clearinghouse
HL7
19. A utility used to determine the route data takes to get to a particular destination.
Tracert
EHR (Electronic Health Record)
Twisted Pair
Fax Server
20. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Schedule III Controlled Substance
Internet Modem
Procedure Room
Imaging Center
21. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Worm
Replay
SCSI (Small Computer Systems Interface)
Time Server
22. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
RADIUS
RHIO (Regional Health Information Organization)
RDP (Remote Desktop Protocol)
Mail Server
23. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Sniffing
Treatment Team
FDA (Food and Drug Administration)
DBA (Database Administrator)
24. A widely adopted markup language used in many documents - websites - and web applications.
CPOE (Computerized Physician Order Entry)
The Joint Commission
Encryption
XML (EXtensible Markup Language)
25. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
PaaS
Scope of Practice
CCHIT(Certification Commission for Health Information Technology)
External Devices
26. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Long-stay Facility
Level IV Trauma Center
Main Frame
Cloud Computing
27. A device used to convert paper to electronic format and then associates the file with the proper patient.
UPS
Full Backup
Document Scanner
Level I Trauma Center
28. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
Firewall
XML (EXtensible Markup Language)
802.11b
MDF (Main Distribution Frame)
29. An EHR system that had been certified by ONC
ONC (Office of the National Coordinator)
Medicare
Structured Data
Certified EHR System
30. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
WAN (Wide Area Network )
PHI
EAP (Extensible Authentication Protocol)
Time Server
31. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Scope of Practice
Social Engineering Attack
Privacy Rule
IDS (Intrusion Detection System)
32. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.
HIPAA (Health Insurance Portability and Accountability Act)
Incremental Backup
PPP (Point-to-Point Protocol)
Secure Chat
33. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
Meaningful Use
Level II Trauma Center
Eligible Provider
NIST (National Institute of Standards and Technology)
34. A security protocol created by the IEEE task group to replace WEP.
TKIP (Temporary Key Integrity Protocol)
Treatment Team
IV Attack
Man-in-the-middle
35. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Software Hotfix
CPOE (Computerized Physician Order Entry)
Bluesnarfing
Pharming
36. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Daily Backup
Billing Clearinghouse
DNS (Domain Name System)
Optical Disk
37. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
DNS (Domain Name System)
Medication Reconciliation
Logic Bomb
CIA Triad(Confidentiality - Integrity - Availability)
38. Electronic messages sent between users or groups.
Acuity
Archive Flag
Email
Superbill
39. An AES cipher-based encryption protocol used in WPA2.
Site Survey
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Virus
Eligible Provider
40. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
ASP (Active Server Pages)
File Server
Degaussing
antivirus software
41. The U.S. Agency charged with protecting the health of the population and providing various human services.
ARP Poisoning
Outpatient Treatment
HHS (U.S. Department of Health and Human Services)
Document Scanner
42. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
P2P
Camera
Drug Allergy
e-Prescribing
43. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
Interference
NAC (Network Access Control)
Schedule II Controlled Substance
Rogue Access Point
44. Cisco Systems' proprietary EAP implementation.
Tracking and Auditing Software
HTML (Hypertext Markup Language)
LEAP (Lightweight Extensible Authentication Protocol)
Full Backup
45. A formalized statement that defines how security will be implemented within a particular organization.
Level I Trauma Center
Cloud Computing
Security Policy
Document Scanner
46. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
RHIO (Regional Health Information Organization)
Float Room
Logic Bomb
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
47. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
Data Sanitation
Billing and Coding Software
Certified EHR System
Email
48. A company that provides access to the Internet.
Drone
ISP (Internet Service Provider)
Solid State Storage
Serial Connection
49. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.
WTLS (Wireless Transport Layer Security)
Preceptor
Availability
ISP (Internet Service Provider)
50. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
PACS
Wireless Security
TTL
Application Server