SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.
Level II Trauma Center
Acuity
Schedule IV Controlled Substance
Hoax
2. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.
PACS
Rogue Access Point
Incremental Backup
Display Devices
3. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
RADIUS
Software Update
Schedule IV Controlled Substance
adware
4. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.
VPN Protocol
Imaging
SSH
CMS (Centers for Medicare and Medicaid Services)
5. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Fire Suppression
Security Administrator
HTTPS (Hypertext Transfer Protocol Secure)
Database Server
6. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
HTML (Hypertext Markup Language)
Rogue Access Point
antivirus software
Float Room
7. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
Data Sanitation
ICMP (Internet Control Message Protocol)
For-Profit Hospital
Optical Disk
8. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Practice Management Software
Nursing Home
WAN (Wide Area Network )
AP (Access Points)
9. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.
Biometrics
Public Hospital
Schedule II Controlled Substance
Ping
10. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Eligible Provider
Packet Sniffing
PACS
Web Server
11. Software components that allow users to perform specific tasks and job functions on a computer.
Flash
Interference
Applications
Application Server
12. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
Specialized Hospital
PGP
SLA
WTLS (Wireless Transport Layer Security)
13. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.
Liability
Trojan Horse
Application Server
OCR (Optical Character Recognition)
14. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Barcode Scanner
Optical Disk
HTML (Hypertext Markup Language)
Rogue Access Point
15. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
SNOMED CT
RHIO (Regional Health Information Organization)
Billing and Coding Software
Formulary Checking
16. Any adverse reaction to a medication being taken.
adware
Drug Allergy
Examination Room
DC (Domain Controller)
17. Records that are released for public viewing.
Zombie
Bluetooth
Availability
Public Health Record
18. A server that contains at least one DHCP scope.
EHR (Electronic Health Record)
Fax Printer
BAA (Business Associate Agreement)
DHCP Server
19. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.
Structured Data
HTTPS (Hypertext Transfer Protocol Secure)
PPP (Point-to-Point Protocol)
Virus
20. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Proxy Server
SSTP (Secure Socket Tunneling Protocol)
802.11
Degaussing
21. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.
NDC ID (National Drug Code Identification)
SQL (Structured Query Language)
Remote Access
Phishing
22. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
Barcode Scanner
Coaxial Cable
Billing and Coding Software
Secure Shredding
23. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.
Schedule I Controlled Substance
PHP
Mail Server
Application Server
24. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.
PPTP (Point-to-Point Tunneling Protocol)
TTL
War Driving
ARP(Address Resolution Protocol)
25. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
Mail Server
Home Healthcare
General/Community Hospital
Level II Trauma Center
26. The fundamental security goal of ensuring that electronic data is not altered or tampered with.
HDD (Hard Disk Drive)
Bluesnarfing
802.11a
Integrity
27. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
Rogue Access Point
Schedule II Controlled Substance
NAC (Network Access Control)
Security Administrator
28. The management of performance levels of servers to ensure that critical operations are highly available to resources.
Encryption
Fiber
OCR (Optical Character Recognition)
Server Utilization
29. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
Trojan Horse
Firewall
Covered Entity
Medication Reconciliation
30. World Health Organization - A division of the United Nations that manages the authority of international public health.
Camera
WHO
WEP (Wired Equivalency Protocol)
Fax Printer
31. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
FDA (Food and Drug Administration)
Hardware Attack
Billing Clearinghouse
CMS (Centers for Medicare and Medicaid Services)
32. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
Bedside Medication Verification
RFP (Request for Proposal)
EMI (Electromagnetic Interference)
ED (Emergency Department)
33. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
WHO
BAA (Business Associate Agreement)
mbulatory care
Social Engineering Attack
34. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
Mixed Mode
Certified EHR System
Degaussing
PaaS
35. The U.S. federal program to provide healthcare for certain low-income individual and families.
Trojan Horse
Float Room
Nursing Home
Medicaid
36. A type of network that is established spontaneously through a peer-to-peer wireless connection.
EMI (Electromagnetic Interference)
ad hoc
Session Hijacking
Final Rule
37. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
802.11b
PATA Connection
NDC ID (National Drug Code Identification)
DHCP (Dynamic Host Control Protocol)
38. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
ASP (Active Server Pages)
HITECH Health Information Technology for Economic and Clinical Health Act)
Storage Server
IaaS (Infrastructure as a Service)
39. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
Practice Management Software
MDF (Main Distribution Frame)
LEAP (Lightweight Extensible Authentication Protocol)
Eligible Provider
40. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
VPN Protocol
Barcode Scanner
Meaningful Use
NIST (National Institute of Standards and Technology)
41. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
Camera
DoS (Denial of Service attack)
Protected Health Information
Transitive Access
42. A private network that is configured within a public network such as the Internet.
Schedule V Controlled Substance
VPN (Virtual Private Network)
VPN Protocol
Protected Health Information
43. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Break Glass Access
General/Community Hospital
USB
FTP (File Transfer Protocol)
44. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
IDS (Intrusion Detection System)
ipconfig
Liability Waiver
Fax Printer
45. A method used to remove any sensitive data from a mobile device and permanently delete it.
Protected Health Information
e-Prescribing
Data Wiping
EHR (Electronic Health Record)
46. A hospital specialized to treat a specific disease or condition or a specific type of patient.
Specialized Hospital
LEAP (Lightweight Extensible Authentication Protocol)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Biometrics
47. Personal computer components that enable users to enter data or instructions into a computer.
mbulatory care
Card/Badge Scanner
Barcode Scanner
Input Devices
48. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
DRP (Disaster Recovery Plan)
External Devices
mbulatory care
NAC (Network Access Control)
49. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
Break Glass Access
Stat
Trauma Center
CCD(Continuity of Care Document)
50. A method used to securely remove data from hard drives and other electronic storage devices.
PACS
PCP Primary Care Physician
Secure Shredding
Site Survey