SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An area where surgical procedures are performer in a sterile environment.
OR (Operating Room)
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Confidentiality
802.11a
2. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Trauma Center
Continuing Care Facility
Teaching Hospital
Email
3. Mechanism that are put in place to limit access to electronic health information.
Medical Record Controls
CMS (Centers for Medicare and Medicaid Services)
Parallel Tracking Software
Superbill
4. Records that are not for public consumption and require appropriate release before they can be shared.
antivirus software
CPOE (Computerized Physician Order Entry)
Private Health Record
Site Survey
5. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
Level V Trauma Center
DC (Domain Controller)
Document Imaging
Bluetooth
6. A Specialized file server that is designed and dedicated to support only data storage needs.
Social Engineering Attack
EMI (Electromagnetic Interference)
NAS (Network Attached Storage)
RDP (Remote Desktop Protocol)
7. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
ASP (Active Server Pages)
PCP Primary Care Physician
Medical Interfaces
Encryption
8. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.
Hardware Attack
Bluetooth
CMS (Centers for Medicare and Medicaid Services)
DHCP Server
9. An AES cipher-based encryption protocol used in WPA2.
HIPAA (Health Insurance Portability and Accountability Act)
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Long-stay Facility
Short-stay Facility
10. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Bluesnarfing
Virtualization
Daily Backup
PAN (Personal Area Network)
11. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Switch
DHCP (Dynamic Host Control Protocol)
Encryption
Solid State Storage
12. The acuteness - or level of severity - of an illness or disease.
Treatment Team
PACS
Acuity
Document Scanner
13. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
Practice Management Software
Document Scanner
Bluejacking
Virtualization
14. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
HITECH Health Information Technology for Economic and Clinical Health Act)
PaaS
Parallel Tracking Software
ARRA (American Recovery and Reinvestment Act
15. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
ED (Emergency Department)
Float Room
802.11
16. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
Display Devices
IM (Instant Messaging)
Home Healthcare
Cloud Computing
17. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
Custodian
Transitive Access
The Joint Commission
Medicaid
18. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
Trojan Horse
Procedure Room
Stat
19. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.
HHS (U.S. Department of Health and Human Services)
Controlled substance
Mixed Mode
Incremental Backup
20. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
Medical Coding
ad hoc
Replay
Input Devices
21. A method used to securely remove data from hard drives and other electronic storage devices.
Intermediate Care facility
Display Devices
SaaS
Secure Shredding
22. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
Sniffing
Session Hijacking
Outpatient Treatment
Specialized Hospital
23. Software protection systems in an organization.
Superbill
FTP Server
802.11b
Logical Security
24. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Desktop Support
ONC (Office of the National Coordinator)
Solid State Storage
Confidentiality
25. An IT role that is responsible for the network infrastructure and components withing an organization.
Input Devices
Acuity
API (Application Programming Interface)
Network Administrator
26. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
Session Hijacking
USB
Custodian
Bluesnarfing
27. A server that proves the most accurate actual time to all clients in a computer network.
RADIUS
Time Server
EMI (Electromagnetic Interference)
CCD(Continuity of Care Document)
28. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
Social Engineering Attack
Software Patch
PCP Primary Care Physician
Medicare
29. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
adware
Logical Security
WHO
CCR (Continuity of Care Record)
30. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.
DDoS (Distributed Denial of Service)
PHI
OR (Operating Room)
Recover Room
31. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
Scheduling Software
Site Survey
Level I Trauma Center
DRP (Disaster Recovery Plan)
32. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
802.11g
Keyfob
Fax Printer
CPOE (Computerized Physician Order Entry)
33. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
Teaching Hospital
ICMP (Internet Control Message Protocol)
Spam
IaaS (Infrastructure as a Service)
34. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
CPOE (Computerized Physician Order Entry)
Intermediate Care facility
Social Engineering Attack
Internet Modem
35. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
Logic Bomb
SQL (Structured Query Language)
Nursing Home
TTL
36. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
RFP (Request for Proposal)
External Devices
Parallel Tracking Software
ARP(Address Resolution Protocol)
37. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
PPTP (Point-to-Point Tunneling Protocol)
Parallel Tracking Software
Schedule III Controlled Substance
SNOMED CT
38. A residential facility for patients who need constant medical or nursing care and supervision.
Nursing Home
War Driving
Incremental Backup
DHCP (Dynamic Host Control Protocol)
39. A backup that backs up all selected files on a daily basis.
UPS
Final Rule
Daily Backup
IaaS (Infrastructure as a Service)
40. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Sniffing
ROI Department
Availability
SCSI (Small Computer Systems Interface)
41. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
Software Update
WAN (Wide Area Network )
Level II Trauma Center
USB Connection
42. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
Custodian
HTML (Hypertext Markup Language)
Practice Management Software
Protected Health Information
43. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
ICMP (Internet Control Message Protocol)
Security Administrator
Phishing
Barcode Scanner
44. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
Human Interface Devices
USB
SNOMED CT
Schedule V Controlled Substance
45. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
Medical Interfaces
Billing and Coding Software
FTP (File Transfer Protocol)
Public Health Record
46. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
Availability
TCP/IP (Transmission Control Protocol/ Internet Protocol)
External Devices
NIC (Network Interface Card )
47. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Scheduling Software
OCR (Optical Character Recognition)
Eavesdropping
Port Scanning
48. A security protocol that uses certificates for authentication and encryption to protect web communication.
WHO
Treatment Team
ICMP (Internet Control Message Protocol)
SSL (Secure Sockets Layer)
49. A LAN implementation in which nodes use a wireless network card to connect to other stations.
Worm
HTTPS (Hypertext Transfer Protocol Secure)
LAN (Local Area Network)
Long-stay Facility
50. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
EHR (Electronic Health Record)
Rogue Access Point
SSL (Secure Sockets Layer)
Zombie