SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Application code that enables various applications to communicate with each other.
API (Application Programming Interface)
Practice Management Software
TCP/IP (Transmission Control Protocol/ Internet Protocol)
ad hoc
2. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Applications
IDF (International Distribution Frame)
Proxy Server
Private Health Record
3. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Imaging Center
Database Server
Packet Sniffing
Fax Server
4. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Pharming
For-Profit Hospital
Full Backup
HTTPS (Hypertext Transfer Protocol Secure)
5. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Encryption
PEAP
Protected Health Information
Optical Disk
6. The role - department - or individual that is formally responsible for a health record.
Assisted Living Facility
Custodian
USB
Bluesnarfing
7. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Level II Trauma Center
Public Health Record
Remote Access
Network Administrator
8. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
antivirus software
Replay
Server Load
National Drug Code Directory
9. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Examination Room
Port Scanning
Logical Security
PATA Connection
10. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
Host Computer
Display Devices
DNS Server
CCHIT(Certification Commission for Health Information Technology)
11. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
802.11
Server Utilization
Software Hotfix
ad hoc
12. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
IV Attack
HL7
DoS (Denial of Service attack)
Protected Health Information
13. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
National Drug Code Directory
L2TP (Layer Two Tunneling Protocol)
IaaS (Infrastructure as a Service)
Rogue Access Point
14. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
Biometrics
VPN (Virtual Private Network)
Optical Disk
Recover Room
15. A method used to remove any sensitive data from a mobile device and permanently delete it.
VPN Protocol
Data Wiping
RDP (Remote Desktop Protocol)
BAA (Business Associate Agreement)
16. A communication protocol that enables the transfer of files between a user's workstation and a remote host
EHR (Electronic Health Record)
HDD (Hard Disk Drive)
Parallel Connection
FTP (File Transfer Protocol)
17. A backup that backs up all selected files on a daily basis.
Schedule I Controlled Substance
PPTP (Point-to-Point Tunneling Protocol)
Daily Backup
PAN (Personal Area Network)
18. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
Schedule II Controlled Substance
Confidentiality
Software Patch
PAN (Personal Area Network)
19. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.
UPS
Integrity
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Private Health Insurers
20. An EHR system that had been certified by ONC
Certified EHR System
Coaxial Cable
PHR (Personal Health Record)
Inpatient Treatment
21. The U.S. federal program to provide healthcare for certain low-income individual and families.
PPTP (Point-to-Point Tunneling Protocol)
ICMP (Internet Control Message Protocol)
Medicaid
Private Practice
22. A backup that backs up all selected files regardless of the state of the archived bit.
SaaS
SCSI (Small Computer Systems Interface)
Full Backup
DNS (Domain Name System)
23. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
Parallel Tracking Software
OCR (Optical Character Recognition)
ROI Department
Card/Badge Scanner
24. A device that connects multiple network that use the same protocol.
Legal Health Record
Liability Waiver
Hoax
Router
25. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.
Biometrics
Physical Security
Medicaid
Confidentiality
26. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
Parallel Tracking Software
Non-profit Hospital
DC (Domain Controller)
Serial Connection
27. An invitation for vendors to submit a plan and bid for the delivery of a product or service.
RFP (Request for Proposal)
Virus
SCSI (Small Computer Systems Interface)
Tape Drive
28. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.
Port Scanning
FireWire Connection
CCHIT(Certification Commission for Health Information Technology)
Long-stay Facility
29. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Coaxial Cable
ISP (Internet Service Provider)
Security Administrator
Level III Trauma Center
30. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Parallel Tracking Software
Security Policy
Logical Access Control
Schedule IV Controlled Substance
31. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
Main Frame
Surgical Center
ICMP (Internet Control Message Protocol)
PACS
32. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
DBA (Database Administrator)
Break Glass Access
Integrity
Archive Flag
33. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.
OCR (Optical Character Recognition)
EHR (Electronic Health Record)
Archive Flag
The Joint Commission
34. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
ATA (Advanced Technology Attachment)
Private Practice
Firewall
Imaging
35. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
Virtualization
Permission
Security Rule
Tracking and Auditing Software
36. A physical security control system that has a door at each end of a secure chamber.
Mantrap
SATA Connection
Public Hospital
USB
37. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
ARRA (American Recovery and Reinvestment Act
Float Room
Hoax
lient-Server
38. A VPN protocol that is an extension of the PPP remote access protocol.
Non-profit Hospital
Level II Trauma Center
PPTP (Point-to-Point Tunneling Protocol)
Tracking and Auditing Software
39. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Secure File Transfer Protocol
Schedule III Controlled Substance
IEEE (Institute of Electrical and Electronic Engineers)
Worm
40. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
ad hoc
Main Frame
Covered Entity
Medical Coding
41. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
Man-in-the-middle
Network Administrator
Physical Security Controls
PPTP (Point-to-Point Tunneling Protocol)
42. A type of network that is established spontaneously through a peer-to-peer wireless connection.
ad hoc
EHR (Electronic Health Record)
MDF (Main Distribution Frame)
VoIP (Voice over IP)
43. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.
ARRA (American Recovery and Reinvestment Act
Flash
NIST (National Institute of Standards and Technology)
USB
44. The fundamental security goal of ensuring that electronic data is not altered or tampered with.
Integrity
Data Wiping
Fax Printer
Hardware Attack
45. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
PAN (Personal Area Network)
Procedure Room
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Bedside Medication Verification
46. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
Superbill
NIST (National Institute of Standards and Technology)
Break Glass Access
AP (Access Points)
47. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
MOU (Memorandum of Understanding)
PHR (Personal Health Record)
Private Practice
Drone
48. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
DoS (Denial of Service attack)
802.11n
Fax Server
ICMP (Internet Control Message Protocol)
49. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
RADIUS
AP (Access Points)
ROI Department
Coaxial Cable
50. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
Surgical Center
802.11
Treatment Team
SaaS