SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
Internet Modem
Billing and Coding Software
Level IV Trauma Center
ARRA (American Recovery and Reinvestment Act
2. A team of clinicians assigned to work with a specific patient at any given time.
WTLS (Wireless Transport Layer Security)
Treatment Team
IaaS (Infrastructure as a Service)
adware
3. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
FDA (Food and Drug Administration)
Logical Access Control
Recover Room
Code Blue
4. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are
Software Hotfix
Human Interface Devices
Level III Trauma Center
Bluetooth
5. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.
Ping
Interference
Zombie
Controlled substance
6. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
The Joint Commission
CCR (Continuity of Care Record)
National Drug Code Directory
Float Room
7. The management of performance levels of servers to ensure that critical operations are highly available to resources.
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Server Utilization
Public Health Record
Worm
8. A server that provides database services to other computers in a network.
SNOMED CT
Database Server
ARP(Address Resolution Protocol)
EHR (Electronic Health Record)
9. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
IEEE (Institute of Electrical and Electronic Engineers)
PHI
Solid State Storage
DRP (Disaster Recovery Plan)
10. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
Code Blue
PATA Connection
Fax Server
Sensitivity Label
11. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.
Inpatient Treatment
ICMP (Internet Control Message Protocol)
FDA (Food and Drug Administration)
Physical Security
12. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Optical Disk
VPN (Virtual Private Network)
Full Backup
Spam
13. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
Long-stay Facility
WTLS (Wireless Transport Layer Security)
Trojan Horse
Spam
14. A server that proves the most accurate actual time to all clients in a computer network.
ROI Department
Time Server
Long-stay Facility
Meaningful Use
15. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Human Interface Devices
Replay
TTL
NIST (National Institute of Standards and Technology)
16. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
Card/Badge Scanner
Wireless Security
IV Attack
Web Server
17. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
Level II Trauma Center
USB
Protected Health Information
DDoS (Distributed Denial of Service)
18. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
For-Profit Hospital
Float Room
RFP (Request for Proposal)
ARP Poisoning
19. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
Secure File Transfer Protocol
Outpatient Treatment
WEP (Wired Equivalency Protocol)
NAC (Network Access Control)
20. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
Home Healthcare
Barcode Scanner
PCP Primary Care Physician
HIPAA (Health Insurance Portability and Accountability Act)
21. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
Procedure Room
Software Update
Proxy Server
Incremental Backup
22. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
WAN (Wide Area Network )
Parallel Tracking Software
SNOMED CT
Level IV Trauma Center
23. Electronic conversion of hard copy documents to digital form.
Serial Connection
Document Imaging
Formulary Checking
Secure Shredding
24. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
Applications
SLA
Schedule V Controlled Substance
IaaS (Infrastructure as a Service)
25. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.
CCD(Continuity of Care Document)
Fire Suppression
IaaS (Infrastructure as a Service)
Intermediate Care facility
26. A company that provides access to the Internet.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
IDS (Intrusion Detection System)
IV (Initialization Vector)
ISP (Internet Service Provider)
27. The U.S. federal program to provide healthcare for certain low-income individual and families.
USB Connection
Encryption
Flash
Medicaid
28. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Strong Password
Logic Bomb
Isolation Room
29. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
NDC ID (National Drug Code Identification)
Internet Modem
PHR (Personal Health Record)
SaaS
30. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
Sensitivity Label
Imaging
Mixed Mode
OR (Operating Room)
31. A communication protocol that enables the transfer of files between a user's workstation and a remote host
FTP (File Transfer Protocol)
Differential Backup
Phishing
Trauma Center
32. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Degaussing
Internet Modem
mbulatory care
L2TP (Layer Two Tunneling Protocol)
33. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
DHCP Server
Level V Trauma Center
HITECH Health Information Technology for Economic and Clinical Health Act)
Home Healthcare
34. Data that fits into a well-defined data model.
SaaS
Structured Data
Bluesnarfing
HTTPS (Hypertext Transfer Protocol Secure)
35. Cisco Systems' proprietary EAP implementation.
Private Health Insurers
Logic Bomb
LEAP (Lightweight Extensible Authentication Protocol)
TTL
36. Software components that allow users to perform specific tasks and job functions on a computer.
Applications
DDoS (Distributed Denial of Service)
802.11i
Continuing Care Facility
37. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Remote Access
Fiber
Differential Backup
Secure Chat
38. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.
PPTP (Point-to-Point Tunneling Protocol)
Security Rule
PEAP
Camera
39. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
Teaching Hospital
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
WHO
Fire Suppression
40. A Protocol used to automatically assign IP addressing information to IP network computers.
DHCP (Dynamic Host Control Protocol)
Spam
Sniffing
Bedside Medication Verification
41. A private room where a patient is examined and diagnosed by a medical practitioner.
PATA Connection
Phishing
Examination Room
802.11
42. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
Full Backup
Print Server
Protected Health Information
RADIUS
43. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
PEAP
Physical Security Controls
PHI
Remote Access
44. A VPN protocol that is an extension of the PPP remote access protocol.
Continuing Care Facility
PPTP (Point-to-Point Tunneling Protocol)
Switch
Sniffing
45. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Archive Flag
Replay
PPTP (Point-to-Point Tunneling Protocol)
Packet Sniffing
46. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.
DNS (Domain Name System)
HTML (Hypertext Markup Language)
Ping
CMS (Centers for Medicare and Medicaid Services)
47. A device that connects multiple network that use the same protocol.
Router
Liability Waiver
IaaS (Infrastructure as a Service)
TTL
48. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Level IV Trauma Center
Router
Bluejacking
Optical Disk
49. An area where all medical imaging procedures are conducted.
SSH
Imaging Center
Internet Modem
SNOMED CT
50. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Router
WAN (Wide Area Network )
Sniffing
Security Administrator
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests