SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data that fits into a well-defined data model.
PACS
Structured Data
FDA (Food and Drug Administration)
Fire Suppression
2. The management of performance levels of servers to ensure that critical operations are highly available to resources.
Router
Phishing
Server Utilization
Surgical Center
3. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
ED (Emergency Department)
Confidentiality
Worm
Camera
4. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
Schedule I Controlled Substance
Coaxial Cable
EMI (Electromagnetic Interference)
Schedule IV Controlled Substance
5. Any adverse reaction to a medication being taken.
TKIP (Temporary Key Integrity Protocol)
Virtualization
Drug Allergy
Sniffing
6. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
Medical Coding
Mail Server
CIA Triad(Confidentiality - Integrity - Availability)
IV Attack
7. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
Archive Flag
IV Attack
ASP (Active Server Pages)
Web Server
8. A network that connects wireless devices in a very close proximity but not though a wireless access point.
Change Management
Scope of Practice
PAN (Personal Area Network)
Physical Security
9. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
Trauma Center
DHCP (Dynamic Host Control Protocol)
Acuity
IM (Instant Messaging)
10. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Mantrap
Rogue Access Point
WEP (Wired Equivalency Protocol)
Trauma Center
11. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Medicare
Internet Modem
Public Health Record
Secure Shredding
12. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
Hoax
Serial Connection
Stat
Medicare
13. A formalized statement that defines how security will be implemented within a particular organization.
Document Imaging
Mixed Mode
Security Policy
EHR (Electronic Health Record)
14. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
802.11n
Urgent Care Facility
Imaging
Break Glass Access
15. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
PHI
Card/Badge Scanner
Mixed Mode
Level I Trauma Center
16. The fundamental security goal of ensuring that electronic data is not altered or tampered with.
Integrity
Security Administrator
Physical Security
Covered Entity
17. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
Print Server
Medical Coding
Fax Server
Private Health Insurers
18. The official record that an organization would release if requested.
HL7
Legal Health Record
Assisted Living Facility
Continuing Care Facility
19. A security protocol that uses certificates for authentication and encryption to protect web communication.
SSL (Secure Sockets Layer)
Barcode Scanner
Bluesnarfing
Centralized
20. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
FTP Server
Router
Transitive Access
antivirus software
21. Data that is added to a patient EMR to allow for quick searching and file location.
Final Rule
Incremental Backup
Examination Room
Metadata
22. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
Scope of Practice
File Server
PCP Primary Care Physician
RADIUS
23. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
SSH
Teaching Hospital
E/M Codes (Evaluation and Management Codes)
802.11g
24. A backup that backs up all selected files regardless of the state of the archived bit.
Availability
RHIO (Regional Health Information Organization)
Full Backup
DBA (Database Administrator)
25. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
E/M Codes (Evaluation and Management Codes)
Level II Trauma Center
Confidentiality
Phishing
26. A hospital specialized to treat a specific disease or condition or a specific type of patient.
FTP Server
Practice Management Software
Specialized Hospital
Confidentiality
27. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
MOU (Memorandum of Understanding)
Switch
Desktop Support
HITECH Health Information Technology for Economic and Clinical Health Act)
28. A type of network that is established spontaneously through a peer-to-peer wireless connection.
CPT (Current Procedural Terminology)
HL7
ad hoc
DBA (Database Administrator)
29. See Host Computer
Full Backup
RADIUS
Main Frame
Tracert
30. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Solid State Storage
Level II Trauma Center
Full Backup
PEAP
31. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
Worm
Meaningful Use
Port Scanning
HL7
32. The amount of work a server performs on a regular basis.
Custodian
EAP (Extensible Authentication Protocol)
Server Load
ATA (Advanced Technology Attachment)
33. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Email
Degaussing
Medication Reconciliation
PEAP
34. A physical security control system that has a door at each end of a secure chamber.
DRP (Disaster Recovery Plan)
Software Patch
802.11b
Mantrap
35. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
FTP Server
Database Server
Parallel Tracking Software
LAN (Local Area Network)
36. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
IM (Instant Messaging)
Remote Access
EAP (Extensible Authentication Protocol)
CIA Triad(Confidentiality - Integrity - Availability)
37. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
802.1x
Surgical Center
ISP (Internet Service Provider)
RDP (Remote Desktop Protocol)
38. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
Superbill
adware
Formulary Checking
Private Practice
39. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.
Camera
VPN (Virtual Private Network)
SSTP (Secure Socket Tunneling Protocol)
The Joint Commission
40. An Instant messaging service that uses strong encryption to send and receive secure messages.
Schedule II Controlled Substance
Secure Chat
Fiber
Preceptor
41. A server that contains at least one DHCP scope.
Level IV Trauma Center
Secure File Transfer Protocol
DHCP Server
Fiber
42. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Ping
National Drug Code Directory
DNS (Domain Name System)
Spam
43. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
Document Scanner
IV Attack
Billing and Coding Software
TKIP (Temporary Key Integrity Protocol)
44. An area where all medical imaging procedures are conducted.
Imaging Center
Archive Flag
ISP (Internet Service Provider)
Formulary Checking
45. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
Level II Trauma Center
Tracert
DDoS (Distributed Denial of Service)
Logical Access Control
46. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
SLA
IV (Initialization Vector)
LAN (Local Area Network)
Site Survey
47. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.
Social Engineering Attack
Tape Drive
Incremental Backup
SSL (Secure Sockets Layer)
48. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Remote Access
USB
Acuity
CCR (Continuity of Care Record)
49. A protocol that provides VPN functionality.
VPN Protocol
PPTP (Point-to-Point Tunneling Protocol)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
AP (Access Points)
50. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Signature Pads
Serial Connection
Software Update
PHI