SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
PATA Connection
Practice Management Software
Software Hotfix
NDC ID (National Drug Code Identification)
2. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
Tracking and Auditing Software
DRP (Disaster Recovery Plan)
Fax Server
Public Health Record
3. Software components that allow users to perform specific tasks and job functions on a computer.
Transitive Access
antivirus software
Secure Shredding
Applications
4. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Packet Sniffing
Software Hotfix
File Server
Phishing
5. A VPN protocol that is an extension of the PPP remote access protocol.
Secure Chat
VPN Protocol
FTP (File Transfer Protocol)
PPTP (Point-to-Point Tunneling Protocol)
6. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
Replay
CCD(Continuity of Care Document)
CIA Triad(Confidentiality - Integrity - Availability)
ED (Emergency Department)
7. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
802.11g
Liability Waiver
Twisted Pair
Keyfob
8. A security designation that determines the clearance for an information zone within the EHR system.
Sensitivity Label
TTL
NDC ID (National Drug Code Identification)
Remote Access
9. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.
IM (Instant Messaging)
Billing Clearinghouse
ATA (Advanced Technology Attachment)
Virtualization
10. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
antivirus software
Internet Modem
Degaussing
Intermediate Care facility
11. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
lient-Server
Bluesnarfing
Phishing
CMS (Centers for Medicare and Medicaid Services)
12. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Transitive Access
Logical Security
Encryption
Keyfob
13. A system that extinguishes fire using special gases.
Coaxial Cable
Fire Suppression
P2P
Treatment Team
14. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
DRP (Disaster Recovery Plan)
Sniffing
Parallel Connection
Mail Server
15. The U.S. federal program to provide healthcare for certain low-income individual and families.
Medicaid
TTL
IDS (Intrusion Detection System)
802.11g
16. A device that provides network connectivity capabilities for computer systems.
Private Health Insurers
Billing and Coding Software
NIC (Network Interface Card )
PACS
17. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
FireWire Connection
WTLS (Wireless Transport Layer Security)
Virtualization
WHO
18. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.
Data Wiping
HITECH Health Information Technology for Economic and Clinical Health Act)
802.11i
Physical Security
19. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.
Intermediate Care facility
IV Attack
Tracking and Auditing Software
Software Update
20. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
ATA (Advanced Technology Attachment)
Card/Badge Scanner
FTP Server
Float Room
21. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
IEEE (Institute of Electrical and Electronic Engineers)
Transitive Access
Host Computer
VPN Protocol
22. Software protection systems in an organization.
Logical Security
Treatment Team
Bedside Medication Verification
RDP (Remote Desktop Protocol)
23. A method used to remove any sensitive data from a mobile device and permanently delete it.
FDA (Food and Drug Administration)
MOU (Memorandum of Understanding)
Data Wiping
Physical Security
24. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
EAP (Extensible Authentication Protocol)
TKIP (Temporary Key Integrity Protocol)
For-Profit Hospital
Solid State Storage
25. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.
antivirus software
VPN Protocol
Router
Zombie
26. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
Bedside Medication Verification
Human Interface Devices
SaaS
Schedule V Controlled Substance
27. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
Fax Printer
Meaningful Use
Home Healthcare
Preceptor
28. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
Recover Room
RADIUS
Logical Access Control
TKIP (Temporary Key Integrity Protocol)
29. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
External Devices
Trojan Horse
For-Profit Hospital
Hospice Care
30. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
Degaussing
Isolation Room
Practice Management Software
Host Computer
31. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Router
PATA Connection
EAP (Extensible Authentication Protocol)
Confidentiality
32. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
IDF (International Distribution Frame)
lient-Server
Phishing
Long-stay Facility
33. The ability to connect to systems and services from an offsite or remote location using a remote access method.
USB
Level V Trauma Center
The Joint Commission
Remote Access
34. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Schedule V Controlled Substance
Worm
Treatment Team
PATA Connection
35. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.
MOU (Memorandum of Understanding)
PHI
Email
Trauma Center
36. The management of performance levels of servers to ensure that critical operations are highly available to resources.
NIST (National Institute of Standards and Technology)
E/M Codes (Evaluation and Management Codes)
Tracking and Auditing Software
Server Utilization
37. The official record that an organization would release if requested.
Secure File Transfer Protocol
Centralized
SQL (Structured Query Language)
Legal Health Record
38. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
Drone
Tracking and Auditing Software
HL7
SATA Connection
39. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.
Private Practice
Eavesdropping
Cloud Computing
Schedule IV Controlled Substance
40. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
Preceptor
DNS (Domain Name System)
RADIUS
HTTPS (Hypertext Transfer Protocol Secure)
41. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
PHR (Personal Health Record)
Secure Shredding
For-Profit Hospital
DNS Server
42. A server that is primarily used to share - store - and access files.
Logical Security
NIC (Network Interface Card )
File Server
Interference
43. An EHR system that had been certified by ONC
Certified EHR System
Logical Access Control
WAN (Wide Area Network )
Archive Flag
44. A device used to fax prescription or to print out prescription information for the EMR/EHR system.
Fax Printer
Stat
DHCP Server
Incremental Backup
45. A standard that adds AES security to the 802.11 standard
802.11i
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
OR (Operating Room)
adware
46. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
Rogue Access Point
Server Utilization
Hardware Attack
SNOMED CT
47. A residential facility for patients who need constant medical or nursing care and supervision.
Nursing Home
Applications
Serial Connection
External Devices
48. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
Biometrics
Drone
SSL (Secure Sockets Layer)
Surgical Center
49. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
AP (Access Points)
ARRA (American Recovery and Reinvestment Act
adware
Pharming
50. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
HIPAA (Health Insurance Portability and Accountability Act)
CPOE (Computerized Physician Order Entry)
Stat
Logical Access Control
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests