SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
PCP Primary Care Physician
DRP (Disaster Recovery Plan)
Level IV Trauma Center
SCSI (Small Computer Systems Interface)
2. Secure Shell - A protocol for secure remote logon and secure transfer of data.
WEP (Wired Equivalency Protocol)
Applications
Mail Server
SSH
3. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
DHCP Server
Procedure Room
SNOMED CT
Specialized Hospital
4. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Liability
Confidentiality
Schedule V Controlled Substance
Surgical Center
5. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
E/M Codes (Evaluation and Management Codes)
Availability
National Drug Code Directory
Logical Access Control
6. A TCP/IP utility used to verity the network connectivity of a computer.
Tracert
Host Computer
Ping
802.11
7. A method used to remove any sensitive data from a mobile device and permanently delete it.
ipconfig
DRP (Disaster Recovery Plan)
EMI (Electromagnetic Interference)
Data Wiping
8. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Desktop Support
Centralized
Availability
Medical Interfaces
9. A portable electronic security token that contains biometric user data - or other identification information.
USB Connection
DRP (Disaster Recovery Plan)
Site Survey
Keyfob
10. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
Bedside Medication Verification
PaaS
SSTP (Secure Socket Tunneling Protocol)
MOU (Memorandum of Understanding)
11. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.
SNOMED CT
Practice Management Software
Covered Entity
USB
12. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.
Physical Security
Level III Trauma Center
ipconfig
IaaS (Infrastructure as a Service)
13. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
OR (Operating Room)
ASP (Active Server Pages)
802.11n
Security Rule
14. A server that proves the most accurate actual time to all clients in a computer network.
PATA Connection
E/M Codes (Evaluation and Management Codes)
Time Server
Software Update
15. Records that are not for public consumption and require appropriate release before they can be shared.
Schedule I Controlled Substance
Network Administrator
Private Health Record
Security Administrator
16. Authentication schemes based on individuals' physical characters.
Level III Trauma Center
Software Hotfix
Biometrics
ICMP (Internet Control Message Protocol)
17. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Security Policy
LAN (Local Area Network)
Physical Security Controls
Certified EHR System
18. A company that provides access to the Internet.
ISP (Internet Service Provider)
MOU (Memorandum of Understanding)
Code Blue
Application Server
19. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.
IM (Instant Messaging)
Fax Printer
CMS (Centers for Medicare and Medicaid Services)
Firewall
20. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Sensitivity Label
Worm
Serial Connection
Liability Waiver
21. Any medical treatment or services provided on an outpatient basis.
Trojan Horse
Keyfob
mbulatory care
DRP (Disaster Recovery Plan)
22. A family of specification developed by the IEEE for wireless LAN technology.
Drug Allergy
Time Server
802.11
SQL (Structured Query Language)
23. A device that connects multiple network that use the same protocol.
Change Management
SSH
Router
DNS (Domain Name System)
24. The amount of work a server performs on a regular basis.
Protected Health Information
RDP (Remote Desktop Protocol)
Bedside Medication Verification
Server Load
25. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Bluejacking
Short-stay Facility
Imaging
Archive Flag
26. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Private Health Record
Packet Sniffing
Treatment Team
Nursing Home
27. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
Ping
PPTP (Point-to-Point Tunneling Protocol)
Stat
PHR (Personal Health Record)
28. A personal computer storage decide that stores data optically - rather than magnetically.
Optical Disk
Change Management
Code Blue
File Server
29. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
NAC (Network Access Control)
Database Server
CCD(Continuity of Care Document)
ROI Department
30. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
Secure Shredding
SSTP (Secure Socket Tunneling Protocol)
CCR (Continuity of Care Record)
Card/Badge Scanner
31. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
ARP Poisoning
Social Engineering Attack
Home Healthcare
Imaging
32. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
Tracking and Auditing Software
PATA Connection
Medication Reconciliation
Interference
33. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.
PHP
Isolation Room
CIA Triad(Confidentiality - Integrity - Availability)
Full Backup
34. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Security Policy
Bedside Medication Verification
Level III Trauma Center
Coaxial Cable
35. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
Scope of Practice
DHCP (Dynamic Host Control Protocol)
SLA
VPN Protocol
36. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Internet Modem
Security Policy
Bluetooth
Specialized Hospital
37. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
Medical Record Controls
For-Profit Hospital
ASP (Active Server Pages)
Worm
38. The management of performance levels of servers to ensure that critical operations are highly available to resources.
Server Utilization
Hardware Attack
HIPAA (Health Insurance Portability and Accountability Act)
Email
39. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.
Software Update
CCHIT(Certification Commission for Health Information Technology)
Outpatient Treatment
adware
40. Software protection systems in an organization.
PaaS
Logical Security
Logical Access Control
National Drug Code Directory
41. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
Virus
Medical Coding
Daily Backup
PaaS
42. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Eavesdropping
Continuing Care Facility
UPS
802.11g
43. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
ARP(Address Resolution Protocol)
Twisted Pair
CPOE (Computerized Physician Order Entry)
Medication Reconciliation
44. Application code that enables various applications to communicate with each other.
E/M Codes (Evaluation and Management Codes)
Schedule II Controlled Substance
API (Application Programming Interface)
802.11a
45. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
Hardware Attack
Security Administrator
ATA (Advanced Technology Attachment)
ARRA (American Recovery and Reinvestment Act
46. A document that defines the authorized uses of PHI and how the information is to be used and managed.
Firewall
BAA (Business Associate Agreement)
Phishing
802.11b
47. A device used to convert paper to electronic format and then associates the file with the proper patient.
TKIP (Temporary Key Integrity Protocol)
Document Scanner
Fax Server
Treatment Team
48. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
Imaging
PPP (Point-to-Point Protocol)
Firewall
Public Health Record
49. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Spam
Firewall
EAP (Extensible Authentication Protocol)
Worm
50. The standard language that defines how web pages are formatted and displayed.
Full Backup
Internet Modem
HTML (Hypertext Markup Language)
Twisted Pair