SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device that connects multiple network that use the same protocol.
Internet Modem
SaaS
Router
NIST (National Institute of Standards and Technology)
2. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
EAP (Extensible Authentication Protocol)
ARP Poisoning
Privacy Rule
Barcode Scanner
3. A security protocol created by the IEEE task group to replace WEP.
Fire Suppression
TKIP (Temporary Key Integrity Protocol)
CCHIT(Certification Commission for Health Information Technology)
Optical Disk
4. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
Barcode Scanner
Centralized
Pharming
ICMP (Internet Control Message Protocol)
5. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
PPTP (Point-to-Point Tunneling Protocol)
Medicare
WEP (Wired Equivalency Protocol)
Wireless Security
6. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
PPTP (Point-to-Point Tunneling Protocol)
Long-stay Facility
Sensitivity Label
Session Hijacking
7. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
Twisted Pair
Stat
OR (Operating Room)
TTL
8. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is required to provide services 24 hours a
Level IV Trauma Center
Port Scanning
Host Computer
HTML (Hypertext Markup Language)
9. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are
Man-in-the-middle
802.11b
PPTP (Point-to-Point Tunneling Protocol)
Bluetooth
10. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Worm
PGP
FTP Server
Sniffing
11. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
Coaxial Cable
Bluejacking
PHR (Personal Health Record)
Schedule II Controlled Substance
12. See Host Computer
Main Frame
AP (Access Points)
PGP
ICMP (Internet Control Message Protocol)
13. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
Final Rule
OCR (Optical Character Recognition)
Bluesnarfing
SSTP (Secure Socket Tunneling Protocol)
14. A portable electronic security token that contains biometric user data - or other identification information.
Keyfob
FTP (File Transfer Protocol)
ARP Poisoning
HTML (Hypertext Markup Language)
15. The amount of work a server performs on a regular basis.
802.1x
DoS (Denial of Service attack)
Server Load
FTP (File Transfer Protocol)
16. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Medication Reconciliation
Confidentiality
The Joint Commission
Proxy Server
17. A residential facility for patients who need constant medical or nursing care and supervision.
Applications
Application Server
Nursing Home
TTL
18. A hospital specialized to treat a specific disease or condition or a specific type of patient.
Centralized
Keyfob
Serial Connection
Specialized Hospital
19. Mechanism that are put in place to limit access to electronic health information.
SCSI (Small Computer Systems Interface)
Medical Record Controls
Spyware
Interference
20. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
Secure Chat
adware
PHR (Personal Health Record)
Rogue Access Point
21. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
Drone
IEEE (Institute of Electrical and Electronic Engineers)
USB
Schedule IV Controlled Substance
22. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
PaaS
FDA (Food and Drug Administration)
802.11a
SSL (Secure Sockets Layer)
23. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Archive Flag
RDP (Remote Desktop Protocol)
Physical Security Controls
Serial Connection
24. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
Virus
Remote Access
CPT (Current Procedural Terminology)
Systems Administrator
25. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
802.1x
DDoS (Distributed Denial of Service)
Assisted Living Facility
HITECH Health Information Technology for Economic and Clinical Health Act)
26. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Recover Room
SNOMED CT
Private Health Insurers
Worm
27. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Specialized Hospital
Incremental Backup
Medicare
HITECH Health Information Technology for Economic and Clinical Health Act)
28. Electronic messages sent between users or groups.
SNOMED CT
Software Update
Email
Break Glass Access
29. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
War Driving
TTL
Bluesnarfing
Liability Waiver
30. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
SSH
Display Devices
lient-Server
Internet Modem
31. A facility equipped to treat patients suffering traumatic injuries.
mbulatory care
PaaS
PPP (Point-to-Point Protocol)
Trauma Center
32. A network that connects wireless devices in a very close proximity but not though a wireless access point.
Software Patch
WHO
adware
PAN (Personal Area Network)
33. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Spam
Secure File Transfer Protocol
Input Devices
Signature Pads
34. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
VoIP (Voice over IP)
NDC ID (National Drug Code Identification)
PAN (Personal Area Network)
Network Administrator
35. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
Liability Waiver
Covered Entity
USB Connection
antivirus software
36. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
Confidentiality
HL7
Server Load
Coaxial Cable
37. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Medicaid
Remote Access
Scope of Practice
Covered Entity
38. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.
FDA (Food and Drug Administration)
Proxy Server
Trojan Horse
Hoax
39. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
PCP Primary Care Physician
Spam
Code Blue
PACS
40. A method that uses the cloud to provide any or all infrastructure needs.
ISP (Internet Service Provider)
IaaS (Infrastructure as a Service)
PHP
Bluesnarfing
41. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.
IV Attack
Serial Connection
Logical Access Control
Interference
42. Records that are not for public consumption and require appropriate release before they can be shared.
Private Health Record
Optical Disk
Parallel Tracking Software
SLA
43. The standard language that defines how web pages are formatted and displayed.
HTML (Hypertext Markup Language)
Level V Trauma Center
Eligible Provider
External Devices
44. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
IM (Instant Messaging)
CPOE (Computerized Physician Order Entry)
Bedside Medication Verification
Privacy Rule
45. A server that proves the most accurate actual time to all clients in a computer network.
L2TP (Layer Two Tunneling Protocol)
Degaussing
Intermediate Care facility
Time Server
46. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.
Desktop Support
Camera
Formulary Checking
PEAP
47. A device used to fax prescription or to print out prescription information for the EMR/EHR system.
FTP (File Transfer Protocol)
Fax Printer
HIPAA (Health Insurance Portability and Accountability Act)
Email
48. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Private Practice
Virtualization
Optical Disk
RDP (Remote Desktop Protocol)
49. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
Human Interface Devices
P2P
PATA Connection
Tracking and Auditing Software
50. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Metadata
XML (EXtensible Markup Language)
Billing Clearinghouse
Scheduling Software