SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The management of performance levels of servers to ensure that critical operations are highly available to resources.
802.11i
Server Utilization
Print Server
Logical Access Control
2. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
Imaging
Billing Clearinghouse
Tracert
Surgical Center
3. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
PPTP (Point-to-Point Tunneling Protocol)
EMI (Electromagnetic Interference)
IM (Instant Messaging)
Parallel Connection
4. A server that stores files and programs.
Storage Server
Non-profit Hospital
PHP
ED (Emergency Department)
5. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Stat
Bedside Medication Verification
Server Utilization
SCSI (Small Computer Systems Interface)
6. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
PHP
L2TP (Layer Two Tunneling Protocol)
National Drug Code Directory
SSL (Secure Sockets Layer)
7. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
Software Hotfix
PPP (Point-to-Point Protocol)
SLA
Degaussing
8. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
Break Glass Access
802.11b
Social Engineering Attack
PPTP (Point-to-Point Tunneling Protocol)
9. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
BAA (Business Associate Agreement)
SNOMED CT
NAS (Network Attached Storage)
Confidentiality
10. A device used to convert paper to electronic format and then associates the file with the proper patient.
Document Scanner
Bedside Medication Verification
PHI
General/Community Hospital
11. Software protection systems in an organization.
War Chalking
Outpatient Treatment
Wireless Security
Logical Security
12. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
ICMP (Internet Control Message Protocol)
Code Blue
Imaging Center
Server Load
13. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
National Drug Code Directory
Software Patch
Full Backup
Custodian
14. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
ONC (Office of the National Coordinator)
Database Server
Archive Flag
Nursing Home
15. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
Software Patch
e-Prescribing
For-Profit Hospital
NAC (Network Access Control)
16. An implementation in which voice signals are transmitter over IP networks.
Medicaid
VoIP (Voice over IP)
Liability
Procedure Room
17. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
Card/Badge Scanner
ipconfig
Cloud Computing
NIC (Network Interface Card )
18. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Security Administrator
Level II Trauma Center
Nursing Home
Time Server
19. A protocol that provides VPN functionality.
VPN Protocol
FDA (Food and Drug Administration)
Intermediate Care facility
Virtualization
20. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
XML (EXtensible Markup Language)
ICMP (Internet Control Message Protocol)
Email
HTTPS (Hypertext Transfer Protocol Secure)
21. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
SSL (Secure Sockets Layer)
Medical Record Controls
802.11n
Level V Trauma Center
22. A device used for patient billing to capture an electronic signature.
Bedside Medication Verification
802.11
NAC (Network Access Control)
Signature Pads
23. A server that provides database services to other computers in a network.
Human Interface Devices
Private Health Insurers
Centralized
Database Server
24. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
DRP (Disaster Recovery Plan)
Level III Trauma Center
EAP (Extensible Authentication Protocol)
Differential Backup
25. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Tracert
Worm
Mail Server
Time Server
26. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
Practice Management Software
VPN Protocol
ARP Poisoning
Desktop Support
27. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
CMS (Centers for Medicare and Medicaid Services)
Schedule V Controlled Substance
Private Health Record
Archive Flag
28. Cisco Systems' proprietary EAP implementation.
Strong Password
LEAP (Lightweight Extensible Authentication Protocol)
PAN (Personal Area Network)
Main Frame
29. Systems that store networking hardware and provide networking services to local area networks within a medical environment.
Secure Shredding
lient-Server
SSTP (Secure Socket Tunneling Protocol)
IDF (International Distribution Frame)
30. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
PACS
Camera
Port Scanning
ARRA (American Recovery and Reinvestment Act
31. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
802.11n
HL7
Practice Management Software
Drug Allergy
32. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
DNS Server
Eligible Provider
Hoax
PAN (Personal Area Network)
33. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
VoIP (Voice over IP)
SNOMED CT
Mantrap
Tracking and Auditing Software
34. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
PPP (Point-to-Point Protocol)
Applications
Packet Sniffing
antivirus software
35. A system that extinguishes fire using special gases.
SSH
Fire Suppression
Virus
SSL (Secure Sockets Layer)
36. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Port Scanning
Secure File Transfer Protocol
Social Engineering Attack
DoS (Denial of Service attack)
37. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
BAA (Business Associate Agreement)
Parallel Connection
PHI
Flash
38. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
Legal Health Record
Public Health Record
RHIO (Regional Health Information Organization)
PEAP
39. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
War Chalking
Main Frame
Serial Connection
HDD (Hard Disk Drive)
40. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Flash
Data Sanitation
Camera
Physical Security Controls
41. A device that provides network connectivity capabilities for computer systems.
ONC (Office of the National Coordinator)
Billing and Coding Software
Trojan Horse
NIC (Network Interface Card )
42. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
CPOE (Computerized Physician Order Entry)
NAC (Network Access Control)
Logical Access Control
Parallel Tracking Software
43. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Strong Password
Recover Room
Drug Allergy
Confidentiality
44. Data that is added to a patient EMR to allow for quick searching and file location.
Port Scanning
Metadata
War Driving
Incremental Backup
45. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
Logical Access Control
SNOMED CT
ISP (Internet Service Provider)
IV (Initialization Vector)
46. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Software Update
Pharming
802.1x
ARP(Address Resolution Protocol)
47. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.
ROI Department
Superbill
ISP (Internet Service Provider)
Scheduling Software
48. A method used to remove any sensitive data from a mobile device and permanently delete it.
Keyfob
Continuing Care Facility
Billing and Coding Software
Data Wiping
49. Electronic conversion of hard copy documents to digital form.
National Drug Code Directory
Float Room
General/Community Hospital
Document Imaging
50. A network that displays characteristics of more than one of the three standard network models.
Systems Administrator
Medical Interfaces
Worm
Mixed Mode