SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
TKIP (Temporary Key Integrity Protocol)
Cloud Computing
Meaningful Use
CIA Triad(Confidentiality - Integrity - Availability)
2. World Health Organization - A division of the United Nations that manages the authority of international public health.
WHO
HTML (Hypertext Markup Language)
PHI
FireWire Connection
3. A formalized statement that defines how security will be implemented within a particular organization.
Integrity
Security Policy
DHCP (Dynamic Host Control Protocol)
Inpatient Treatment
4. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
ad hoc
Level III Trauma Center
Isolation Room
antivirus software
5. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
Float Room
Security Rule
National Drug Code Directory
Schedule IV Controlled Substance
6. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
Sensitivity Label
Mail Server
Eligible Provider
ICMP (Internet Control Message Protocol)
7. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
External Devices
ED (Emergency Department)
Barcode Scanner
Strong Password
8. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
Controlled substance
Session Hijacking
Biometrics
Permission
9. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Pharming
Replay
For-Profit Hospital
E/M Codes (Evaluation and Management Codes)
10. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Encryption
Treatment Team
Logical Access Control
TCP/IP (Transmission Control Protocol/ Internet Protocol)
11. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.
SCSI (Small Computer Systems Interface)
Availability
Scope of Practice
Billing Clearinghouse
12. See Host Computer
WAN (Wide Area Network )
Security Policy
Main Frame
Document Scanner
13. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
DHCP (Dynamic Host Control Protocol)
PEAP
Spyware
Recover Room
14. A device used for patient billing to capture an electronic signature.
Signature Pads
External Devices
Preceptor
Switch
15. A private network that is configured within a public network such as the Internet.
VPN Protocol
VPN (Virtual Private Network)
BAA (Business Associate Agreement)
Recover Room
16. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
Parallel Tracking Software
Stat
RFP (Request for Proposal)
Physical Security
17. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Server Utilization
Medical Record Controls
Covered Entity
Main Frame
18. The amount of work a server performs on a regular basis.
USB Connection
Server Load
Internet Modem
802.11a
19. An IT role that is responsible for the network infrastructure and components withing an organization.
Network Administrator
Preceptor
Bluesnarfing
Barcode Scanner
20. A security protocol that uses certificates for authentication and encryption to protect web communication.
Drug Allergy
SSL (Secure Sockets Layer)
DRP (Disaster Recovery Plan)
Biometrics
21. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
Logical Access Control
Hardware Attack
NDC ID (National Drug Code Identification)
Packet Sniffing
22. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
XML (EXtensible Markup Language)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
ONC (Office of the National Coordinator)
TTL
23. A backup that backs up all selected files on a daily basis.
Daily Backup
Urgent Care Facility
Server Load
Float Room
24. A server that receives email request from hosts on a network - and redirects them to the intended recipient.
Mail Server
Secure Chat
Biometrics
Drug Allergy
25. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
VPN (Virtual Private Network)
Strong Password
Stat
Time Server
26. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP Poisoning
HTML (Hypertext Markup Language)
SLA
Firewall
27. The standard language that defines how web pages are formatted and displayed.
Private Practice
HTML (Hypertext Markup Language)
Surgical Center
Level II Trauma Center
28. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
Medicaid
Pharming
Continuing Care Facility
Practice Management Software
29. A type of network that is established spontaneously through a peer-to-peer wireless connection.
CCR (Continuity of Care Record)
Controlled substance
SaaS
ad hoc
30. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
Preceptor
NDC ID (National Drug Code Identification)
Imaging
HDD (Hard Disk Drive)
31. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Internet Modem
SQL (Structured Query Language)
Schedule I Controlled Substance
Mantrap
32. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.
IEEE (Institute of Electrical and Electronic Engineers)
ONC (Office of the National Coordinator)
Cloud Computing
Hospice Care
33. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Non-profit Hospital
Medicare
802.11a
PCP Primary Care Physician
34. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
DDoS (Distributed Denial of Service)
Drug Allergy
802.11
Eavesdropping
35. A personal computer storage device that uses fixed media and magnetic data storage.
HDD (Hard Disk Drive)
Proxy Server
Formulary Checking
IM (Instant Messaging)
36. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Public Hospital
USB
Sniffing
Private Health Record
37. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Billing Clearinghouse
Custodian
DNS (Domain Name System)
Differential Backup
38. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
PPTP (Point-to-Point Tunneling Protocol)
Procedure Room
Card/Badge Scanner
HITECH Health Information Technology for Economic and Clinical Health Act)
39. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
Fax Printer
Specialized Hospital
ad hoc
WEP (Wired Equivalency Protocol)
40. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Private Health Record
IM (Instant Messaging)
Eavesdropping
Code Blue
41. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Level I Trauma Center
Server Utilization
SSTP (Secure Socket Tunneling Protocol)
Wireless Security
42. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
SSTP (Secure Socket Tunneling Protocol)
Signature Pads
Schedule III Controlled Substance
Application Server
43. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
NDC ID (National Drug Code Identification)
MDF (Main Distribution Frame)
P2P
DNS Server
44. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Trauma Center
Bluejacking
PACS
Keyfob
45. An invitation for vendors to submit a plan and bid for the delivery of a product or service.
Isolation Room
Custodian
Centralized
RFP (Request for Proposal)
46. An EHR system that had been certified by ONC
Secure Chat
Fax Server
Certified EHR System
Metadata
47. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Teaching Hospital
WEP (Wired Equivalency Protocol)
PGP
Rogue Access Point
48. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.
Schedule II Controlled Substance
OCR (Optical Character Recognition)
Print Server
Flash
49. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
Systems Administrator
Non-profit Hospital
Solid State Storage
Level IV Trauma Center
50. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
Physical Security
TTL
SNOMED CT
HITECH Health Information Technology for Economic and Clinical Health Act)