SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. World Health Organization - A division of the United Nations that manages the authority of international public health.
Input Devices
ONC (Office of the National Coordinator)
Secure File Transfer Protocol
WHO
2. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Centralized
Interference
IDS (Intrusion Detection System)
Medical Coding
3. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
DC (Domain Controller)
Public Hospital
Logic Bomb
Encryption
4. A system that extinguishes fire using special gases.
Treatment Team
Pharming
Fire Suppression
Legal Health Record
5. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
ISP (Internet Service Provider)
Non-profit Hospital
CCR (Continuity of Care Record)
IDS (Intrusion Detection System)
6. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
Bluesnarfing
TKIP (Temporary Key Integrity Protocol)
Level II Trauma Center
OCR (Optical Character Recognition)
7. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
Switch
Fax Server
Parallel Connection
PEAP
8. A method that uses the cloud to provide any or all infrastructure needs.
Spyware
Barcode Scanner
lient-Server
IaaS (Infrastructure as a Service)
9. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
Secure File Transfer Protocol
CPT (Current Procedural Terminology)
Change Management
PaaS
10. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Packet Sniffing
Formulary Checking
Tracking and Auditing Software
Imaging
11. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
Assisted Living Facility
Secure Chat
Availability
Schedule III Controlled Substance
12. A security setting that determines the level of access a user or group account has to be particular resource.
WEP (Wired Equivalency Protocol)
Storage Server
CCHIT(Certification Commission for Health Information Technology)
Permission
13. A protocol that provides VPN functionality.
Privacy Rule
Level I Trauma Center
P2P
VPN Protocol
14. A device used for patient billing to capture an electronic signature.
For-Profit Hospital
Trojan Horse
Twisted Pair
Signature Pads
15. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
SSH
Parallel Tracking Software
P2P
Replay
16. A server that provides database services to other computers in a network.
Database Server
P2P
IDF (International Distribution Frame)
SaaS
17. A family of specification developed by the IEEE for wireless LAN technology.
Secure File Transfer Protocol
NDC ID (National Drug Code Identification)
CPT (Current Procedural Terminology)
802.11
18. A Protocol used to automatically assign IP addressing information to IP network computers.
EHR (Electronic Health Record)
802.11i
DHCP (Dynamic Host Control Protocol)
Application Server
19. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
NDC ID (National Drug Code Identification)
Medical Coding
Level II Trauma Center
Eligible Provider
20. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
Superbill
Main Frame
ONC (Office of the National Coordinator)
Coaxial Cable
21. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
IM (Instant Messaging)
Hospice Care
Bluejacking
SLA
22. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Float Room
HITECH Health Information Technology for Economic and Clinical Health Act)
Pharming
Bluejacking
23. A document that defines the authorized uses of PHI and how the information is to be used and managed.
CPT (Current Procedural Terminology)
PaaS
DC (Domain Controller)
BAA (Business Associate Agreement)
24. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
General/Community Hospital
Social Engineering Attack
Public Health Record
OR (Operating Room)
25. A utility used to determine the route data takes to get to a particular destination.
CCR (Continuity of Care Record)
Tracert
Metadata
DBA (Database Administrator)
26. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
Level IV Trauma Center
ipconfig
adware
USB Connection
27. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
Surgical Center
HTTPS (Hypertext Transfer Protocol Secure)
Human Interface Devices
Formulary Checking
28. A VPN protocol that is an extension of the PPP remote access protocol.
USB Connection
PPTP (Point-to-Point Tunneling Protocol)
Schedule V Controlled Substance
DHCP Server
29. Cisco Systems' proprietary EAP implementation.
WTLS (Wireless Transport Layer Security)
FTP (File Transfer Protocol)
Twisted Pair
LEAP (Lightweight Extensible Authentication Protocol)
30. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
Switch
File Server
Private Health Insurers
Change Management
31. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.
Web Server
ISP (Internet Service Provider)
Public Hospital
Switch
32. A formalized statement that defines how security will be implemented within a particular organization.
MOU (Memorandum of Understanding)
Security Policy
SSTP (Secure Socket Tunneling Protocol)
Signature Pads
33. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
AP (Access Points)
Change Management
For-Profit Hospital
Session Hijacking
34. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
CCD(Continuity of Care Document)
Break Glass Access
DBA (Database Administrator)
E/M Codes (Evaluation and Management Codes)
35. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Security Policy
Medical Interfaces
Secure Shredding
Long-stay Facility
36. A network that connects wireless devices in a very close proximity but not though a wireless access point.
Bluesnarfing
Drug Allergy
FTP (File Transfer Protocol)
PAN (Personal Area Network)
37. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
Server Utilization
HHS (U.S. Department of Health and Human Services)
IV Attack
DNS Server
38. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
Human Interface Devices
Signature Pads
LEAP (Lightweight Extensible Authentication Protocol)
Medical Interfaces
39. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
Private Health Record
NIST (National Institute of Standards and Technology)
RADIUS
Trojan Horse
40. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
ARP(Address Resolution Protocol)
Eligible Provider
CPT (Current Procedural Terminology)
Bluejacking
41. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
OR (Operating Room)
PCP Primary Care Physician
Camera
Replay
42. Software as a Service - A method that uses the cloud to provide application services to users.
SCSI (Small Computer Systems Interface)
antivirus software
Long-stay Facility
SaaS
43. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
DDoS (Distributed Denial of Service)
FTP (File Transfer Protocol)
Solid State Storage
802.11g
44. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
Drone
Proxy Server
Daily Backup
Cloud Computing
45. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
War Chalking
Transitive Access
PCP Primary Care Physician
FDA (Food and Drug Administration)
46. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
External Devices
Solid State Storage
PHP
Virtualization
47. Personal computer components that enable users to enter data or instructions into a computer.
Human Interface Devices
Tape Drive
Software Patch
Input Devices
48. A server that contains at least one DHCP scope.
DDoS (Distributed Denial of Service)
Preceptor
DHCP Server
Transitive Access
49. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Availability
Superbill
Medicare
Internet Modem
50. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Legal Health Record
Pharming
Formulary Checking
Eavesdropping