SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
Secure Chat
Assisted Living Facility
Superbill
CCD(Continuity of Care Document)
2. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Private Health Insurers
IDS (Intrusion Detection System)
Eavesdropping
TCP/IP (Transmission Control Protocol/ Internet Protocol)
3. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
Break Glass Access
HIPAA (Health Insurance Portability and Accountability Act)
Site Survey
Home Healthcare
4. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
CCR (Continuity of Care Record)
Recover Room
NIC (Network Interface Card )
802.11i
5. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's
HHS (U.S. Department of Health and Human Services)
DC (Domain Controller)
Site Survey
LAN (Local Area Network)
6. A security protocol that uses certificates for authentication and encryption to protect web communication.
SSL (Secure Sockets Layer)
Public Health Record
TCP/IP (Transmission Control Protocol/ Internet Protocol)
ASP (Active Server Pages)
7. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
Float Room
Schedule V Controlled Substance
ED (Emergency Department)
802.1x
8. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
Scheduling Software
Tracking and Auditing Software
War Chalking
Tape Drive
9. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
Proxy Server
Card/Badge Scanner
OCR (Optical Character Recognition)
Break Glass Access
10. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
LAN (Local Area Network)
HL7
Private Practice
Level III Trauma Center
11. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
General/Community Hospital
NAC (Network Access Control)
Eligible Provider
ASP (Active Server Pages)
12. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
National Drug Code Directory
DDoS (Distributed Denial of Service)
AP (Access Points)
13. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.
Worm
UPS
Final Rule
IaaS (Infrastructure as a Service)
14. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.
Medical Record Controls
EMI (Electromagnetic Interference)
Hardware Attack
Incremental Backup
15. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
PAN (Personal Area Network)
PHP
Virtualization
Specialized Hospital
16. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.
HHS (U.S. Department of Health and Human Services)
Signature Pads
PPP (Point-to-Point Protocol)
USB
17. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Encryption
DNS (Domain Name System)
ad hoc
Liability
18. A communication protocol that enables the transfer of files between a user's workstation and a remote host
IaaS (Infrastructure as a Service)
FTP (File Transfer Protocol)
ICMP (Internet Control Message Protocol)
Billing and Coding Software
19. Mechanism that are put in place to limit access to electronic health information.
Medical Record Controls
Billing Clearinghouse
Internet Modem
PATA Connection
20. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
ARP(Address Resolution Protocol)
General/Community Hospital
Change Management
Storage Server
21. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Port Scanning
FTP Server
Physical Security Controls
Billing Clearinghouse
22. A server that proves the most accurate actual time to all clients in a computer network.
Time Server
API (Application Programming Interface)
802.11
802.11a
23. An AES cipher-based encryption protocol used in WPA2.
FTP Server
Data Wiping
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
API (Application Programming Interface)
24. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
CMS (Centers for Medicare and Medicaid Services)
WAN (Wide Area Network )
ad hoc
Stat
25. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
Scheduling Software
EMI (Electromagnetic Interference)
EAP (Extensible Authentication Protocol)
Secure Shredding
26. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
802.11b
Pharming
Public Health Record
Interference
27. A protocol used to connect to and access a remote computer.
L2TP (Layer Two Tunneling Protocol)
RDP (Remote Desktop Protocol)
File Server
The Joint Commission
28. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
Trojan Horse
e-Prescribing
Barcode Scanner
Human Interface Devices
29. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
802.11
Examination Room
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Liability
30. The standard language that defines how web pages are formatted and displayed.
DDoS (Distributed Denial of Service)
Port Scanning
HTML (Hypertext Markup Language)
Legal Health Record
31. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
Meaningful Use
Physical Security Controls
MDF (Main Distribution Frame)
IDF (International Distribution Frame)
32. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Secure Shredding
Physical Security Controls
Long-stay Facility
Man-in-the-middle
33. A backup that backs up all selected files on a daily basis.
XML (EXtensible Markup Language)
Desktop Support
P2P
Daily Backup
34. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
DDoS (Distributed Denial of Service)
Level III Trauma Center
Software Hotfix
Biometrics
35. An implementation in which voice signals are transmitter over IP networks.
NIC (Network Interface Card )
Non-profit Hospital
VoIP (Voice over IP)
NIST (National Institute of Standards and Technology)
36. A programming and query language common to many large scale database systems.
Storage Server
Eavesdropping
SQL (Structured Query Language)
Server Load
37. An Instant messaging service that uses strong encryption to send and receive secure messages.
Secure Chat
802.11i
Medicaid
ISP (Internet Service Provider)
38. Electronic conversion of hard copy documents to digital form.
Interference
Software Update
FTP Server
Document Imaging
39. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
Practice Management Software
Stat
Site Survey
Drone
40. The U.S. Agency charged with protecting the health of the population and providing various human services.
HHS (U.S. Department of Health and Human Services)
ipconfig
Secure Shredding
SSL (Secure Sockets Layer)
41. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Data Wiping
Parallel Connection
PEAP
Availability
42. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.
HDD (Hard Disk Drive)
Trojan Horse
Schedule I Controlled Substance
Application Server
43. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
ICMP (Internet Control Message Protocol)
Security Policy
XML (EXtensible Markup Language)
Short-stay Facility
44. A server that is primarily used to share - store - and access files.
File Server
Software Patch
Strong Password
Hospice Care
45. A document that lists agreed upon actions between two parties.
ARRA (American Recovery and Reinvestment Act
War Chalking
E/M Codes (Evaluation and Management Codes)
MOU (Memorandum of Understanding)
46. The U.S. federal program to provide healthcare for certain low-income individual and families.
Medicaid
ICMP (Internet Control Message Protocol)
ED (Emergency Department)
Full Backup
47. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
Security Administrator
SNOMED CT
Schedule III Controlled Substance
Packet Sniffing
48. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
Specialized Hospital
OCR (Optical Character Recognition)
National Drug Code Directory
PATA Connection
49. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
ARRA (American Recovery and Reinvestment Act
Isolation Room
Medication Reconciliation
General/Community Hospital
50. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
Secure File Transfer Protocol
FireWire Connection
DNS Server
Ping
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests