SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.
Site Survey
Specialized Hospital
Schedule II Controlled Substance
Liability Waiver
2. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
mbulatory care
ARP(Address Resolution Protocol)
Virtualization
PHI
3. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
Bluejacking
Preceptor
adware
Server Load
4. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
Teaching Hospital
TTL
SSTP (Secure Socket Tunneling Protocol)
IV Attack
5. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
RADIUS
Trauma Center
TTL
Packet Sniffing
6. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.
Application Server
Non-profit Hospital
Billing Clearinghouse
E/M Codes (Evaluation and Management Codes)
7. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
Biometrics
Host Computer
lient-Server
HL7
8. A personal computer storage device that stores data magnetically on a removable tape.
Bluesnarfing
ROI Department
PATA Connection
Tape Drive
9. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Urgent Care Facility
API (Application Programming Interface)
Worm
802.11a
10. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
lient-Server
Bluejacking
RHIO (Regional Health Information Organization)
SNOMED CT
11. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
DDoS (Distributed Denial of Service)
VPN (Virtual Private Network)
Eavesdropping
Level III Trauma Center
12. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
PGP
Logical Access Control
Hoax
Covered Entity
13. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
DBA (Database Administrator)
Human Interface Devices
Protected Health Information
Spyware
14. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
Physical Security
Security Rule
802.11n
Liability
15. A device used for patient billing to capture an electronic signature.
Treatment Team
Internet Modem
Signature Pads
PHR (Personal Health Record)
16. A widely adopted markup language used in many documents - websites - and web applications.
HTTPS (Hypertext Transfer Protocol Secure)
Inpatient Treatment
XML (EXtensible Markup Language)
Security Administrator
17. Records that are not for public consumption and require appropriate release before they can be shared.
Private Health Record
Legal Health Record
Signature Pads
P2P
18. A programming and query language common to many large scale database systems.
Schedule II Controlled Substance
SQL (Structured Query Language)
Parallel Connection
Scope of Practice
19. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.
FireWire Connection
UPS
WAN (Wide Area Network )
EHR (Electronic Health Record)
20. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
Transitive Access
Scope of Practice
MOU (Memorandum of Understanding)
Trauma Center
21. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
Security Rule
For-Profit Hospital
Stat
Switch
22. A security protocol created by the IEEE task group to replace WEP.
TKIP (Temporary Key Integrity Protocol)
e-Prescribing
Phishing
The Joint Commission
23. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.
ipconfig
Schedule I Controlled Substance
antivirus software
Twisted Pair
24. A device used to convert paper to electronic format and then associates the file with the proper patient.
Document Scanner
CCHIT(Certification Commission for Health Information Technology)
Scope of Practice
ICMP (Internet Control Message Protocol)
25. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Practice Management Software
Ping
Bluesnarfing
Short-stay Facility
26. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
Optical Disk
IV Attack
Medical Coding
External Devices
27. A network attack in which an attacker disables systems that provide network services by consuming a networks link's available bandwidth - consuming a single system's available resources - or exploiting programming flaws in an application or operation
DoS (Denial of Service attack)
Specialized Hospital
Short-stay Facility
Logical Security
28. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
802.11n
DC (Domain Controller)
ARP Poisoning
802.11b
29. The standard language that defines how web pages are formatted and displayed.
HTML (Hypertext Markup Language)
Software Patch
The Joint Commission
Private Practice
30. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
The Joint Commission
Assisted Living Facility
OR (Operating Room)
CCR (Continuity of Care Record)
31. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'
Daily Backup
SCSI (Small Computer Systems Interface)
Data Wiping
Level II Trauma Center
32. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
802.11a
Network Administrator
PPTP (Point-to-Point Tunneling Protocol)
Drug Allergy
33. Mechanism that are put in place to limit access to electronic health information.
802.11b
Medical Record Controls
BAA (Business Associate Agreement)
FireWire Connection
34. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
lient-Server
Liability Waiver
CCD(Continuity of Care Document)
IV (Initialization Vector)
35. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
Mantrap
SATA Connection
Hospice Care
CPT (Current Procedural Terminology)
36. An area where surgical procedures are performer in a sterile environment.
OR (Operating Room)
TTL
Level IV Trauma Center
Sniffing
37. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
Worm
NAC (Network Access Control)
Mantrap
NDC ID (National Drug Code Identification)
38. A personal computer storage device that uses fixed media and magnetic data storage.
Daily Backup
Differential Backup
War Chalking
HDD (Hard Disk Drive)
39. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
Strong Password
FTP Server
WHO
PGP
40. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
PATA Connection
Sensitivity Label
Solid State Storage
IV Attack
41. An invitation for vendors to submit a plan and bid for the delivery of a product or service.
Schedule II Controlled Substance
RFP (Request for Proposal)
Bluesnarfing
IDF (International Distribution Frame)
42. A Specialized file server that is designed and dedicated to support only data storage needs.
NAS (Network Attached Storage)
Short-stay Facility
Metadata
OCR (Optical Character Recognition)
43. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
Rogue Access Point
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Virus
NIST (National Institute of Standards and Technology)
44. A document that lists agreed upon actions between two parties.
Rogue Access Point
Optical Disk
802.11g
MOU (Memorandum of Understanding)
45. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
PEAP
lient-Server
Application Server
Barcode Scanner
46. An EHR system that had been certified by ONC
Non-profit Hospital
NAS (Network Attached Storage)
Procedure Room
Certified EHR System
47. Any medical treatment or services provided on an outpatient basis.
Private Health Insurers
Controlled substance
SNOMED CT
mbulatory care
48. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Biometrics
VPN Protocol
Hospice Care
HIPAA (Health Insurance Portability and Accountability Act)
49. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
HTTPS (Hypertext Transfer Protocol Secure)
Router
EMI (Electromagnetic Interference)
FireWire Connection
50. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
PPTP (Point-to-Point Tunneling Protocol)
HIPAA (Health Insurance Portability and Accountability Act)
DC (Domain Controller)
WAN (Wide Area Network )