SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.
Zombie
Trauma Center
SSTP (Secure Socket Tunneling Protocol)
ED (Emergency Department)
2. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
PHI
PCP Primary Care Physician
Scheduling Software
CPT (Current Procedural Terminology)
3. A TCP/IP utility used to verity the network connectivity of a computer.
Secure File Transfer Protocol
Ping
Fax Server
Medicare
4. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
XML (EXtensible Markup Language)
EMI (Electromagnetic Interference)
Permission
HIPAA (Health Insurance Portability and Accountability Act)
5. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
Long-stay Facility
Transitive Access
Session Hijacking
ASP (Active Server Pages)
6. A device used to convert paper to electronic format and then associates the file with the proper patient.
Assisted Living Facility
ad hoc
Document Scanner
War Chalking
7. A system that extinguishes fire using special gases.
Schedule II Controlled Substance
Fire Suppression
CPOE (Computerized Physician Order Entry)
Input Devices
8. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
Level I Trauma Center
Software Update
Port Scanning
IM (Instant Messaging)
9. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
MOU (Memorandum of Understanding)
Intermediate Care facility
Virtualization
TTL
10. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
OCR (Optical Character Recognition)
802.11n
Level II Trauma Center
Camera
11. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
Assisted Living Facility
External Devices
Medical Interfaces
Acuity
12. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
Logic Bomb
Meaningful Use
L2TP (Layer Two Tunneling Protocol)
OCR (Optical Character Recognition)
13. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
ED (Emergency Department)
NDC ID (National Drug Code Identification)
Server Utilization
Software Hotfix
14. A standard that adds AES security to the 802.11 standard
Switch
Software Update
802.11i
RFP (Request for Proposal)
15. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
DHCP (Dynamic Host Control Protocol)
Serial Connection
Replay
Rogue Access Point
16. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
DDoS (Distributed Denial of Service)
Worm
Bedside Medication Verification
PEAP
17. A VPN protocol that is an extension of the PPP remote access protocol.
Spam
External Devices
Liability Waiver
PPTP (Point-to-Point Tunneling Protocol)
18. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Cloud Computing
Trauma Center
Stat
19. The U.S. Agency charged with protecting the health of the population and providing various human services.
HHS (U.S. Department of Health and Human Services)
API (Application Programming Interface)
Legal Health Record
Switch
20. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
Protected Health Information
Server Utilization
Barcode Scanner
Virtualization
21. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
PAN (Personal Area Network)
Document Imaging
The Joint Commission
P2P
22. An AES cipher-based encryption protocol used in WPA2.
ipconfig
Network Administrator
Strong Password
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
23. Secure Shell - A protocol for secure remote logon and secure transfer of data.
SSH
MDF (Main Distribution Frame)
802.11i
Integrity
24. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Software Patch
Card/Badge Scanner
RADIUS
Degaussing
25. A network that displays characteristics of more than one of the three standard network models.
Mixed Mode
Desktop Support
E/M Codes (Evaluation and Management Codes)
MDF (Main Distribution Frame)
26. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
Physical Security Controls
PATA Connection
Degaussing
IV (Initialization Vector)
27. A protocol that provides VPN functionality.
Imaging
Time Server
VPN Protocol
Email
28. An IT role that is responsible for the network infrastructure and components withing an organization.
Port Scanning
Network Administrator
Nursing Home
Public Hospital
29. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.
Fiber
General/Community Hospital
Degaussing
Intermediate Care facility
30. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
EHR (Electronic Health Record)
RADIUS
Parallel Connection
Medicaid
31. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
RFP (Request for Proposal)
Covered Entity
WHO
Systems Administrator
32. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
IV Attack
Level IV Trauma Center
Rogue Access Point
Liability
33. A server that contains at least one DHCP scope.
DHCP Server
Tracking and Auditing Software
SSTP (Secure Socket Tunneling Protocol)
Change Management
34. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
802.11g
SaaS
Level III Trauma Center
National Drug Code Directory
35. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
IM (Instant Messaging)
Bedside Medication Verification
DC (Domain Controller)
VoIP (Voice over IP)
36. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
802.11i
Confidentiality
Long-stay Facility
Practice Management Software
37. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Code Blue
ARP(Address Resolution Protocol)
Formulary Checking
SCSI (Small Computer Systems Interface)
38. An area where surgical procedures are performer in a sterile environment.
ARRA (American Recovery and Reinvestment Act
OR (Operating Room)
EMI (Electromagnetic Interference)
PPTP (Point-to-Point Tunneling Protocol)
39. A server that is primarily used to share - store - and access files.
PACS
Time Server
NAS (Network Attached Storage)
File Server
40. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'
SCSI (Small Computer Systems Interface)
HL7
Sniffing
P2P
41. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.
War Driving
adware
WHO
Mantrap
42. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Full Backup
Practice Management Software
Trojan Horse
Short-stay Facility
43. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
LAN (Local Area Network)
Structured Data
FDA (Food and Drug Administration)
Logical Access Control
44. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
DoS (Denial of Service attack)
802.11
Meaningful Use
War Chalking
45. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.
Level I Trauma Center
AP (Access Points)
E/M Codes (Evaluation and Management Codes)
Recover Room
46. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
Security Rule
MDF (Main Distribution Frame)
Logical Access Control
Schedule III Controlled Substance
47. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.
NAS (Network Attached Storage)
ICMP (Internet Control Message Protocol)
Liability Waiver
Urgent Care Facility
48. A communication protocol that enables the transfer of files between a user's workstation and a remote host
TTL
MOU (Memorandum of Understanding)
L2TP (Layer Two Tunneling Protocol)
FTP (File Transfer Protocol)
49. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
Desktop Support
Rogue Access Point
Cloud Computing
Coaxial Cable
50. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
RHIO (Regional Health Information Organization)
Host Computer
PPP (Point-to-Point Protocol)
802.11a