SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device that has multiple network ports and combines multiple physical network segments into a single logical network.
e-Prescribing
Fax Printer
Switch
Camera
2. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
HDD (Hard Disk Drive)
Pharming
Packet Sniffing
Schedule III Controlled Substance
3. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
WTLS (Wireless Transport Layer Security)
adware
PACS
Mixed Mode
4. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Teaching Hospital
File Server
Secure File Transfer Protocol
Inpatient Treatment
5. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
Final Rule
Strong Password
Wireless Security
Recover Room
6. A hospital specialized to treat a specific disease or condition or a specific type of patient.
adware
Specialized Hospital
Human Interface Devices
NIC (Network Interface Card )
7. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
CCR (Continuity of Care Record)
Internet Modem
Pharming
Eavesdropping
8. An EHR system that had been certified by ONC
Medication Reconciliation
Certified EHR System
Medical Coding
802.11a
9. Authentication schemes based on individuals' physical characters.
Eligible Provider
TTL
Biometrics
PACS
10. A network that connects wireless devices in a very close proximity but not though a wireless access point.
Host Computer
PAN (Personal Area Network)
AP (Access Points)
Hoax
11. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
Level II Trauma Center
PHR (Personal Health Record)
Formulary Checking
Secure Chat
12. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.
Document Scanner
Site Survey
Logic Bomb
Public Health Record
13. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
Stat
EMI (Electromagnetic Interference)
Server Utilization
Coaxial Cable
14. The U.S. federal program to provide healthcare for certain low-income individual and families.
Home Healthcare
Meaningful Use
Trojan Horse
Medicaid
15. A TCP/IP utility used to verity the network connectivity of a computer.
Controlled substance
Ping
Code Blue
Remote Access
16. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
Secure File Transfer Protocol
Privacy Rule
Router
CIA Triad(Confidentiality - Integrity - Availability)
17. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
802.11a
Logical Security
WEP (Wired Equivalency Protocol)
Preceptor
18. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Serial Connection
SSL (Secure Sockets Layer)
LEAP (Lightweight Extensible Authentication Protocol)
Server Utilization
19. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Spam
Scope of Practice
Sensitivity Label
CPT (Current Procedural Terminology)
20. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Secure File Transfer Protocol
Confidentiality
Custodian
e-Prescribing
21. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.
SATA Connection
E/M Codes (Evaluation and Management Codes)
IM (Instant Messaging)
Barcode Scanner
22. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Switch
TKIP (Temporary Key Integrity Protocol)
Degaussing
SATA Connection
23. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
WTLS (Wireless Transport Layer Security)
L2TP (Layer Two Tunneling Protocol)
Firewall
Eligible Provider
24. A family of specification developed by the IEEE for wireless LAN technology.
Procedure Room
802.11
CCHIT(Certification Commission for Health Information Technology)
SQL (Structured Query Language)
25. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
ED (Emergency Department)
IaaS (Infrastructure as a Service)
Fire Suppression
Internet Modem
26. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
Software Patch
Display Devices
802.11b
Level I Trauma Center
27. The official ANSI term for IDE drives.
ATA (Advanced Technology Attachment)
Schedule II Controlled Substance
ONC (Office of the National Coordinator)
Urgent Care Facility
28. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
Imaging Center
Procedure Room
ARP(Address Resolution Protocol)
Barcode Scanner
29. Mechanism that are put in place to limit access to electronic health information.
File Server
Medical Record Controls
Procedure Room
Serial Connection
30. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
Medical Interfaces
PHP
Code Blue
Degaussing
31. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
Eligible Provider
802.11b
ROI Department
RDP (Remote Desktop Protocol)
32. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
PHR (Personal Health Record)
Certified EHR System
Imaging Center
HTTPS (Hypertext Transfer Protocol Secure)
33. Any medical treatment or services provided on an outpatient basis.
IDF (International Distribution Frame)
mbulatory care
Private Practice
Twisted Pair
34. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec
ARP Poisoning
HTTPS (Hypertext Transfer Protocol Secure)
Virus
Phishing
35. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
LEAP (Lightweight Extensible Authentication Protocol)
Data Sanitation
Custodian
Physical Security
36. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's
Document Scanner
DC (Domain Controller)
IV Attack
HDD (Hard Disk Drive)
37. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
ad hoc
Billing Clearinghouse
Main Frame
Superbill
38. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
RADIUS
Short-stay Facility
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
CCR (Continuity of Care Record)
39. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.
Preceptor
E/M Codes (Evaluation and Management Codes)
EHR (Electronic Health Record)
Bedside Medication Verification
40. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
WHO
IM (Instant Messaging)
Schedule V Controlled Substance
CMS (Centers for Medicare and Medicaid Services)
41. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Parallel Connection
Biometrics
Hoax
OCR (Optical Character Recognition)
42. Software as a Service - A method that uses the cloud to provide application services to users.
SaaS
API (Application Programming Interface)
Fiber
Medical Coding
43. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
P2P
Proxy Server
ARRA (American Recovery and Reinvestment Act
External Devices
44. A method used to remove any sensitive data from a mobile device and permanently delete it.
Database Server
Data Wiping
Outpatient Treatment
Port Scanning
45. A server that is primarily used to share - store - and access files.
Keyfob
Custodian
SLA
File Server
46. An area where all medical imaging procedures are conducted.
SSL (Secure Sockets Layer)
Final Rule
Imaging Center
Stat
47. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
NIST (National Institute of Standards and Technology)
Schedule IV Controlled Substance
Level IV Trauma Center
WTLS (Wireless Transport Layer Security)
48. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Medicare
Schedule III Controlled Substance
Phishing
IV (Initialization Vector)
49. Systems that store networking hardware and provide networking services to local area networks within a medical environment.
BAA (Business Associate Agreement)
IDF (International Distribution Frame)
P2P
Trojan Horse
50. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
ARP(Address Resolution Protocol)
OCR (Optical Character Recognition)
ICMP (Internet Control Message Protocol)
IV Attack