SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The fundamental security goal of ensuring that electronic data is not altered or tampered with.
Incremental Backup
Medical Interfaces
Integrity
Level I Trauma Center
2. An IT role that is responsible for the network infrastructure and components withing an organization.
Schedule IV Controlled Substance
Drug Allergy
Network Administrator
Confidentiality
3. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
Physical Security
Urgent Care Facility
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Router
4. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
Biometrics
IDF (International Distribution Frame)
802.11n
Logical Access Control
5. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
Encryption
Transitive Access
Social Engineering Attack
ROI Department
6. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
DRP (Disaster Recovery Plan)
For-Profit Hospital
Desktop Support
IDS (Intrusion Detection System)
7. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
Mantrap
Sensitivity Label
Float Room
Server Utilization
8. A LAN implementation in which nodes use a wireless network card to connect to other stations.
LAN (Local Area Network)
NIC (Network Interface Card )
Short-stay Facility
Sensitivity Label
9. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.
ASP (Active Server Pages)
Drug Allergy
FTP Server
Schedule I Controlled Substance
10. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
Worm
Zombie
ONC (Office of the National Coordinator)
Intermediate Care facility
11. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
Ping
Medical Interfaces
Trojan Horse
ED (Emergency Department)
12. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Schedule IV Controlled Substance
ARRA (American Recovery and Reinvestment Act
Medical Interfaces
Security Rule
13. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
WEP (Wired Equivalency Protocol)
Legal Health Record
ARRA (American Recovery and Reinvestment Act
14. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Continuing Care Facility
Short-stay Facility
Pharming
BAA (Business Associate Agreement)
15. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Treatment Team
Assisted Living Facility
Scope of Practice
RADIUS
16. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
Systems Administrator
DBA (Database Administrator)
Security Policy
Public Health Record
17. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
HL7
Public Hospital
Mail Server
Human Interface Devices
18. A device used to convert paper to electronic format and then associates the file with the proper patient.
Security Policy
Schedule V Controlled Substance
Social Engineering Attack
Document Scanner
19. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
FTP (File Transfer Protocol)
NDC ID (National Drug Code Identification)
Storage Server
SSH
20. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
Eavesdropping
ARP Poisoning
Eligible Provider
HDD (Hard Disk Drive)
21. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
FDA (Food and Drug Administration)
CCD(Continuity of Care Document)
Data Sanitation
RHIO (Regional Health Information Organization)
22. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
Desktop Support
IV (Initialization Vector)
Main Frame
OCR (Optical Character Recognition)
23. Personal computer components that enable users to enter data or instructions into a computer.
VPN Protocol
ARRA (American Recovery and Reinvestment Act
Continuing Care Facility
Input Devices
24. A server that stores files and programs.
Nursing Home
Proxy Server
Storage Server
PHP
25. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
Private Practice
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
HL7
OR (Operating Room)
26. A personal computer storage device that uses fixed media and magnetic data storage.
SaaS
HDD (Hard Disk Drive)
RHIO (Regional Health Information Organization)
adware
27. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.
Site Survey
PGP
PHI
VoIP (Voice over IP)
28. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Serial Connection
Meaningful Use
PaaS
Ping
29. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
Treatment Team
BAA (Business Associate Agreement)
PACS
Time Server
30. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
Integrity
Serial Connection
OCR (Optical Character Recognition)
Level V Trauma Center
31. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
Proxy Server
Session Hijacking
IM (Instant Messaging)
National Drug Code Directory
32. The ability to connect to systems and services from an offsite or remote location using a remote access method.
AP (Access Points)
HITECH Health Information Technology for Economic and Clinical Health Act)
Card/Badge Scanner
Remote Access
33. The U.S. Agency charged with protecting the health of the population and providing various human services.
Flash
Security Administrator
Time Server
HHS (U.S. Department of Health and Human Services)
34. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
Interference
Secure File Transfer Protocol
Covered Entity
ICMP (Internet Control Message Protocol)
35. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
antivirus software
CCD(Continuity of Care Document)
BAA (Business Associate Agreement)
SNOMED CT
36. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
Meaningful Use
RHIO (Regional Health Information Organization)
LEAP (Lightweight Extensible Authentication Protocol)
Surgical Center
37. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
PHP
Internet Modem
HDD (Hard Disk Drive)
SSH
38. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
Privacy Rule
ARRA (American Recovery and Reinvestment Act
Packet Sniffing
lient-Server
39. The official ANSI term for IDE drives.
ATA (Advanced Technology Attachment)
SLA
Schedule V Controlled Substance
Internet Modem
40. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
Code Blue
Inpatient Treatment
NIC (Network Interface Card )
Secure File Transfer Protocol
41. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
SSTP (Secure Socket Tunneling Protocol)
Permission
SCSI (Small Computer Systems Interface)
Differential Backup
42. Records that are not for public consumption and require appropriate release before they can be shared.
Medical Coding
Medical Record Controls
Private Health Record
Legal Health Record
43. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
ASP (Active Server Pages)
802.11a
Wireless Security
HL7
44. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
The Joint Commission
Home Healthcare
Systems Administrator
For-Profit Hospital
45. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.
Preceptor
Eligible Provider
Procedure Room
Structured Data
46. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
NAS (Network Attached Storage)
Liability
Practice Management Software
Router
47. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
Trojan Horse
PHR (Personal Health Record)
Custodian
Physical Security
48. A physical security control system that has a door at each end of a secure chamber.
EAP (Extensible Authentication Protocol)
ipconfig
Outpatient Treatment
Mantrap
49. An EHR system that had been certified by ONC
Protected Health Information
Firewall
Certified EHR System
Rogue Access Point
50. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
Trojan Horse
lient-Server
ad hoc
Examination Room