SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
PGP
Replay
Biometrics
NIC (Network Interface Card )
2. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Security Administrator
LEAP (Lightweight Extensible Authentication Protocol)
XML (EXtensible Markup Language)
Home Healthcare
3. A portable electronic security token that contains biometric user data - or other identification information.
Keyfob
OCR (Optical Character Recognition)
IaaS (Infrastructure as a Service)
Flash
4. An implementation in which voice signals are transmitter over IP networks.
Practice Management Software
VoIP (Voice over IP)
P2P
Mail Server
5. An invitation for vendors to submit a plan and bid for the delivery of a product or service.
Card/Badge Scanner
802.11i
RFP (Request for Proposal)
Teaching Hospital
6. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
VPN Protocol
Network Administrator
Level II Trauma Center
RADIUS
7. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
Eavesdropping
Internet Modem
NAS (Network Attached Storage)
WTLS (Wireless Transport Layer Security)
8. The management of performance levels of servers to ensure that critical operations are highly available to resources.
CPT (Current Procedural Terminology)
Level II Trauma Center
Server Load
Server Utilization
9. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
EMI (Electromagnetic Interference)
Schedule V Controlled Substance
MDF (Main Distribution Frame)
Optical Disk
10. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
Parallel Tracking Software
IDF (International Distribution Frame)
XML (EXtensible Markup Language)
EAP (Extensible Authentication Protocol)
11. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
Zombie
Parallel Tracking Software
E/M Codes (Evaluation and Management Codes)
SATA Connection
12. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
External Devices
Physical Security Controls
Server Load
Confidentiality
13. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
Metadata
P2P
Procedure Room
Protected Health Information
14. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
Continuing Care Facility
Software Update
Bluetooth
Security Rule
15. A security protocol created by the IEEE task group to replace WEP.
WTLS (Wireless Transport Layer Security)
TKIP (Temporary Key Integrity Protocol)
General/Community Hospital
RFP (Request for Proposal)
16. A programming and query language common to many large scale database systems.
Tape Drive
Degaussing
Privacy Rule
SQL (Structured Query Language)
17. An EHR system that had been certified by ONC
DRP (Disaster Recovery Plan)
Desktop Support
AP (Access Points)
Certified EHR System
18. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
Fax Server
HL7
Physical Security Controls
VoIP (Voice over IP)
19. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Internet Modem
File Server
Custodian
SNOMED CT
20. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Isolation Room
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Eavesdropping
Sensitivity Label
21. An AES cipher-based encryption protocol used in WPA2.
IDF (International Distribution Frame)
Treatment Team
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Biometrics
22. A network attack in which an attacker disables systems that provide network services by consuming a networks link's available bandwidth - consuming a single system's available resources - or exploiting programming flaws in an application or operation
Secure Chat
DoS (Denial of Service attack)
Bluesnarfing
Software Update
23. A private room where a patient is examined and diagnosed by a medical practitioner.
Covered Entity
Hospice Care
Examination Room
Outpatient Treatment
24. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
e-Prescribing
USB
NAC (Network Access Control)
Covered Entity
25. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
Encryption
802.11i
Medical Coding
RDP (Remote Desktop Protocol)
26. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
Virtualization
Sensitivity Label
802.11g
Fax Server
27. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Logical Access Control
Server Utilization
Replay
DNS Server
28. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
Recover Room
Secure Shredding
Tape Drive
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
29. A family of specification developed by the IEEE for wireless LAN technology.
802.11
Acuity
CCR (Continuity of Care Record)
Scope of Practice
30. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
Public Hospital
Liability Waiver
CIA Triad(Confidentiality - Integrity - Availability)
PAN (Personal Area Network)
31. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Bluetooth
SSH
802.11b
32. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
EHR (Electronic Health Record)
Certified EHR System
Zombie
Fax Printer
33. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Port Scanning
SNOMED CT
Application Server
ISP (Internet Service Provider)
34. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
Logical Security
ad hoc
PCP Primary Care Physician
Eavesdropping
35. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec
Virus
802.11i
Confidentiality
Mail Server
36. A security designation that determines the clearance for an information zone within the EHR system.
VoIP (Voice over IP)
HTML (Hypertext Markup Language)
Sensitivity Label
Imaging Center
37. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
Medical Record Controls
Site Survey
DDoS (Distributed Denial of Service)
Systems Administrator
38. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
Float Room
DRP (Disaster Recovery Plan)
Centralized
ROI Department
39. A server that receives email request from hosts on a network - and redirects them to the intended recipient.
DHCP (Dynamic Host Control Protocol)
Mail Server
EMI (Electromagnetic Interference)
Specialized Hospital
40. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Short-stay Facility
TKIP (Temporary Key Integrity Protocol)
BAA (Business Associate Agreement)
Public Health Record
41. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
Applications
HIPAA (Health Insurance Portability and Accountability Act)
Superbill
Sniffing
42. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
HTTPS (Hypertext Transfer Protocol Secure)
Secure File Transfer Protocol
EHR (Electronic Health Record)
Fax Server
43. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.
Formulary Checking
PHI
Specialized Hospital
Server Load
44. A hospital specialized to treat a specific disease or condition or a specific type of patient.
SSL (Secure Sockets Layer)
RFP (Request for Proposal)
Specialized Hospital
Mail Server
45. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
mbulatory care
Network Administrator
Social Engineering Attack
Integrity
46. A security protocol that uses certificates for authentication and encryption to protect web communication.
Biometrics
SSL (Secure Sockets Layer)
Liability Waiver
DBA (Database Administrator)
47. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.
Serial Connection
Level II Trauma Center
Human Interface Devices
Formulary Checking
48. World Health Organization - A division of the United Nations that manages the authority of international public health.
WHO
802.11i
Systems Administrator
HTTPS (Hypertext Transfer Protocol Secure)
49. Mechanism that are put in place to limit access to electronic health information.
Ping
DNS (Domain Name System)
Medical Record Controls
Structured Data
50. The role - department - or individual that is formally responsible for a health record.
NAS (Network Attached Storage)
Fax Server
DHCP Server
Custodian