SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Structured Data
Controlled substance
Sniffing
LAN (Local Area Network)
2. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Medicaid
Medication Reconciliation
PEAP
Level I Trauma Center
3. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Application Server
CCHIT(Certification Commission for Health Information Technology)
Surgical Center
Serial Connection
4. Records that are released for public viewing.
Schedule III Controlled Substance
TTL
Public Health Record
Daily Backup
5. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.
Switch
Phishing
PaaS
Controlled substance
6. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Interference
Schedule IV Controlled Substance
Superbill
Private Health Record
7. Authentication schemes based on individuals' physical characters.
NAS (Network Attached Storage)
Biometrics
Practice Management Software
Schedule II Controlled Substance
8. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
ASP (Active Server Pages)
Schedule V Controlled Substance
Document Scanner
Custodian
9. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
Trojan Horse
ARP Poisoning
HIPAA (Health Insurance Portability and Accountability Act)
Interference
10. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
Router
Medical Interfaces
PCP Primary Care Physician
Network Administrator
11. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
National Drug Code Directory
Twisted Pair
Transitive Access
OCR (Optical Character Recognition)
12. An Instant messaging service that uses strong encryption to send and receive secure messages.
Virtualization
Data Wiping
Level II Trauma Center
Secure Chat
13. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.
Protected Health Information
Medical Record Controls
Cloud Computing
Procedure Room
14. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
Sensitivity Label
802.11g
Fire Suppression
SSTP (Secure Socket Tunneling Protocol)
15. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
Display Devices
adware
XML (EXtensible Markup Language)
IDS (Intrusion Detection System)
16. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
ARP(Address Resolution Protocol)
Mantrap
Formulary Checking
Encryption
17. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
Security Administrator
EMI (Electromagnetic Interference)
Imaging
Degaussing
18. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
PHR (Personal Health Record)
antivirus software
Level V Trauma Center
Email
19. Electronic messages sent between users or groups.
Formulary Checking
Email
IM (Instant Messaging)
ASP (Active Server Pages)
20. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
Logic Bomb
Level V Trauma Center
Cloud Computing
Man-in-the-middle
21. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Drone
Software Update
Non-profit Hospital
VoIP (Voice over IP)
22. A security setting that determines the level of access a user or group account has to be particular resource.
The Joint Commission
Permission
Billing Clearinghouse
Software Update
23. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
Assisted Living Facility
Full Backup
Billing and Coding Software
DRP (Disaster Recovery Plan)
24. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Solid State Storage
Desktop Support
Medicaid
Hardware Attack
25. A private room where a patient is examined and diagnosed by a medical practitioner.
Examination Room
Main Frame
TKIP (Temporary Key Integrity Protocol)
LAN (Local Area Network)
26. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
Secure File Transfer Protocol
OCR (Optical Character Recognition)
War Chalking
Eligible Provider
27. A device that has multiple network ports and combines multiple physical network segments into a single logical network.
Storage Server
PACS
Switch
Medical Coding
28. Software protection systems in an organization.
Logical Security
Physical Security
802.11
IM (Instant Messaging)
29. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Fiber
Eligible Provider
Network Administrator
Proxy Server
30. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Bedside Medication Verification
Medicare
Data Sanitation
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
31. Software as a Service - A method that uses the cloud to provide application services to users.
Pharming
WHO
Tracking and Auditing Software
SaaS
32. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Parallel Connection
Bluejacking
Logic Bomb
ARP Poisoning
33. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
File Server
Medical Interfaces
Stat
802.11i
34. A server that is primarily used to share - store - and access files.
TKIP (Temporary Key Integrity Protocol)
IV Attack
File Server
Rogue Access Point
35. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
Non-profit Hospital
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Tracert
DNS (Domain Name System)
36. Any adverse reaction to a medication being taken.
Optical Disk
adware
802.11n
Drug Allergy
37. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.
ONC (Office of the National Coordinator)
War Driving
Level III Trauma Center
Storage Server
38. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
Hardware Attack
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
FTP Server
Medical Interfaces
39. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
Recover Room
Urgent Care Facility
Level II Trauma Center
Final Rule
40. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
e-Prescribing
Legal Health Record
Integrity
Flash
41. See Host Computer
Input Devices
Main Frame
XML (EXtensible Markup Language)
Desktop Support
42. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
PHP
PaaS
Availability
Optical Disk
43. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Virtualization
Tape Drive
ipconfig
Spam
44. A private network that is configured within a public network such as the Internet.
Input Devices
Centralized
Strong Password
VPN (Virtual Private Network)
45. A utility used to determine the route data takes to get to a particular destination.
Tracert
Public Health Record
Schedule IV Controlled Substance
Virus
46. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
Integrity
Cloud Computing
DDoS (Distributed Denial of Service)
802.11
47. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Transitive Access
DBA (Database Administrator)
Security Administrator
Custodian
48. A company that provides access to the Internet.
PHI
ISP (Internet Service Provider)
Bedside Medication Verification
lient-Server
49. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Treatment Team
DNS (Domain Name System)
Specialized Hospital
Sensitivity Label
50. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Security Policy
Bluejacking
RDP (Remote Desktop Protocol)
HHS (U.S. Department of Health and Human Services)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests