SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
Public Health Record
L2TP (Layer Two Tunneling Protocol)
Logical Security
Public Hospital
2. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
Keyfob
Card/Badge Scanner
Specialized Hospital
P2P
3. An AES cipher-based encryption protocol used in WPA2.
SaaS
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
SSL (Secure Sockets Layer)
SATA Connection
4. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.
SATA Connection
National Drug Code Directory
DC (Domain Controller)
Public Hospital
5. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.
PEAP
PHP
802.11g
Intermediate Care facility
6. Unwanted software that collects personal user data from a system and transmits it to a third party.
PEAP
Eavesdropping
Trauma Center
Spyware
7. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
e-Prescribing
TCP/IP (Transmission Control Protocol/ Internet Protocol)
HTML (Hypertext Markup Language)
PPTP (Point-to-Point Tunneling Protocol)
8. A physical security control system that has a door at each end of a secure chamber.
Mantrap
Billing Clearinghouse
Spyware
DHCP Server
9. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Short-stay Facility
PEAP
Barcode Scanner
Software Update
10. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
For-Profit Hospital
NIC (Network Interface Card )
Stat
11. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.
Billing Clearinghouse
ED (Emergency Department)
Proxy Server
Systems Administrator
12. A backup that backs up all selected files regardless of the state of the archived bit.
Liability
Private Health Record
ipconfig
Full Backup
13. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
CIA Triad(Confidentiality - Integrity - Availability)
Session Hijacking
Medical Coding
Network Administrator
14. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Medicare
Fire Suppression
Card/Badge Scanner
SSH
15. Data that fits into a well-defined data model.
Structured Data
USB Connection
Data Sanitation
Replay
16. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
ARP Poisoning
IV Attack
NIST (National Institute of Standards and Technology)
PACS
17. A backup that backs up all selected files on a daily basis.
Degaussing
Daily Backup
Software Update
Medical Record Controls
18. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
Parallel Connection
Social Engineering Attack
adware
MDF (Main Distribution Frame)
19. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
Ping
Assisted Living Facility
Desktop Support
Protected Health Information
20. A server that is primarily used to share - store - and access files.
Security Rule
Full Backup
Protected Health Information
File Server
21. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
SSH
Meaningful Use
Storage Server
Differential Backup
22. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Application Server
ISP (Internet Service Provider)
Public Health Record
Permission
23. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
LEAP (Lightweight Extensible Authentication Protocol)
Camera
CPOE (Computerized Physician Order Entry)
Trojan Horse
24. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
General/Community Hospital
RADIUS
War Chalking
CCR (Continuity of Care Record)
25. Mechanism that are put in place to limit access to electronic health information.
Trojan Horse
Print Server
Examination Room
Medical Record Controls
26. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
Hardware Attack
Time Server
Scheduling Software
VPN Protocol
27. A standard that adds AES security to the 802.11 standard
Certified EHR System
DBA (Database Administrator)
802.11i
Trauma Center
28. A private network that is configured within a public network such as the Internet.
PPTP (Point-to-Point Tunneling Protocol)
VPN (Virtual Private Network)
Private Health Record
Imaging Center
29. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
CIA Triad(Confidentiality - Integrity - Availability)
802.11n
Remote Access
ARRA (American Recovery and Reinvestment Act
30. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
Optical Disk
VPN (Virtual Private Network)
Encryption
Inpatient Treatment
31. The fundamental security goal of ensuring that electronic data is not altered or tampered with.
Parallel Tracking Software
Software Hotfix
Integrity
IDS (Intrusion Detection System)
32. The role - department - or individual that is formally responsible for a health record.
Daily Backup
Custodian
Solid State Storage
Legal Health Record
33. A network that displays characteristics of more than one of the three standard network models.
Remote Access
ISP (Internet Service Provider)
Mixed Mode
Break Glass Access
34. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
HTTPS (Hypertext Transfer Protocol Secure)
MOU (Memorandum of Understanding)
lient-Server
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
35. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
Software Patch
Card/Badge Scanner
Hospice Care
FireWire Connection
36. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
ATA (Advanced Technology Attachment)
Tape Drive
Drone
Camera
37. A security designation that determines the clearance for an information zone within the EHR system.
PATA Connection
Structured Data
Sensitivity Label
ATA (Advanced Technology Attachment)
38. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
DDoS (Distributed Denial of Service)
DRP (Disaster Recovery Plan)
DNS Server
SQL (Structured Query Language)
39. A personal computer storage decide that stores data optically - rather than magnetically.
Fiber
PPP (Point-to-Point Protocol)
Optical Disk
Switch
40. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Spyware
Zombie
Tracking and Auditing Software
IEEE (Institute of Electrical and Electronic Engineers)
41. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
SSL (Secure Sockets Layer)
Rogue Access Point
Cloud Computing
Fiber
42. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
Stat
FTP Server
DBA (Database Administrator)
Pharming
43. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.
Card/Badge Scanner
HIPAA (Health Insurance Portability and Accountability Act)
Schedule II Controlled Substance
Fiber
44. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
Home Healthcare
e-Prescribing
Liability
HDD (Hard Disk Drive)
45. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
TTL
Parallel Connection
WEP (Wired Equivalency Protocol)
802.11n
46. A LAN implementation in which nodes use a wireless network card to connect to other stations.
PPP (Point-to-Point Protocol)
Inpatient Treatment
Document Scanner
LAN (Local Area Network)
47. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.
Surgical Center
PAN (Personal Area Network)
Code Blue
External Devices
48. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
WEP (Wired Equivalency Protocol)
ATA (Advanced Technology Attachment)
SaaS
FTP Server
49. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
Secure Chat
Print Server
IM (Instant Messaging)
Isolation Room
50. A protocol used to connect to and access a remote computer.
Secure Shredding
RDP (Remote Desktop Protocol)
Non-profit Hospital
Web Server