SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.
Controlled substance
The Joint Commission
Cloud Computing
Systems Administrator
2. A protocol that provides VPN functionality.
VPN Protocol
ipconfig
IV Attack
OCR (Optical Character Recognition)
3. A programming and query language common to many large scale database systems.
TKIP (Temporary Key Integrity Protocol)
SQL (Structured Query Language)
LAN (Local Area Network)
ROI Department
4. A private network that is configured within a public network such as the Internet.
802.11n
PACS
VPN (Virtual Private Network)
Secure Shredding
5. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.
Isolation Room
VPN Protocol
PGP
Interference
6. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Virus
Urgent Care Facility
Spam
PEAP
7. A method used to securely remove data from hard drives and other electronic storage devices.
DHCP (Dynamic Host Control Protocol)
Secure Shredding
Superbill
Strong Password
8. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
Packet Sniffing
Transitive Access
Parallel Connection
Privacy Rule
9. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Integrity
BAA (Business Associate Agreement)
Remote Access
Server Utilization
10. A device that has multiple network ports and combines multiple physical network segments into a single logical network.
Logic Bomb
Custodian
L2TP (Layer Two Tunneling Protocol)
Switch
11. An area where all medical imaging procedures are conducted.
Meaningful Use
Imaging Center
Mantrap
Liability Waiver
12. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
PGP
Break Glass Access
PaaS
Social Engineering Attack
13. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
LEAP (Lightweight Extensible Authentication Protocol)
Level II Trauma Center
Bluesnarfing
SSL (Secure Sockets Layer)
14. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
DNS Server
PGP
Break Glass Access
Serial Connection
15. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Barcode Scanner
Document Scanner
Time Server
Encryption
16. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
Continuing Care Facility
Signature Pads
HITECH Health Information Technology for Economic and Clinical Health Act)
Change Management
17. A LAN implementation in which nodes use a wireless network card to connect to other stations.
Document Imaging
L2TP (Layer Two Tunneling Protocol)
Degaussing
LAN (Local Area Network)
18. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
PPP (Point-to-Point Protocol)
Physical Security Controls
WAN (Wide Area Network )
Ping
19. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.
PPP (Point-to-Point Protocol)
ISP (Internet Service Provider)
LAN (Local Area Network)
ARP Poisoning
20. A private room where a patient is examined and diagnosed by a medical practitioner.
PHP
Examination Room
Document Imaging
Schedule V Controlled Substance
21. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
Desktop Support
SATA Connection
FDA (Food and Drug Administration)
Site Survey
22. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
CCR (Continuity of Care Record)
CMS (Centers for Medicare and Medicaid Services)
CPT (Current Procedural Terminology)
Bluesnarfing
23. The U.S. federal program to provide healthcare for certain low-income individual and families.
Level III Trauma Center
Medicaid
Fire Suppression
Physical Security Controls
24. Unwanted software that collects personal user data from a system and transmits it to a third party.
Document Imaging
Spyware
USB Connection
IV Attack
25. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
Procedure Room
L2TP (Layer Two Tunneling Protocol)
FTP Server
Firewall
26. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
ARP(Address Resolution Protocol)
PGP
WTLS (Wireless Transport Layer Security)
Spam
27. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
Encryption
Protected Health Information
Mantrap
Inpatient Treatment
28. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
Home Healthcare
Human Interface Devices
LAN (Local Area Network)
Bluejacking
29. Systems that store networking hardware and provide networking services to local area networks within a medical environment.
Assisted Living Facility
Specialized Hospital
Imaging Center
IDF (International Distribution Frame)
30. A type of network that is established spontaneously through a peer-to-peer wireless connection.
ad hoc
Trojan Horse
PaaS
Scheduling Software
31. The official ANSI term for IDE drives.
ATA (Advanced Technology Attachment)
DNS (Domain Name System)
MOU (Memorandum of Understanding)
Imaging Center
32. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
FireWire Connection
SNOMED CT
Code Blue
Daily Backup
33. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
Internet Modem
adware
DNS Server
File Server
34. A device that distributes and manages print jobs sent from client computers.
Level III Trauma Center
Print Server
Secure Shredding
SCSI (Small Computer Systems Interface)
35. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
WTLS (Wireless Transport Layer Security)
SATA Connection
Encryption
Change Management
36. The role - department - or individual that is formally responsible for a health record.
SSL (Secure Sockets Layer)
The Joint Commission
Custodian
Print Server
37. Cisco Systems' proprietary EAP implementation.
Flash
External Devices
LEAP (Lightweight Extensible Authentication Protocol)
Specialized Hospital
38. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
E/M Codes (Evaluation and Management Codes)
Treatment Team
ONC (Office of the National Coordinator)
ISP (Internet Service Provider)
39. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Change Management
Document Imaging
Software Patch
Formulary Checking
40. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Medical Interfaces
PHR (Personal Health Record)
Bedside Medication Verification
Card/Badge Scanner
41. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
Logical Access Control
Tracking and Auditing Software
Parallel Tracking Software
e-Prescribing
42. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.
Email
The Joint Commission
Confidentiality
Document Imaging
43. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
PaaS
DHCP Server
File Server
Database Server
44. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
API (Application Programming Interface)
Public Hospital
DC (Domain Controller)
Hospice Care
45. Personal computer components that enable users to enter data or instructions into a computer.
Desktop Support
Bedside Medication Verification
Input Devices
PPP (Point-to-Point Protocol)
46. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
Internet Modem
SATA Connection
Meaningful Use
Card/Badge Scanner
47. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
RDP (Remote Desktop Protocol)
CPT (Current Procedural Terminology)
Public Health Record
PHR (Personal Health Record)
48. A device that provides network connectivity capabilities for computer systems.
NIC (Network Interface Card )
RDP (Remote Desktop Protocol)
Privacy Rule
Schedule V Controlled Substance
49. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Long-stay Facility
Incremental Backup
Strong Password
Legal Health Record
50. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
Long-stay Facility
Schedule II Controlled Substance
Bluetooth
SATA Connection