SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
Spyware
Optical Disk
PCP Primary Care Physician
Software Update
2. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Hardware Attack
HTML (Hypertext Markup Language)
Treatment Team
WAN (Wide Area Network )
3. A personal computer storage device that stores data magnetically on a removable tape.
Man-in-the-middle
HTML (Hypertext Markup Language)
Serial Connection
Tape Drive
4. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
Logical Access Control
Serial Connection
ED (Emergency Department)
Scheduling Software
5. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Degaussing
Encryption
Sniffing
Hoax
6. A family of specification developed by the IEEE for wireless LAN technology.
Parallel Tracking Software
AP (Access Points)
802.11
Desktop Support
7. A hospital specialized to treat a specific disease or condition or a specific type of patient.
Full Backup
Systems Administrator
VPN (Virtual Private Network)
Specialized Hospital
8. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Level III Trauma Center
Router
Confidentiality
VPN (Virtual Private Network)
9. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
DHCP (Dynamic Host Control Protocol)
Drug Allergy
National Drug Code Directory
ASP (Active Server Pages)
10. A widely adopted markup language used in many documents - websites - and web applications.
Public Hospital
USB
PaaS
XML (EXtensible Markup Language)
11. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
Signature Pads
Desktop Support
ASP (Active Server Pages)
Rogue Access Point
12. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.
Social Engineering Attack
Practice Management Software
Phishing
Schedule IV Controlled Substance
13. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
FTP Server
Strong Password
Non-profit Hospital
RADIUS
14. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Security Rule
Assisted Living Facility
Eavesdropping
Structured Data
15. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
ATA (Advanced Technology Attachment)
DRP (Disaster Recovery Plan)
802.11g
Storage Server
16. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
Mixed Mode
SSL (Secure Sockets Layer)
IDS (Intrusion Detection System)
Float Room
17. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
lient-Server
Private Health Insurers
Replay
Barcode Scanner
18. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
Hospice Care
OCR (Optical Character Recognition)
EHR (Electronic Health Record)
Level III Trauma Center
19. Any medical treatment or services provided on an outpatient basis.
mbulatory care
adware
Keyfob
Barcode Scanner
20. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.
Liability Waiver
TTL
Fiber
EAP (Extensible Authentication Protocol)
21. Electronic messages sent between users or groups.
Liability
Ping
Email
Medical Coding
22. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
TTL
RFP (Request for Proposal)
Differential Backup
Port Scanning
23. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
Logical Access Control
War Driving
WTLS (Wireless Transport Layer Security)
DHCP (Dynamic Host Control Protocol)
24. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
802.11i
Drone
Document Scanner
Server Utilization
25. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
PACS
OCR (Optical Character Recognition)
Short-stay Facility
USB
26. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
ROI Department
Privacy Rule
Medicaid
PPTP (Point-to-Point Tunneling Protocol)
27. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Trauma Center
Covered Entity
Virus
Switch
28. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Wireless Security
Firewall
Secure File Transfer Protocol
DDoS (Distributed Denial of Service)
29. A Specialized file server that is designed and dedicated to support only data storage needs.
HHS (U.S. Department of Health and Human Services)
Level III Trauma Center
Fax Printer
NAS (Network Attached Storage)
30. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
802.11g
War Chalking
PCP Primary Care Physician
Interference
31. An Instant messaging service that uses strong encryption to send and receive secure messages.
Secure Chat
SQL (Structured Query Language)
Meaningful Use
WAN (Wide Area Network )
32. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
Main Frame
Final Rule
Security Rule
IaaS (Infrastructure as a Service)
33. An invitation for vendors to submit a plan and bid for the delivery of a product or service.
Encryption
RFP (Request for Proposal)
Short-stay Facility
Drug Allergy
34. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
CCHIT(Certification Commission for Health Information Technology)
Bluejacking
PHP
Change Management
35. A device used to convert paper to electronic format and then associates the file with the proper patient.
Document Scanner
War Driving
Recover Room
Imaging Center
36. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
Sensitivity Label
DBA (Database Administrator)
802.11g
HHS (U.S. Department of Health and Human Services)
37. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
IEEE (Institute of Electrical and Electronic Engineers)
PHI
Coaxial Cable
Document Scanner
38. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Surgical Center
Daily Backup
ISP (Internet Service Provider)
Data Sanitation
39. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.
FTP (File Transfer Protocol)
PATA Connection
Barcode Scanner
Cloud Computing
40. A formalized statement that defines how security will be implemented within a particular organization.
lient-Server
Bedside Medication Verification
Security Policy
Interference
41. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.
Availability
Medical Coding
CMS (Centers for Medicare and Medicaid Services)
The Joint Commission
42. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
Switch
MDF (Main Distribution Frame)
Change Management
Camera
43. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
National Drug Code Directory
Solid State Storage
DRP (Disaster Recovery Plan)
PHP
44. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Interference
Replay
Permission
Firewall
45. A document that lists agreed upon actions between two parties.
MOU (Memorandum of Understanding)
Billing Clearinghouse
Level IV Trauma Center
Final Rule
46. Personal computer components that enable users to enter data or instructions into a computer.
Replay
Input Devices
Mail Server
Scheduling Software
47. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.
Intermediate Care facility
Preceptor
HTTPS (Hypertext Transfer Protocol Secure)
CPT (Current Procedural Terminology)
48. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
Isolation Room
PHR (Personal Health Record)
Metadata
IM (Instant Messaging)
49. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
ARP Poisoning
Secure Shredding
RHIO (Regional Health Information Organization)
IV (Initialization Vector)
50. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Stat
Worm
DBA (Database Administrator)
Medicare