SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
IaaS (Infrastructure as a Service)
PCP Primary Care Physician
War Chalking
Metadata
2. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
DHCP Server
Print Server
DoS (Denial of Service attack)
IDS (Intrusion Detection System)
3. A private room where a patient is examined and diagnosed by a medical practitioner.
Mixed Mode
FTP (File Transfer Protocol)
Imaging Center
Examination Room
4. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
Bluetooth
PCP Primary Care Physician
Liability Waiver
Software Hotfix
5. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Security Policy
Secure File Transfer Protocol
SaaS
PGP
6. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
802.11g
Transitive Access
Fire Suppression
Fax Server
7. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
HDD (Hard Disk Drive)
SATA Connection
Sensitivity Label
8. A system that extinguishes fire using special gases.
Fire Suppression
Eavesdropping
Intermediate Care facility
Router
9. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Assisted Living Facility
DC (Domain Controller)
Port Scanning
DNS Server
10. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
Schedule IV Controlled Substance
Level IV Trauma Center
Stat
CPT (Current Procedural Terminology)
11. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
Fax Server
Intermediate Care facility
Time Server
WTLS (Wireless Transport Layer Security)
12. A personal computer storage device that stores data magnetically on a removable tape.
HDD (Hard Disk Drive)
PHP
IEEE (Institute of Electrical and Electronic Engineers)
Tape Drive
13. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Tape Drive
Confidentiality
Flash
802.11g
14. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
Schedule III Controlled Substance
Eligible Provider
PPP (Point-to-Point Protocol)
Transitive Access
15. A hospital specialized to treat a specific disease or condition or a specific type of patient.
Specialized Hospital
Hospice Care
Network Administrator
IDS (Intrusion Detection System)
16. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
NIC (Network Interface Card )
For-Profit Hospital
Replay
Bluesnarfing
17. A device that provides network connectivity capabilities for computer systems.
Firewall
Fax Server
SLA
NIC (Network Interface Card )
18. A security protocol that uses certificates for authentication and encryption to protect web communication.
Man-in-the-middle
SSL (Secure Sockets Layer)
802.11i
Treatment Team
19. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
Continuing Care Facility
Database Server
OR (Operating Room)
PATA Connection
20. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
Document Imaging
Transitive Access
WTLS (Wireless Transport Layer Security)
WEP (Wired Equivalency Protocol)
21. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
Bluejacking
Systems Administrator
Short-stay Facility
Bluetooth
22. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Pharming
Meaningful Use
Document Imaging
MOU (Memorandum of Understanding)
23. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Schedule IV Controlled Substance
Port Scanning
CCD(Continuity of Care Document)
USB Connection
24. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Non-profit Hospital
Acuity
Superbill
25. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
Replay
Medical Interfaces
PEAP
Barcode Scanner
26. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
Secure Chat
IV Attack
FireWire Connection
OCR (Optical Character Recognition)
27. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
Print Server
SLA
IEEE (Institute of Electrical and Electronic Engineers)
802.11b
28. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.
Site Survey
Degaussing
Signature Pads
Server Utilization
29. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
Wireless Security
Bedside Medication Verification
Mantrap
L2TP (Layer Two Tunneling Protocol)
30. A server that contains at least one DHCP scope.
DHCP Server
Medicaid
NIC (Network Interface Card )
Metadata
31. An EHR system that had been certified by ONC
CPOE (Computerized Physician Order Entry)
Session Hijacking
Certified EHR System
SSL (Secure Sockets Layer)
32. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
PaaS
Human Interface Devices
Meaningful Use
Firewall
33. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Drug Allergy
Logical Access Control
Switch
Hospice Care
34. Data that fits into a well-defined data model.
SLA
Trauma Center
Outpatient Treatment
Structured Data
35. A method used to remove any sensitive data from a mobile device and permanently delete it.
Billing and Coding Software
Level III Trauma Center
Data Wiping
WAN (Wide Area Network )
36. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Bedside Medication Verification
SSL (Secure Sockets Layer)
Display Devices
NDC ID (National Drug Code Identification)
37. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's
ASP (Active Server Pages)
DC (Domain Controller)
LAN (Local Area Network)
Billing Clearinghouse
38. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
Private Health Insurers
Non-profit Hospital
Router
Schedule III Controlled Substance
39. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
WAN (Wide Area Network )
Private Practice
Sensitivity Label
Coaxial Cable
40. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.
Intermediate Care facility
PEAP
SNOMED CT
Virtualization
41. A device used for patient billing to capture an electronic signature.
Server Load
Certified EHR System
802.11b
Signature Pads
42. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Private Practice
Card/Badge Scanner
Superbill
Schedule V Controlled Substance
43. A VPN protocol that is an extension of the PPP remote access protocol.
PPTP (Point-to-Point Tunneling Protocol)
SNOMED CT
Formulary Checking
PATA Connection
44. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
PGP
Private Practice
Remote Access
HTTPS (Hypertext Transfer Protocol Secure)
45. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
Data Sanitation
Medication Reconciliation
ipconfig
Mantrap
46. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
SSTP (Secure Socket Tunneling Protocol)
Bluesnarfing
Session Hijacking
Level V Trauma Center
47. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.
802.11a
HITECH Health Information Technology for Economic and Clinical Health Act)
Camera
Card/Badge Scanner
48. A personal computer storage device that uses fixed media and magnetic data storage.
Billing and Coding Software
HDD (Hard Disk Drive)
Code Blue
Urgent Care Facility
49. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Parallel Connection
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
BAA (Business Associate Agreement)
RFP (Request for Proposal)
50. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Long-stay Facility
Formulary Checking
SSH
ED (Emergency Department)