SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
Camera
FTP (File Transfer Protocol)
Rogue Access Point
e-Prescribing
2. A method used to securely remove data from hard drives and other electronic storage devices.
Fiber
PCP Primary Care Physician
Spam
Secure Shredding
3. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Social Engineering Attack
Long-stay Facility
ED (Emergency Department)
Centralized
4. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
NAC (Network Access Control)
IV (Initialization Vector)
Long-stay Facility
HDD (Hard Disk Drive)
5. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Bluesnarfing
Acuity
Site Survey
PCP Primary Care Physician
6. A LAN implementation in which nodes use a wireless network card to connect to other stations.
LAN (Local Area Network)
Fax Server
Mantrap
ASP (Active Server Pages)
7. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
SaaS
EAP (Extensible Authentication Protocol)
Server Utilization
Internet Modem
8. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Medicaid
Bluejacking
PHP
Degaussing
9. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
FDA (Food and Drug Administration)
Server Load
Superbill
Email
10. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
Formulary Checking
Public Hospital
P2P
Long-stay Facility
11. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Covered Entity
Level I Trauma Center
Structured Data
Physical Security
12. Electronic messages sent between users or groups.
SSH
Database Server
Email
Secure File Transfer Protocol
13. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
MDF (Main Distribution Frame)
Host Computer
Confidentiality
Application Server
14. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Main Frame
Imaging
Hoax
Secure File Transfer Protocol
15. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Server Load
Sniffing
IV Attack
Centralized
16. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
P2P
Outpatient Treatment
Physical Security
adware
17. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.
HTTPS (Hypertext Transfer Protocol Secure)
Daily Backup
CMS (Centers for Medicare and Medicaid Services)
Fiber
18. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Scope of Practice
Imaging
PCP Primary Care Physician
CPT (Current Procedural Terminology)
19. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
MDF (Main Distribution Frame)
Print Server
HHS (U.S. Department of Health and Human Services)
SSL (Secure Sockets Layer)
20. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Barcode Scanner
Tracking and Auditing Software
PPTP (Point-to-Point Tunneling Protocol)
Packet Sniffing
21. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
Data Sanitation
Tape Drive
DC (Domain Controller)
Card/Badge Scanner
22. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
Physical Security Controls
HTTPS (Hypertext Transfer Protocol Secure)
Nursing Home
Application Server
23. A device that connects multiple network that use the same protocol.
Tracert
Router
Formulary Checking
E/M Codes (Evaluation and Management Codes)
24. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
EMI (Electromagnetic Interference)
Recover Room
Medication Reconciliation
Bluesnarfing
25. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
PPP (Point-to-Point Protocol)
MDF (Main Distribution Frame)
PEAP
Inpatient Treatment
26. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Hardware Attack
ASP (Active Server Pages)
Scheduling Software
WAN (Wide Area Network )
27. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
Archive Flag
IV (Initialization Vector)
RADIUS
HIPAA (Health Insurance Portability and Accountability Act)
28. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
Parallel Connection
NDC ID (National Drug Code Identification)
Short-stay Facility
BAA (Business Associate Agreement)
29. An area where all medical imaging procedures are conducted.
Host Computer
Surgical Center
Schedule III Controlled Substance
Imaging Center
30. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
Home Healthcare
Stat
802.11b
Public Hospital
31. Cisco Systems' proprietary EAP implementation.
Trojan Horse
LEAP (Lightweight Extensible Authentication Protocol)
IM (Instant Messaging)
SSH
32. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's
Cloud Computing
Tracking and Auditing Software
DC (Domain Controller)
Preceptor
33. A system that extinguishes fire using special gases.
Trauma Center
PGP
Fire Suppression
IV (Initialization Vector)
34. Unwanted software that collects personal user data from a system and transmits it to a third party.
Custodian
Covered Entity
ISP (Internet Service Provider)
Spyware
35. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
Float Room
War Driving
Physical Security
Level I Trauma Center
36. A server that proves the most accurate actual time to all clients in a computer network.
Time Server
Imaging Center
Procedure Room
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
37. An implementation in which voice signals are transmitter over IP networks.
VoIP (Voice over IP)
Twisted Pair
Time Server
MDF (Main Distribution Frame)
38. A device that provides network connectivity capabilities for computer systems.
FTP (File Transfer Protocol)
ad hoc
NIC (Network Interface Card )
Scheduling Software
39. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
NAC (Network Access Control)
Billing and Coding Software
HHS (U.S. Department of Health and Human Services)
Full Backup
40. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Physical Security Controls
Public Health Record
Parallel Connection
Schedule V Controlled Substance
41. A file property that essentially indicates whether the file has been modified since the last back up.
Physical Security Controls
Surgical Center
Archive Flag
Acuity
42. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
Parallel Tracking Software
Level V Trauma Center
TTL
Permission
43. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
Scope of Practice
Wireless Security
CPOE (Computerized Physician Order Entry)
ISP (Internet Service Provider)
44. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
HITECH Health Information Technology for Economic and Clinical Health Act)
Full Backup
Schedule II Controlled Substance
RDP (Remote Desktop Protocol)
45. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
DoS (Denial of Service attack)
Short-stay Facility
DDoS (Distributed Denial of Service)
Virtualization
46. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
Parallel Connection
Billing Clearinghouse
Server Utilization
War Chalking
47. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
Hardware Attack
Short-stay Facility
Server Load
Medication Reconciliation
48. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
Meaningful Use
Outpatient Treatment
Drone
Hospice Care
49. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Code Blue
PHI
FDA (Food and Drug Administration)
Medical Coding
50. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
VoIP (Voice over IP)
Wireless Security
Eligible Provider
Rogue Access Point