SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
OCR (Optical Character Recognition)
SQL (Structured Query Language)
Barcode Scanner
PHR (Personal Health Record)
2. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Long-stay Facility
802.11
Level III Trauma Center
NDC ID (National Drug Code Identification)
3. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
Physical Security Controls
ASP (Active Server Pages)
Differential Backup
External Devices
4. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
Proxy Server
Data Wiping
Biometrics
Recover Room
5. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
SNOMED CT
OR (Operating Room)
PATA Connection
Billing Clearinghouse
6. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
NIST (National Institute of Standards and Technology)
Nursing Home
DRP (Disaster Recovery Plan)
Application Server
7. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Proxy Server
API (Application Programming Interface)
Level II Trauma Center
Switch
8. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Full Backup
Confidentiality
Man-in-the-middle
Logical Security
9. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
CCD(Continuity of Care Document)
Degaussing
Acuity
FDA (Food and Drug Administration)
10. Hardware components that enable users to interact with computers.
Privacy Rule
Human Interface Devices
Isolation Room
Optical Disk
11. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
Differential Backup
802.1x
Software Patch
Medication Reconciliation
12. A device that has multiple network ports and combines multiple physical network segments into a single logical network.
Switch
Confidentiality
RADIUS
Bluetooth
13. A security protocol that uses certificates for authentication and encryption to protect web communication.
Biometrics
HDD (Hard Disk Drive)
WEP (Wired Equivalency Protocol)
SSL (Secure Sockets Layer)
14. An EHR system that had been certified by ONC
Flash
Certified EHR System
Medication Reconciliation
antivirus software
15. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
Pharming
Schedule IV Controlled Substance
802.11g
Fax Server
16. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Assisted Living Facility
PHI
Break Glass Access
Teaching Hospital
17. A server that displays web pages to clients.
Web Server
Virtualization
Schedule V Controlled Substance
Flash
18. A personal computer storage device that stores data magnetically on a removable tape.
IV Attack
CCR (Continuity of Care Record)
Daily Backup
Tape Drive
19. The amount of work a server performs on a regular basis.
Server Load
DDoS (Distributed Denial of Service)
Barcode Scanner
Level IV Trauma Center
20. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
Man-in-the-middle
FTP Server
Home Healthcare
e-Prescribing
21. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
Full Backup
ARRA (American Recovery and Reinvestment Act
Medical Coding
Tracking and Auditing Software
22. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Firewall
Physical Security Controls
ONC (Office of the National Coordinator)
Private Practice
23. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
Logical Security
Acuity
Transitive Access
PEAP
24. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
Biometrics
DBA (Database Administrator)
Man-in-the-middle
Network Administrator
25. The official record that an organization would release if requested.
Billing and Coding Software
Logic Bomb
Legal Health Record
VoIP (Voice over IP)
26. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
LAN (Local Area Network)
Schedule I Controlled Substance
HL7
Code Blue
27. A backup that backs up all selected files regardless of the state of the archived bit.
802.1x
Full Backup
Display Devices
ARRA (American Recovery and Reinvestment Act
28. A device used to convert paper to electronic format and then associates the file with the proper patient.
Document Scanner
SQL (Structured Query Language)
API (Application Programming Interface)
Private Practice
29. A utility used to determine the route data takes to get to a particular destination.
Tracert
WEP (Wired Equivalency Protocol)
HIPAA (Health Insurance Portability and Accountability Act)
RADIUS
30. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
Preceptor
Recover Room
ARP(Address Resolution Protocol)
Coaxial Cable
31. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
Security Policy
Long-stay Facility
Social Engineering Attack
PGP
32. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.
Secure File Transfer Protocol
Fiber
Long-stay Facility
SSH
33. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Level III Trauma Center
Full Backup
OR (Operating Room)
NIST (National Institute of Standards and Technology)
34. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Break Glass Access
Bedside Medication Verification
Physical Security Controls
Mantrap
35. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
Desktop Support
HIPAA (Health Insurance Portability and Accountability Act)
Drone
Parallel Tracking Software
36. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Strong Password
Interference
DNS Server
Level V Trauma Center
37. The U.S. Agency charged with protecting the health of the population and providing various human services.
HHS (U.S. Department of Health and Human Services)
Imaging
HIPAA (Health Insurance Portability and Accountability Act)
Recover Room
38. A security protocol created by the IEEE task group to replace WEP.
Practice Management Software
TKIP (Temporary Key Integrity Protocol)
Liability
ICMP (Internet Control Message Protocol)
39. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Integrity
Internet Modem
Fax Server
mbulatory care
40. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.
Break Glass Access
EMI (Electromagnetic Interference)
Recover Room
Urgent Care Facility
41. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
Packet Sniffing
WTLS (Wireless Transport Layer Security)
Drone
Billing and Coding Software
42. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
Medicaid
VPN Protocol
antivirus software
Biometrics
43. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Secure File Transfer Protocol
Treatment Team
Outpatient Treatment
EMI (Electromagnetic Interference)
44. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
NIST (National Institute of Standards and Technology)
ONC (Office of the National Coordinator)
Wireless Security
ROI Department
45. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Break Glass Access
802.11n
Float Room
46. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'
DDoS (Distributed Denial of Service)
802.11n
SCSI (Small Computer Systems Interface)
AP (Access Points)
47. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Specialized Hospital
Level I Trauma Center
OCR (Optical Character Recognition)
Pharming
48. A facility equipped to treat patients suffering traumatic injuries.
PAN (Personal Area Network)
Trauma Center
Acuity
Mantrap
49. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
Schedule V Controlled Substance
Systems Administrator
Rogue Access Point
PPP (Point-to-Point Protocol)
50. A method used to securely remove data from hard drives and other electronic storage devices.
SATA Connection
FDA (Food and Drug Administration)
Secure Shredding
SNOMED CT