SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Records that are released for public viewing.
Fax Server
Public Health Record
Server Utilization
Full Backup
2. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
Remote Access
Fax Printer
lient-Server
Server Utilization
3. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.
Imaging Center
Ping
AP (Access Points)
Long-stay Facility
4. An EHR system that had been certified by ONC
Certified EHR System
Router
Schedule IV Controlled Substance
Legal Health Record
5. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Desktop Support
SLA
Public Health Record
Private Practice
6. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
DHCP (Dynamic Host Control Protocol)
PEAP
Daily Backup
Eligible Provider
7. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
Virus
DNS Server
Medical Record Controls
API (Application Programming Interface)
8. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
Software Patch
e-Prescribing
Spam
SNOMED CT
9. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
Proxy Server
ONC (Office of the National Coordinator)
War Chalking
DHCP (Dynamic Host Control Protocol)
10. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.
Worm
The Joint Commission
SATA Connection
Metadata
11. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Differential Backup
Short-stay Facility
Hoax
RADIUS
12. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Firewall
SLA
Legal Health Record
Eavesdropping
13. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
Privacy Rule
Public Hospital
Security Administrator
HL7
14. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
Acuity
TKIP (Temporary Key Integrity Protocol)
EMI (Electromagnetic Interference)
USB Connection
15. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
Medical Record Controls
antivirus software
Social Engineering Attack
Twisted Pair
16. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
Site Survey
UPS
Internet Modem
Proxy Server
17. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.
Interference
Nursing Home
CCHIT(Certification Commission for Health Information Technology)
Storage Server
18. The official record that an organization would release if requested.
IM (Instant Messaging)
Legal Health Record
Inpatient Treatment
MDF (Main Distribution Frame)
19. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Eavesdropping
Security Policy
Break Glass Access
Schedule IV Controlled Substance
20. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
Social Engineering Attack
PGP
Input Devices
Billing and Coding Software
21. A VPN protocol that is an extension of the PPP remote access protocol.
RFP (Request for Proposal)
Switch
PPTP (Point-to-Point Tunneling Protocol)
Structured Data
22. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Imaging
CCR (Continuity of Care Record)
Legal Health Record
Solid State Storage
23. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
PACS
Physical Security Controls
Systems Administrator
War Driving
24. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
XML (EXtensible Markup Language)
Continuing Care Facility
Metadata
Medical Record Controls
25. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
ARP(Address Resolution Protocol)
PHP
Superbill
Time Server
26. A private network that is configured within a public network such as the Internet.
Urgent Care Facility
VPN (Virtual Private Network)
Centralized
Network Administrator
27. A family of specification developed by the IEEE for wireless LAN technology.
FDA (Food and Drug Administration)
802.11
Integrity
Application Server
28. A team of clinicians assigned to work with a specific patient at any given time.
Treatment Team
802.11n
Security Rule
Router
29. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
Certified EHR System
EMI (Electromagnetic Interference)
E/M Codes (Evaluation and Management Codes)
ONC (Office of the National Coordinator)
30. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
ARP(Address Resolution Protocol)
Parallel Tracking Software
Final Rule
Imaging Center
31. An IT role that is responsible for the network infrastructure and components withing an organization.
Network Administrator
DNS (Domain Name System)
Pharming
FTP Server
32. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.
CPOE (Computerized Physician Order Entry)
Card/Badge Scanner
External Devices
802.11a
33. World Health Organization - A division of the United Nations that manages the authority of international public health.
Wireless Security
Biometrics
WHO
PEAP
34. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
Wireless Security
Server Utilization
Drug Allergy
Treatment Team
35. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Teaching Hospital
Eligible Provider
Degaussing
Structured Data
36. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
Router
Encryption
Host Computer
PHP
37. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.
Teaching Hospital
PACS
FireWire Connection
Fiber
38. An area where surgical procedures are performer in a sterile environment.
DDoS (Distributed Denial of Service)
OR (Operating Room)
PaaS
Integrity
39. A device that provides network connectivity capabilities for computer systems.
Intermediate Care facility
Private Health Insurers
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
NIC (Network Interface Card )
40. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
Systems Administrator
Level IV Trauma Center
UPS
RADIUS
41. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
IEEE (Institute of Electrical and Electronic Engineers)
Parallel Connection
Keyfob
Hardware Attack
42. A method used to remove any sensitive data from a mobile device and permanently delete it.
BAA (Business Associate Agreement)
Procedure Room
PCP Primary Care Physician
Data Wiping
43. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
Centralized
Packet Sniffing
802.11b
Inpatient Treatment
44. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
Application Server
Schedule V Controlled Substance
WEP (Wired Equivalency Protocol)
Public Hospital
45. Any adverse reaction to a medication being taken.
Print Server
Drug Allergy
DNS Server
Internet Modem
46. The management of performance levels of servers to ensure that critical operations are highly available to resources.
ARP(Address Resolution Protocol)
Interference
Server Utilization
Availability
47. A residential facility for patients who need constant medical or nursing care and supervision.
EAP (Extensible Authentication Protocol)
EMI (Electromagnetic Interference)
Ping
Nursing Home
48. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
ICMP (Internet Control Message Protocol)
PGP
CPT (Current Procedural Terminology)
Break Glass Access
49. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Pharming
Metadata
LEAP (Lightweight Extensible Authentication Protocol)
Serial Connection
50. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
CIA Triad(Confidentiality - Integrity - Availability)
PHR (Personal Health Record)
L2TP (Layer Two Tunneling Protocol)
Level II Trauma Center