SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Public Hospital
DNS (Domain Name System)
General/Community Hospital
National Drug Code Directory
2. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
Tracking and Auditing Software
Specialized Hospital
VoIP (Voice over IP)
Session Hijacking
3. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
FDA (Food and Drug Administration)
mbulatory care
Outpatient Treatment
CCR (Continuity of Care Record)
4. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.
HIPAA (Health Insurance Portability and Accountability Act)
NIST (National Institute of Standards and Technology)
Inpatient Treatment
Site Survey
5. Personal computer components that enable users to enter data or instructions into a computer.
Flash
Trojan Horse
TKIP (Temporary Key Integrity Protocol)
Input Devices
6. The standard language that defines how web pages are formatted and displayed.
Imaging
Float Room
Software Patch
HTML (Hypertext Markup Language)
7. A software or hardware device that protects a system or network by blocking unwanted network traffic.
ARP(Address Resolution Protocol)
Short-stay Facility
Firewall
Examination Room
8. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
PCP Primary Care Physician
Drone
802.1x
TKIP (Temporary Key Integrity Protocol)
9. An area where surgical procedures are performer in a sterile environment.
Logical Access Control
OR (Operating Room)
Public Hospital
XML (EXtensible Markup Language)
10. A security protocol that uses certificates for authentication and encryption to protect web communication.
Spam
SSL (Secure Sockets Layer)
API (Application Programming Interface)
Private Health Record
11. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
RFP (Request for Proposal)
antivirus software
NDC ID (National Drug Code Identification)
Bluesnarfing
12. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
Bluesnarfing
Confidentiality
NIST (National Institute of Standards and Technology)
File Server
13. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
FireWire Connection
Desktop Support
Document Imaging
Bluesnarfing
14. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Hospice Care
Internet Modem
Urgent Care Facility
Level V Trauma Center
15. Unwanted software that collects personal user data from a system and transmits it to a third party.
Spyware
XML (EXtensible Markup Language)
Mantrap
Fax Server
16. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Inpatient Treatment
WAN (Wide Area Network )
Daily Backup
Permission
17. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
HIPAA (Health Insurance Portability and Accountability Act)
Phishing
DNS (Domain Name System)
Private Health Insurers
18. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Ping
Serial Connection
CCHIT(Certification Commission for Health Information Technology)
RDP (Remote Desktop Protocol)
19. Hardware components that enable users to interact with computers.
Replay
Cloud Computing
Human Interface Devices
Liability Waiver
20. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Parallel Tracking Software
Privacy Rule
Server Load
Replay
21. A device used to convert paper to electronic format and then associates the file with the proper patient.
Document Scanner
External Devices
Logical Access Control
Social Engineering Attack
22. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Metadata
Proxy Server
Medicare
Public Hospital
23. The U.S. federal program to provide healthcare for certain low-income individual and families.
Medicaid
IV (Initialization Vector)
Home Healthcare
For-Profit Hospital
24. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
e-Prescribing
Procedure Room
Medical Record Controls
Session Hijacking
25. The management of performance levels of servers to ensure that critical operations are highly available to resources.
Server Utilization
Remote Access
Firewall
XML (EXtensible Markup Language)
26. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
Schedule III Controlled Substance
PaaS
IEEE (Institute of Electrical and Electronic Engineers)
IM (Instant Messaging)
27. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device
802.11b
Urgent Care Facility
Archive Flag
Biometrics
28. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
Port Scanning
FTP Server
The Joint Commission
ARRA (American Recovery and Reinvestment Act
29. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
National Drug Code Directory
Security Policy
Privacy Rule
ARP Poisoning
30. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
Hardware Attack
Document Imaging
Systems Administrator
ICMP (Internet Control Message Protocol)
31. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.
Data Sanitation
Liability Waiver
Twisted Pair
IM (Instant Messaging)
32. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
IaaS (Infrastructure as a Service)
FireWire Connection
Social Engineering Attack
Barcode Scanner
33. A device used for patient billing to capture an electronic signature.
USB Connection
ISP (Internet Service Provider)
Signature Pads
Security Rule
34. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
PATA Connection
ONC (Office of the National Coordinator)
Hardware Attack
Billing and Coding Software
35. Data that fits into a well-defined data model.
Structured Data
DRP (Disaster Recovery Plan)
Degaussing
WAN (Wide Area Network )
36. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.
Phishing
ICMP (Internet Control Message Protocol)
Software Update
Teaching Hospital
37. A VPN protocol that is an extension of the PPP remote access protocol.
Web Server
WEP (Wired Equivalency Protocol)
PPTP (Point-to-Point Tunneling Protocol)
adware
38. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
Server Load
Level I Trauma Center
Systems Administrator
Logic Bomb
39. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Rogue Access Point
EHR (Electronic Health Record)
WEP (Wired Equivalency Protocol)
Superbill
40. Systems that store networking hardware and provide networking services to local area networks within a medical environment.
Practice Management Software
ED (Emergency Department)
IDF (International Distribution Frame)
PEAP
41. A server that provides database services to other computers in a network.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Final Rule
Database Server
DHCP (Dynamic Host Control Protocol)
42. A method used to remove any sensitive data from a mobile device and permanently delete it.
Data Wiping
Logical Access Control
Controlled substance
War Driving
43. A facility equipped to treat patients suffering traumatic injuries.
Trauma Center
Controlled substance
Worm
ICMP (Internet Control Message Protocol)
44. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
OCR (Optical Character Recognition)
PHR (Personal Health Record)
Practice Management Software
802.1x
45. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Packet Sniffing
HHS (U.S. Department of Health and Human Services)
DC (Domain Controller)
PCP Primary Care Physician
46. An IT role that is responsible for the network infrastructure and components withing an organization.
Integrity
PHI
ISP (Internet Service Provider)
Network Administrator
47. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Worm
Secure Chat
Man-in-the-middle
Incremental Backup
48. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Legal Health Record
Application Server
OCR (Optical Character Recognition)
SATA Connection
49. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
Transitive Access
Custodian
VoIP (Voice over IP)
Virtualization
50. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
Wireless Security
HTTPS (Hypertext Transfer Protocol Secure)
NIST (National Institute of Standards and Technology)
Security Policy
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests