SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network that displays characteristics of more than one of the three standard network models.
antivirus software
RHIO (Regional Health Information Organization)
ipconfig
Mixed Mode
2. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
FireWire Connection
lient-Server
Flash
mbulatory care
3. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.
Centralized
File Server
Medical Coding
E/M Codes (Evaluation and Management Codes)
4. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
ARP(Address Resolution Protocol)
DoS (Denial of Service attack)
DNS (Domain Name System)
ONC (Office of the National Coordinator)
5. A personal computer storage decide that stores data optically - rather than magnetically.
DNS Server
Internet Modem
Storage Server
Optical Disk
6. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
Controlled substance
SSH
ARRA (American Recovery and Reinvestment Act
ISP (Internet Service Provider)
7. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
File Server
P2P
Covered Entity
Level III Trauma Center
8. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Solid State Storage
Covered Entity
Medicaid
PHI
9. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
HITECH Health Information Technology for Economic and Clinical Health Act)
Logical Access Control
Level II Trauma Center
Meaningful Use
10. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
Fax Server
UPS
802.11g
lient-Server
11. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
RHIO (Regional Health Information Organization)
Software Hotfix
ICMP (Internet Control Message Protocol)
Strong Password
12. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
OCR (Optical Character Recognition)
SSTP (Secure Socket Tunneling Protocol)
Document Scanner
MDF (Main Distribution Frame)
13. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
Inpatient Treatment
Surgical Center
RFP (Request for Proposal)
FireWire Connection
14. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Acuity
ATA (Advanced Technology Attachment)
Bluesnarfing
15. A server that proves the most accurate actual time to all clients in a computer network.
Man-in-the-middle
Wireless Security
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Time Server
16. A device used to fax prescription or to print out prescription information for the EMR/EHR system.
Data Sanitation
Medicare
ISP (Internet Service Provider)
Fax Printer
17. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
Signature Pads
PATA Connection
Liability Waiver
Archive Flag
18. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Continuing Care Facility
Coaxial Cable
Logical Security
Biometrics
19. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
Desktop Support
Signature Pads
Security Rule
USB Connection
20. The U.S. federal program to provide healthcare for certain low-income individual and families.
Billing Clearinghouse
SSTP (Secure Socket Tunneling Protocol)
Drone
Medicaid
21. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
PHI
Level II Trauma Center
Pharming
ASP (Active Server Pages)
22. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Degaussing
Packet Sniffing
NAC (Network Access Control)
Twisted Pair
23. The role - department - or individual that is formally responsible for a health record.
Tape Drive
CIA Triad(Confidentiality - Integrity - Availability)
NIST (National Institute of Standards and Technology)
Custodian
24. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Integrity
Availability
SSH
SaaS
25. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
DRP (Disaster Recovery Plan)
Structured Data
Scope of Practice
Security Rule
26. Software components that allow users to perform specific tasks and job functions on a computer.
WAN (Wide Area Network )
Applications
CCR (Continuity of Care Record)
War Driving
27. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
PHR (Personal Health Record)
Practice Management Software
Coaxial Cable
802.11n
28. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
TKIP (Temporary Key Integrity Protocol)
Server Utilization
PACS
Tracking and Auditing Software
29. Hardware components that enable users to interact with computers.
DC (Domain Controller)
ARP(Address Resolution Protocol)
Human Interface Devices
NAS (Network Attached Storage)
30. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
EHR (Electronic Health Record)
Man-in-the-middle
FDA (Food and Drug Administration)
PEAP
31. A server that contains at least one DHCP scope.
XML (EXtensible Markup Language)
Full Backup
DHCP (Dynamic Host Control Protocol)
DHCP Server
32. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
e-Prescribing
CCD(Continuity of Care Document)
Pharming
Protected Health Information
33. Application code that enables various applications to communicate with each other.
PaaS
Differential Backup
API (Application Programming Interface)
Parallel Tracking Software
34. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
National Drug Code Directory
Sniffing
Keyfob
USB
35. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec
Schedule IV Controlled Substance
Security Policy
Billing Clearinghouse
Virus
36. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
Fire Suppression
HL7
Biometrics
PGP
37. A personal computer storage device that uses fixed media and magnetic data storage.
HDD (Hard Disk Drive)
NAC (Network Access Control)
Stat
Applications
38. Secure Shell - A protocol for secure remote logon and secure transfer of data.
Intermediate Care facility
Man-in-the-middle
SSH
For-Profit Hospital
39. A TCP/IP utility used to verity the network connectivity of a computer.
Ping
HTTPS (Hypertext Transfer Protocol Secure)
VPN (Virtual Private Network)
Continuing Care Facility
40. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
802.1x
Applications
Biometrics
Recover Room
41. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
Structured Data
Tracert
Final Rule
Virus
42. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/
Security Policy
Port Scanning
ED (Emergency Department)
VoIP (Voice over IP)
43. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Centralized
Secure File Transfer Protocol
Medical Interfaces
HTML (Hypertext Markup Language)
44. Cisco Systems' proprietary EAP implementation.
Medicare
SaaS
LEAP (Lightweight Extensible Authentication Protocol)
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
45. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Structured Data
TTL
Secure File Transfer Protocol
Spam
46. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical
SQL (Structured Query Language)
ipconfig
FTP Server
Practice Management Software
47. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
802.11a
PEAP
The Joint Commission
SSH
48. A facility equipped to treat patients suffering traumatic injuries.
DRP (Disaster Recovery Plan)
Medication Reconciliation
DDoS (Distributed Denial of Service)
Trauma Center
49. An Instant messaging service that uses strong encryption to send and receive secure messages.
Secure Chat
PATA Connection
File Server
VPN (Virtual Private Network)
50. Electronic conversion of hard copy documents to digital form.
Specialized Hospital
Document Imaging
Private Health Record
Public Hospital
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests