SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.
Liability
IaaS (Infrastructure as a Service)
ICMP (Internet Control Message Protocol)
General/Community Hospital
2. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
PATA Connection
Coaxial Cable
Physical Security
Imaging Center
3. Electronic messages sent between users or groups.
Email
ASP (Active Server Pages)
Phishing
Schedule I Controlled Substance
4. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Worm
Short-stay Facility
Secure Chat
Private Health Insurers
5. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
Router
FireWire Connection
Protected Health Information
Schedule III Controlled Substance
6. The standard language that defines how web pages are formatted and displayed.
PPTP (Point-to-Point Tunneling Protocol)
mbulatory care
SQL (Structured Query Language)
HTML (Hypertext Markup Language)
7. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
BAA (Business Associate Agreement)
EAP (Extensible Authentication Protocol)
CCD(Continuity of Care Document)
SATA Connection
8. An EHR system that had been certified by ONC
EAP (Extensible Authentication Protocol)
adware
Ping
Certified EHR System
9. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.
Physical Security Controls
Packet Sniffing
Interference
FDA (Food and Drug Administration)
10. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
Physical Security Controls
SaaS
Bedside Medication Verification
11. An area where all medical imaging procedures are conducted.
Imaging Center
Recover Room
Procedure Room
Private Practice
12. Unwanted software that collects personal user data from a system and transmits it to a third party.
Logical Security
Spyware
Centralized
Medical Record Controls
13. A LAN implementation in which nodes use a wireless network card to connect to other stations.
LAN (Local Area Network)
Wireless Security
Legal Health Record
War Driving
14. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
MDF (Main Distribution Frame)
Trojan Horse
P2P
Print Server
15. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
Card/Badge Scanner
TTL
LAN (Local Area Network)
Database Server
16. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
RFP (Request for Proposal)
Transitive Access
Short-stay Facility
E/M Codes (Evaluation and Management Codes)
17. A device used to convert paper to electronic format and then associates the file with the proper patient.
Document Scanner
Transitive Access
Fax Printer
Spam
18. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
SSTP (Secure Socket Tunneling Protocol)
Parallel Tracking Software
WHO
IM (Instant Messaging)
19. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
Bluesnarfing
ICMP (Internet Control Message Protocol)
SSTP (Secure Socket Tunneling Protocol)
NIST (National Institute of Standards and Technology)
20. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Biometrics
Port Scanning
Code Blue
Structured Data
21. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
E/M Codes (Evaluation and Management Codes)
Protected Health Information
Mantrap
IaaS (Infrastructure as a Service)
22. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Parallel Connection
Software Hotfix
IDS (Intrusion Detection System)
ISP (Internet Service Provider)
23. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Short-stay Facility
Signature Pads
TKIP (Temporary Key Integrity Protocol)
24. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.
CMS (Centers for Medicare and Medicaid Services)
Incremental Backup
MDF (Main Distribution Frame)
Outpatient Treatment
25. Secure Shell - A protocol for secure remote logon and secure transfer of data.
SSH
HTML (Hypertext Markup Language)
Public Hospital
Hoax
26. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Practice Management Software
Level III Trauma Center
IDF (International Distribution Frame)
Public Health Record
27. A file property that essentially indicates whether the file has been modified since the last back up.
Archive Flag
RHIO (Regional Health Information Organization)
Level III Trauma Center
PHP
28. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
CIA Triad(Confidentiality - Integrity - Availability)
ROI Department
Sensitivity Label
Drone
29. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
Interference
HTTPS (Hypertext Transfer Protocol Secure)
Barcode Scanner
e-Prescribing
30. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
DNS (Domain Name System)
Schedule IV Controlled Substance
ad hoc
Barcode Scanner
31. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
SCSI (Small Computer Systems Interface)
FTP Server
Inpatient Treatment
Router
32. A widely adopted markup language used in many documents - websites - and web applications.
antivirus software
Rogue Access Point
802.11i
XML (EXtensible Markup Language)
33. Any medical treatment or services provided on an outpatient basis.
DHCP (Dynamic Host Control Protocol)
Tracking and Auditing Software
mbulatory care
e-Prescribing
34. Software protection systems in an organization.
Logic Bomb
Logical Security
ISP (Internet Service Provider)
IDS (Intrusion Detection System)
35. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'
Software Hotfix
ISP (Internet Service Provider)
Degaussing
SCSI (Small Computer Systems Interface)
36. Hardware components that enable users to interact with computers.
Fire Suppression
Human Interface Devices
PPP (Point-to-Point Protocol)
General/Community Hospital
37. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
802.11i
802.11g
Schedule V Controlled Substance
Level IV Trauma Center
38. An Instant messaging service that uses strong encryption to send and receive secure messages.
Secure Chat
XML (EXtensible Markup Language)
LAN (Local Area Network)
USB
39. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.
Level V Trauma Center
Medical Coding
HL7
Twisted Pair
40. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.
Structured Data
Solid State Storage
ONC (Office of the National Coordinator)
Host Computer
41. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.
Physical Security
Bluejacking
RHIO (Regional Health Information Organization)
Spam
42. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
Firewall
IDS (Intrusion Detection System)
Transitive Access
SCSI (Small Computer Systems Interface)
43. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
USB
antivirus software
Virus
IDF (International Distribution Frame)
44. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
adware
Intermediate Care facility
FDA (Food and Drug Administration)
Full Backup
45. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
FireWire Connection
Superbill
P2P
NDC ID (National Drug Code Identification)
46. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Sniffing
Logical Access Control
VPN Protocol
Firewall
47. A method used to securely remove data from hard drives and other electronic storage devices.
NAS (Network Attached Storage)
Secure Shredding
Mail Server
Input Devices
48. A family of specification developed by the IEEE for wireless LAN technology.
Replay
IEEE (Institute of Electrical and Electronic Engineers)
Level II Trauma Center
802.11
49. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
Web Server
Signature Pads
802.1x
Sensitivity Label
50. A private network that is configured within a public network such as the Internet.
CPT (Current Procedural Terminology)
VPN (Virtual Private Network)
Flash
Medical Coding