SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
Coaxial Cable
Virtualization
VPN (Virtual Private Network)
DBA (Database Administrator)
2. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
Software Hotfix
Controlled substance
PHP
Intermediate Care facility
3. A formalized statement that defines how security will be implemented within a particular organization.
Security Policy
PAN (Personal Area Network)
Input Devices
Private Health Insurers
4. A protocol that provides VPN functionality.
LEAP (Lightweight Extensible Authentication Protocol)
NAS (Network Attached Storage)
Packet Sniffing
VPN Protocol
5. A network that connects wireless devices in a very close proximity but not though a wireless access point.
Packet Sniffing
MOU (Memorandum of Understanding)
IaaS (Infrastructure as a Service)
PAN (Personal Area Network)
6. A LAN implementation in which nodes use a wireless network card to connect to other stations.
SSL (Secure Sockets Layer)
LAN (Local Area Network)
Storage Server
EHR (Electronic Health Record)
7. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
VoIP (Voice over IP)
ARP Poisoning
Camera
Mantrap
8. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.
CMS (Centers for Medicare and Medicaid Services)
Full Backup
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Specialized Hospital
9. Systems that store networking hardware and provide networking services to local area networks within a medical environment.
IDF (International Distribution Frame)
ipconfig
Medication Reconciliation
E/M Codes (Evaluation and Management Codes)
10. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.
MOU (Memorandum of Understanding)
SATA Connection
IM (Instant Messaging)
BAA (Business Associate Agreement)
11. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
ad hoc
Break Glass Access
NAC (Network Access Control)
Router
12. A private room where a patient is examined and diagnosed by a medical practitioner.
Man-in-the-middle
Logical Security
Schedule V Controlled Substance
Examination Room
13. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.
Liability
Ping
Billing Clearinghouse
IaaS (Infrastructure as a Service)
14. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility
HITECH Health Information Technology for Economic and Clinical Health Act)
MDF (Main Distribution Frame)
Port Scanning
Secure Shredding
15. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Bedside Medication Verification
Mail Server
NAC (Network Access Control)
Packet Sniffing
16. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
DDoS (Distributed Denial of Service)
Man-in-the-middle
Signature Pads
PATA Connection
17. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
ICMP (Internet Control Message Protocol)
Float Room
Zombie
PaaS
18. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
Availability
Systems Administrator
Incremental Backup
Host Computer
19. A server that is primarily used to share - store - and access files.
Firewall
File Server
adware
Software Patch
20. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
Session Hijacking
ad hoc
ipconfig
Liability Waiver
21. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
Bedside Medication Verification
Medication Reconciliation
Medicaid
DDoS (Distributed Denial of Service)
22. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Preceptor
Private Practice
SCSI (Small Computer Systems Interface)
Level V Trauma Center
23. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.
Hospice Care
PACS
Schedule I Controlled Substance
Confidentiality
24. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
ASP (Active Server Pages)
Stat
Pharming
Mantrap
25. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Bluejacking
Urgent Care Facility
LEAP (Lightweight Extensible Authentication Protocol)
Site Survey
26. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
EAP (Extensible Authentication Protocol)
Data Sanitation
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Spyware
27. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
Archive Flag
Print Server
USB Connection
EHR (Electronic Health Record)
28. Authentication schemes based on individuals' physical characters.
Level V Trauma Center
OR (Operating Room)
WEP (Wired Equivalency Protocol)
Biometrics
29. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Medical Record Controls
Desktop Support
CCD(Continuity of Care Document)
DNS (Domain Name System)
30. An EHR system that had been certified by ONC
PPTP (Point-to-Point Tunneling Protocol)
Change Management
Certified EHR System
FDA (Food and Drug Administration)
31. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
Imaging
Parallel Tracking Software
802.11b
IM (Instant Messaging)
32. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
ARRA (American Recovery and Reinvestment Act
RHIO (Regional Health Information Organization)
Protected Health Information
DBA (Database Administrator)
33. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
Print Server
IEEE (Institute of Electrical and Electronic Engineers)
MDF (Main Distribution Frame)
Schedule II Controlled Substance
34. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Ping
Bluesnarfing
FireWire Connection
Private Health Insurers
35. A facility equipped to treat patients suffering traumatic injuries.
PGP
Trauma Center
HTML (Hypertext Markup Language)
Long-stay Facility
36. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
NDC ID (National Drug Code Identification)
FTP (File Transfer Protocol)
General/Community Hospital
Interference
37. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
API (Application Programming Interface)
E/M Codes (Evaluation and Management Codes)
DoS (Denial of Service attack)
HTTPS (Hypertext Transfer Protocol Secure)
38. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
Controlled substance
Structured Data
Keyfob
War Chalking
39. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
BAA (Business Associate Agreement)
Sensitivity Label
HL7
Man-in-the-middle
40. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
FireWire Connection
Replay
Network Administrator
ICMP (Internet Control Message Protocol)
41. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Physical Security Controls
Structured Data
ARP Poisoning
Proxy Server
42. Data that is added to a patient EMR to allow for quick searching and file location.
Physical Security
Metadata
DHCP (Dynamic Host Control Protocol)
Private Health Record
43. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.
Web Server
Isolation Room
Pharming
ARRA (American Recovery and Reinvestment Act
44. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
Security Administrator
PGP
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Break Glass Access
45. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Full Backup
Serial Connection
Scheduling Software
MDF (Main Distribution Frame)
46. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Web Server
Liability
Certified EHR System
Break Glass Access
47. A personal computer storage device that uses fixed media and magnetic data storage.
WEP (Wired Equivalency Protocol)
Session Hijacking
SLA
HDD (Hard Disk Drive)
48. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Differential Backup
FTP Server
IDF (International Distribution Frame)
Metadata
49. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
IDS (Intrusion Detection System)
Print Server
802.11b
Spam
50. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
CPOE (Computerized Physician Order Entry)
Break Glass Access
NIST (National Institute of Standards and Technology)
EMI (Electromagnetic Interference)