SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
Logic Bomb
Transitive Access
NAC (Network Access Control)
SLA
2. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
Man-in-the-middle
Bluetooth
Main Frame
Mixed Mode
3. Personal computer components that enable users to enter data or instructions into a computer.
Input Devices
OR (Operating Room)
Practice Management Software
Protected Health Information
4. A server that proves the most accurate actual time to all clients in a computer network.
Teaching Hospital
Security Policy
Time Server
Packet Sniffing
5. A server that contains at least one DHCP scope.
Phishing
mbulatory care
Level III Trauma Center
DHCP Server
6. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.
Scope of Practice
Physical Security Controls
IDS (Intrusion Detection System)
Liability
7. A method used to remove any sensitive data from a mobile device and permanently delete it.
Time Server
Site Survey
Daily Backup
Data Wiping
8. The U.S. Agency charged with protecting the health of the population and providing various human services.
HHS (U.S. Department of Health and Human Services)
Degaussing
LAN (Local Area Network)
HIPAA (Health Insurance Portability and Accountability Act)
9. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
SSH
Social Engineering Attack
DNS (Domain Name System)
Host Computer
10. A network that displays characteristics of more than one of the three standard network models.
Mixed Mode
Optical Disk
DHCP Server
Non-profit Hospital
11. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
Final Rule
DoS (Denial of Service attack)
Full Backup
Email
12. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
Code Blue
PCP Primary Care Physician
ad hoc
Private Health Insurers
13. A device that provides network connectivity capabilities for computer systems.
Level I Trauma Center
NIC (Network Interface Card )
PCP Primary Care Physician
TKIP (Temporary Key Integrity Protocol)
14. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
Eligible Provider
Formulary Checking
DBA (Database Administrator)
Software Update
15. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Wireless Security
Document Scanner
NAS (Network Attached Storage)
DNS (Domain Name System)
16. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
802.11n
Interference
HIPAA (Health Insurance Portability and Accountability Act)
For-Profit Hospital
17. A personal computer storage device that uses fixed media and magnetic data storage.
EHR (Electronic Health Record)
HDD (Hard Disk Drive)
WAN (Wide Area Network )
CIA Triad(Confidentiality - Integrity - Availability)
18. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
NAS (Network Attached Storage)
Schedule III Controlled Substance
Eligible Provider
PHP
19. Unwanted software that collects personal user data from a system and transmits it to a third party.
Spyware
Long-stay Facility
Incremental Backup
ARP Poisoning
20. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
VPN (Virtual Private Network)
Level II Trauma Center
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Switch
21. The standard language that defines how web pages are formatted and displayed.
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Drone
PPP (Point-to-Point Protocol)
HTML (Hypertext Markup Language)
22. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.
Applications
Software Hotfix
DNS (Domain Name System)
Card/Badge Scanner
23. An Instant messaging service that uses strong encryption to send and receive secure messages.
Non-profit Hospital
Secure Chat
IV Attack
Formulary Checking
24. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Availability
Software Patch
E/M Codes (Evaluation and Management Codes)
Host Computer
25. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
Drone
Transitive Access
ED (Emergency Department)
Data Wiping
26. A server that displays web pages to clients.
Preceptor
Switch
Logic Bomb
Web Server
27. Data that fits into a well-defined data model.
NAS (Network Attached Storage)
HITECH Health Information Technology for Economic and Clinical Health Act)
Structured Data
antivirus software
28. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
WAN (Wide Area Network )
Time Server
CIA Triad(Confidentiality - Integrity - Availability)
Bedside Medication Verification
29. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.
PCP Primary Care Physician
Rogue Access Point
Preceptor
ARP Poisoning
30. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
Proxy Server
Parallel Tracking Software
ARP(Address Resolution Protocol)
DHCP (Dynamic Host Control Protocol)
31. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
Rogue Access Point
RDP (Remote Desktop Protocol)
Physical Security
Bluejacking
32. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
Assisted Living Facility
Level II Trauma Center
PGP
Scope of Practice
33. The official record that an organization would release if requested.
API (Application Programming Interface)
802.1x
Application Server
Legal Health Record
34. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.
Security Rule
Imaging Center
802.11i
ad hoc
35. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Level II Trauma Center
WEP (Wired Equivalency Protocol)
General/Community Hospital
Degaussing
36. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
Tracert
PACS
Schedule II Controlled Substance
UPS
37. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.
antivirus software
Formulary Checking
Integrity
Final Rule
38. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
CIA Triad(Confidentiality - Integrity - Availability)
Twisted Pair
Desktop Support
USB Connection
39. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
Practice Management Software
RFP (Request for Proposal)
antivirus software
Display Devices
40. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
PCP Primary Care Physician
Encryption
Host Computer
Print Server
41. The security layer of a WAP and the wireless equivalent of TLS in wired networks.
Trojan Horse
WTLS (Wireless Transport Layer Security)
NIC (Network Interface Card )
Liability
42. A Specialized file server that is designed and dedicated to support only data storage needs.
NAS (Network Attached Storage)
Wireless Security
Billing Clearinghouse
Formulary Checking
43. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
Level II Trauma Center
Confidentiality
Private Health Insurers
CIA Triad(Confidentiality - Integrity - Availability)
44. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
Superbill
Surgical Center
Database Server
HITECH Health Information Technology for Economic and Clinical Health Act)
45. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.
Isolation Room
Teaching Hospital
Specialized Hospital
Liability Waiver
46. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
VPN (Virtual Private Network)
Bedside Medication Verification
Protected Health Information
CCD(Continuity of Care Document)
47. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
VPN Protocol
National Drug Code Directory
Application Server
Mail Server
48. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.
Zombie
Secure Chat
Permission
Isolation Room
49. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
Zombie
Level IV Trauma Center
Centralized
802.1x
50. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
Bluetooth
API (Application Programming Interface)
ARP(Address Resolution Protocol)
DC (Domain Controller)