SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method used to securely remove data from hard drives and other electronic storage devices.
Tracert
XML (EXtensible Markup Language)
Acuity
Secure Shredding
2. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.
Parallel Connection
AP (Access Points)
Preceptor
Schedule II Controlled Substance
3. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.
EAP (Extensible Authentication Protocol)
EMI (Electromagnetic Interference)
FTP (File Transfer Protocol)
Server Load
4. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
PCP Primary Care Physician
Medication Reconciliation
Archive Flag
Isolation Room
5. A system that extinguishes fire using special gases.
WHO
Drone
Fire Suppression
Practice Management Software
6. An area where all medical imaging procedures are conducted.
Billing and Coding Software
Imaging Center
CCR (Continuity of Care Record)
Medical Coding
7. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
CCR (Continuity of Care Record)
NIC (Network Interface Card )
National Drug Code Directory
Medicaid
8. A formalized statement that defines how security will be implemented within a particular organization.
Examination Room
Security Policy
Hospice Care
802.11a
9. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
DDoS (Distributed Denial of Service)
UPS
Firewall
L2TP (Layer Two Tunneling Protocol)
10. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
Transitive Access
HTTPS (Hypertext Transfer Protocol Secure)
Covered Entity
Schedule II Controlled Substance
11. A company that provides access to the Internet.
CPOE (Computerized Physician Order Entry)
802.11
ISP (Internet Service Provider)
ad hoc
12. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
e-Prescribing
Change Management
Meaningful Use
AP (Access Points)
13. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Rogue Access Point
Level III Trauma Center
CPT (Current Procedural Terminology)
Document Imaging
14. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Private Practice
TTL
PEAP
Host Computer
15. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
Hardware Attack
IV Attack
SaaS
API (Application Programming Interface)
16. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Network Administrator
PHI
File Server
17. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
DHCP (Dynamic Host Control Protocol)
War Chalking
Imaging Center
Medicaid
18. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
Eligible Provider
Storage Server
Meaningful Use
Site Survey
19. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
antivirus software
Firewall
External Devices
Structured Data
20. A security protocol created by the IEEE task group to replace WEP.
HIPAA (Health Insurance Portability and Accountability Act)
Short-stay Facility
Print Server
TKIP (Temporary Key Integrity Protocol)
21. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.
Eligible Provider
Public Health Record
CPT (Current Procedural Terminology)
Camera
22. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
lient-Server
Hoax
ICMP (Internet Control Message Protocol)
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
23. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
DRP (Disaster Recovery Plan)
For-Profit Hospital
NIST (National Institute of Standards and Technology)
Transitive Access
24. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
DRP (Disaster Recovery Plan)
Protected Health Information
adware
Tape Drive
25. A backup that backs up all selected files regardless of the state of the archived bit.
Full Backup
Parallel Connection
Web Server
Coaxial Cable
26. A protocol that provides VPN functionality.
VPN Protocol
Fire Suppression
PEAP
Public Health Record
27. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.
Virus
Keyfob
Camera
Code Blue
28. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
Parallel Tracking Software
802.11g
Document Scanner
ONC (Office of the National Coordinator)
29. A Protocol used to automatically assign IP addressing information to IP network computers.
Physical Security
ISP (Internet Service Provider)
DHCP (Dynamic Host Control Protocol)
PHI
30. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Tracert
Firewall
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Print Server
31. Unwanted software that collects personal user data from a system and transmits it to a third party.
Spyware
Tape Drive
PHR (Personal Health Record)
Desktop Support
32. An area where surgical procedures are performer in a sterile environment.
OR (Operating Room)
Drug Allergy
Float Room
Main Frame
33. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
Mantrap
Level V Trauma Center
E/M Codes (Evaluation and Management Codes)
Rogue Access Point
34. A server that receives email request from hosts on a network - and redirects them to the intended recipient.
War Driving
Differential Backup
FDA (Food and Drug Administration)
Mail Server
35. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.
Fax Printer
MOU (Memorandum of Understanding)
Level IV Trauma Center
SATA Connection
36. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
Archive Flag
War Driving
PHP
PATA Connection
37. Any medical treatment or services provided on an outpatient basis.
Home Healthcare
mbulatory care
VoIP (Voice over IP)
Level I Trauma Center
38. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
XML (EXtensible Markup Language)
ARP Poisoning
P2P
Secure File Transfer Protocol
39. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
LEAP (Lightweight Extensible Authentication Protocol)
Privacy Rule
Recover Room
Proxy Server
40. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
WEP (Wired Equivalency Protocol)
Intermediate Care facility
PPP (Point-to-Point Protocol)
Storage Server
41. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.
Public Health Record
Proxy Server
Urgent Care Facility
DRP (Disaster Recovery Plan)
42. A physical security control system that has a door at each end of a secure chamber.
Mantrap
Schedule IV Controlled Substance
Cloud Computing
Confidentiality
43. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
802.11
Systems Administrator
Medicare
Host Computer
44. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
USB Connection
Document Imaging
Software Patch
NDC ID (National Drug Code Identification)
45. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
ISP (Internet Service Provider)
Liability
PaaS
DNS Server
46. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
Float Room
Integrity
PHI
Schedule IV Controlled Substance
47. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
PHI
Home Healthcare
Practice Management Software
802.11
48. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Strong Password
Break Glass Access
ONC (Office of the National Coordinator)
NIC (Network Interface Card )
49. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
IV (Initialization Vector)
NIST (National Institute of Standards and Technology)
Fax Server
Hospice Care
50. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
WAN (Wide Area Network )
AP (Access Points)
Mantrap
Recover Room