SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
CMS (Centers for Medicare and Medicaid Services)
Drone
Trauma Center
WAN (Wide Area Network )
2. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
Availability
Level V Trauma Center
mbulatory care
Virtualization
3. An implementation in which voice signals are transmitter over IP networks.
ipconfig
Fax Server
VoIP (Voice over IP)
SLA
4. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's
DC (Domain Controller)
Formulary Checking
Urgent Care Facility
Protected Health Information
5. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
Secure Chat
adware
Tracert
Certified EHR System
6. A hospital specialized to treat a specific disease or condition or a specific type of patient.
Specialized Hospital
Applications
Examination Room
Mixed Mode
7. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Software Hotfix
Level III Trauma Center
Controlled substance
SaaS
8. A facility equipped to treat patients suffering traumatic injuries.
Trauma Center
CPT (Current Procedural Terminology)
Hoax
Short-stay Facility
9. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Document Imaging
Ping
IEEE (Institute of Electrical and Electronic Engineers)
Encryption
10. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
Logic Bomb
Change Management
SLA
Availability
11. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
Signature Pads
DNS (Domain Name System)
Surgical Center
Parallel Connection
12. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
MOU (Memorandum of Understanding)
Tracking and Auditing Software
MDF (Main Distribution Frame)
Continuing Care Facility
13. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Differential Backup
Schedule II Controlled Substance
ipconfig
CPT (Current Procedural Terminology)
14. Cisco Systems' proprietary EAP implementation.
Port Scanning
Rogue Access Point
LEAP (Lightweight Extensible Authentication Protocol)
PHI
15. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
NIST (National Institute of Standards and Technology)
ad hoc
DDoS (Distributed Denial of Service)
SSH
16. A security setting that determines the level of access a user or group account has to be particular resource.
Permission
IaaS (Infrastructure as a Service)
Human Interface Devices
Logical Access Control
17. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
Medical Interfaces
SSTP (Secure Socket Tunneling Protocol)
ASP (Active Server Pages)
CCD(Continuity of Care Document)
18. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
FDA (Food and Drug Administration)
Site Survey
Logic Bomb
PaaS
19. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
Tracking and Auditing Software
Level I Trauma Center
PACS
EAP (Extensible Authentication Protocol)
20. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
Security Policy
antivirus software
SLA
Replay
21. Records that are not for public consumption and require appropriate release before they can be shared.
Private Health Record
mbulatory care
Code Blue
WEP (Wired Equivalency Protocol)
22. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.
Router
Hardware Attack
Security Rule
Public Hospital
23. Data that fits into a well-defined data model.
Phishing
Structured Data
CIA Triad(Confidentiality - Integrity - Availability)
Host Computer
24. A device used for patient billing to capture an electronic signature.
lient-Server
Signature Pads
802.11a
Mantrap
25. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Daily Backup
Long-stay Facility
Spam
Imaging Center
26. A network that displays characteristics of more than one of the three standard network models.
Break Glass Access
Mixed Mode
Superbill
CMS (Centers for Medicare and Medicaid Services)
27. A network that connects wireless devices in a very close proximity but not though a wireless access point.
L2TP (Layer Two Tunneling Protocol)
Logical Security
HTTPS (Hypertext Transfer Protocol Secure)
PAN (Personal Area Network)
28. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
Integrity
PGP
Fire Suppression
Superbill
29. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.
PATA Connection
P2P
PPP (Point-to-Point Protocol)
Data Wiping
30. A type of network that is established spontaneously through a peer-to-peer wireless connection.
Virus
Replay
Medicare
ad hoc
31. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
Covered Entity
Wireless Security
Barcode Scanner
Desktop Support
32. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
PGP
Practice Management Software
PHP
33. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
Mail Server
Time Server
SATA Connection
L2TP (Layer Two Tunneling Protocol)
34. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
CIA Triad(Confidentiality - Integrity - Availability)
IV Attack
Secure Shredding
Remote Access
35. A device that connects multiple network that use the same protocol.
Acuity
Mixed Mode
Router
IaaS (Infrastructure as a Service)
36. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Hospice Care
CCHIT(Certification Commission for Health Information Technology)
File Server
Scheduling Software
37. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.
Bedside Medication Verification
ROI Department
Rogue Access Point
SSH
38. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.
P2P
Replay
AP (Access Points)
Imaging Center
39. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.
Isolation Room
Teaching Hospital
Optical Disk
External Devices
40. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
ARRA (American Recovery and Reinvestment Act
Inpatient Treatment
TKIP (Temporary Key Integrity Protocol)
Private Health Record
41. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
Sensitivity Label
802.11a
802.11n
Archive Flag
42. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.
PHI
Treatment Team
802.11
Keyfob
43. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
MDF (Main Distribution Frame)
Short-stay Facility
LAN (Local Area Network)
ipconfig
44. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered
Degaussing
Acuity
Ping
ICMP (Internet Control Message Protocol)
45. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.
Print Server
TKIP (Temporary Key Integrity Protocol)
General/Community Hospital
Confidentiality
46. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
Host Computer
Procedure Room
RDP (Remote Desktop Protocol)
Fire Suppression
47. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
Data Wiping
Parallel Tracking Software
Procedure Room
FTP (File Transfer Protocol)
48. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
e-Prescribing
WEP (Wired Equivalency Protocol)
Interference
Schedule V Controlled Substance
49. A private network that is configured within a public network such as the Internet.
Parallel Tracking Software
VPN (Virtual Private Network)
SNOMED CT
HITECH Health Information Technology for Economic and Clinical Health Act)
50. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
PHI
Zombie
PACS
Man-in-the-middle