SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server that is primarily used to share - store - and access files.
Home Healthcare
HITECH Health Information Technology for Economic and Clinical Health Act)
mbulatory care
File Server
2. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
VPN (Virtual Private Network)
Private Health Insurers
Level V Trauma Center
Practice Management Software
3. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Remote Access
Teaching Hospital
Zombie
Security Rule
4. Electronic conversion of hard copy documents to digital form.
Biometrics
Document Imaging
Schedule IV Controlled Substance
ipconfig
5. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.
Teaching Hospital
Mail Server
Cloud Computing
802.11
6. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
RFP (Request for Proposal)
Continuing Care Facility
Level I Trauma Center
IV (Initialization Vector)
7. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
ipconfig
Packet Sniffing
SSH
P2P
8. The official ANSI term for IDE drives.
Billing Clearinghouse
Schedule V Controlled Substance
802.11i
ATA (Advanced Technology Attachment)
9. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Level IV Trauma Center
Worm
Application Server
DoS (Denial of Service attack)
10. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.
The Joint Commission
Imaging
Man-in-the-middle
Rogue Access Point
11. Any adverse reaction to a medication being taken.
802.11b
Drug Allergy
Recover Room
Bedside Medication Verification
12. A device that distributes and manages print jobs sent from client computers.
LAN (Local Area Network)
Rogue Access Point
Fax Printer
Print Server
13. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
Packet Sniffing
Mail Server
Stat
ARP(Address Resolution Protocol)
14. A residential facility for patients who need constant medical or nursing care and supervision.
Session Hijacking
Nursing Home
LAN (Local Area Network)
General/Community Hospital
15. A file property that essentially indicates whether the file has been modified since the last back up.
Liability Waiver
Web Server
Differential Backup
Archive Flag
16. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.
Logic Bomb
Rogue Access Point
Examination Room
Daily Backup
17. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
Virtualization
National Drug Code Directory
Medication Reconciliation
Server Utilization
18. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
Medicaid
PACS
SLA
antivirus software
19. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.
Imaging Center
Differential Backup
The Joint Commission
Assisted Living Facility
20. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
Barcode Scanner
Billing and Coding Software
Procedure Room
Protected Health Information
21. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.
ARP Poisoning
NDC ID (National Drug Code Identification)
Change Management
Short-stay Facility
22. Secure Shell - A protocol for secure remote logon and secure transfer of data.
SSH
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
PPP (Point-to-Point Protocol)
Coaxial Cable
23. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
Practice Management Software
IV Attack
IV (Initialization Vector)
ISP (Internet Service Provider)
24. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
Man-in-the-middle
PHP
Legal Health Record
Short-stay Facility
25. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
Schedule III Controlled Substance
HTML (Hypertext Markup Language)
Tracert
Permission
26. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
PHI
Billing Clearinghouse
Inpatient Treatment
Break Glass Access
27. Records that are released for public viewing.
Privacy Rule
Public Health Record
FDA (Food and Drug Administration)
External Devices
28. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
Private Health Record
Level II Trauma Center
Preceptor
VPN Protocol
29. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
Spyware
Card/Badge Scanner
Parallel Tracking Software
VPN Protocol
30. World Health Organization - A division of the United Nations that manages the authority of international public health.
WHO
Mantrap
Cloud Computing
Private Practice
31. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
Medication Reconciliation
Medicaid
Eavesdropping
CIA Triad(Confidentiality - Integrity - Availability)
32. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.
Packet Sniffing
VPN Protocol
adware
TKIP (Temporary Key Integrity Protocol)
33. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
Medicaid
EHR (Electronic Health Record)
Eligible Provider
WEP (Wired Equivalency Protocol)
34. An implementation in which voice signals are transmitter over IP networks.
Drug Allergy
Bluesnarfing
VoIP (Voice over IP)
Transitive Access
35. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Data Sanitation
DHCP Server
Private Health Insurers
DC (Domain Controller)
36. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
SSL (Secure Sockets Layer)
Optical Disk
IM (Instant Messaging)
Private Practice
37. A security protocol that uses certificates for authentication and encryption to protect web communication.
NAS (Network Attached Storage)
SSL (Secure Sockets Layer)
ICMP (Internet Control Message Protocol)
Social Engineering Attack
38. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
The Joint Commission
Worm
Secure File Transfer Protocol
FTP Server
39. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
CMS (Centers for Medicare and Medicaid Services)
Host Computer
Spam
Logical Security
40. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
Level V Trauma Center
Tracert
ipconfig
Fax Printer
41. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.
Packet Sniffing
Zombie
Home Healthcare
Long-stay Facility
42. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.
Hardware Attack
Session Hijacking
Web Server
Recover Room
43. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
HL7
Optical Disk
Man-in-the-middle
EMI (Electromagnetic Interference)
44. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Schedule IV Controlled Substance
NIST (National Institute of Standards and Technology)
Level I Trauma Center
Secure File Transfer Protocol
45. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
ASP (Active Server Pages)
Differential Backup
Acuity
Bluesnarfing
46. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
Non-profit Hospital
LAN (Local Area Network)
Man-in-the-middle
MOU (Memorandum of Understanding)
47. An IT role that is responsible for the network infrastructure and components withing an organization.
Network Administrator
Differential Backup
Trauma Center
Drone
48. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
Confidentiality
IDF (International Distribution Frame)
PAN (Personal Area Network)
DNS Server
49. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.
PGP
Surgical Center
Liability
Replay
50. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.
FireWire Connection
Inpatient Treatment
Surgical Center
ONC (Office of the National Coordinator)