SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security setting that determines the level of access a user or group account has to be particular resource.
Permission
Teaching Hospital
antivirus software
Spyware
2. Data that fits into a well-defined data model.
ROI Department
Specialized Hospital
Structured Data
SCSI (Small Computer Systems Interface)
3. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.
Transitive Access
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
SATA Connection
LAN (Local Area Network)
4. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.
Availability
War Driving
ICMP (Internet Control Message Protocol)
EMI (Electromagnetic Interference)
5. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
USB Connection
Tracert
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Level III Trauma Center
6. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
Security Administrator
Medical Record Controls
Continuing Care Facility
PACS
7. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Break Glass Access
TTL
Software Hotfix
IM (Instant Messaging)
8. An area where surgical procedures are performer in a sterile environment.
Storage Server
Availability
OR (Operating Room)
EMI (Electromagnetic Interference)
9. Mechanism that are put in place to limit access to electronic health information.
Integrity
Packet Sniffing
Bluesnarfing
Medical Record Controls
10. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
AP (Access Points)
Schedule II Controlled Substance
Schedule III Controlled Substance
lient-Server
11. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
Level I Trauma Center
PATA Connection
Outpatient Treatment
DC (Domain Controller)
12. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.
Systems Administrator
PAN (Personal Area Network)
Private Practice
DHCP (Dynamic Host Control Protocol)
13. See Host Computer
Main Frame
802.11b
Applications
Internet Modem
14. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
EMI (Electromagnetic Interference)
Bluetooth
Server Utilization
IDS (Intrusion Detection System)
15. A protocol that provides VPN functionality.
VPN Protocol
Keyfob
ED (Emergency Department)
DNS Server
16. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
802.1x
Data Sanitation
UPS
SSL (Secure Sockets Layer)
17. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Document Imaging
MOU (Memorandum of Understanding)
The Joint Commission
Long-stay Facility
18. A server that proves the most accurate actual time to all clients in a computer network.
Time Server
Procedure Room
CCD(Continuity of Care Document)
Intermediate Care facility
19. A server that contains at least one DHCP scope.
DHCP Server
Spyware
Spam
Storage Server
20. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.
XML (EXtensible Markup Language)
Web Server
General/Community Hospital
802.11a
21. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
Router
IV Attack
Short-stay Facility
USB Connection
22. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.
Twisted Pair
Switch
Mantrap
Session Hijacking
23. The ability to connect to systems and services from an offsite or remote location using a remote access method.
Remote Access
EAP (Extensible Authentication Protocol)
Web Server
Security Policy
24. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
802.11g
Billing Clearinghouse
Medication Reconciliation
lient-Server
25. The fundamental security goal of ensuring that electronic data is not altered or tampered with.
Integrity
SQL (Structured Query Language)
CCR (Continuity of Care Record)
DDoS (Distributed Denial of Service)
26. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
Host Computer
ICMP (Internet Control Message Protocol)
Phishing
Application Server
27. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ
PACS
FDA (Food and Drug Administration)
PGP
IaaS (Infrastructure as a Service)
28. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
Network Administrator
ipconfig
Formulary Checking
SNOMED CT
29. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
Schedule V Controlled Substance
Non-profit Hospital
Fax Server
DBA (Database Administrator)
30. A device that distributes and manages print jobs sent from client computers.
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
SSTP (Secure Socket Tunneling Protocol)
Print Server
Incremental Backup
31. A device used for patient billing to capture an electronic signature.
Flash
PACS
DC (Domain Controller)
Signature Pads
32. An Instant messaging service that uses strong encryption to send and receive secure messages.
Continuing Care Facility
Internet Modem
Biometrics
Secure Chat
33. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Private Practice
Scheduling Software
Rogue Access Point
Secure Shredding
34. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.
Public Hospital
VPN (Virtual Private Network)
Imaging
SLA
35. A utility used to determine the route data takes to get to a particular destination.
adware
Pharming
Tracert
Bluetooth
36. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.
Public Hospital
Medical Interfaces
Physical Security Controls
Worm
37. An AES cipher-based encryption protocol used in WPA2.
External Devices
DDoS (Distributed Denial of Service)
lient-Server
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
38. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
Private Practice
ipconfig
Drone
PEAP
39. The acuteness - or level of severity - of an illness or disease.
Signature Pads
Acuity
Keyfob
Switch
40. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.
Schedule IV Controlled Substance
FDA (Food and Drug Administration)
Billing Clearinghouse
NIC (Network Interface Card )
41. A server that provides database services to other computers in a network.
ONC (Office of the National Coordinator)
e-Prescribing
Database Server
Practice Management Software
42. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.
CIA Triad(Confidentiality - Integrity - Availability)
DNS Server
P2P
SSH
43. Secure Shell - A protocol for secure remote logon and secure transfer of data.
Network Administrator
SSH
Barcode Scanner
802.1x
44. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
Level IV Trauma Center
antivirus software
Systems Administrator
PATA Connection
45. Unwanted software that collects personal user data from a system and transmits it to a third party.
Spyware
ROI Department
Logic Bomb
Security Administrator
46. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.
Acuity
Intermediate Care facility
Incremental Backup
Medication Reconciliation
47. A personal computer storage device that stores data magnetically on a removable tape.
e-Prescribing
Tape Drive
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Security Policy
48. The amount of work a server performs on a regular basis.
Server Load
Eligible Provider
Spyware
Camera
49. A server that displays web pages to clients.
Secure File Transfer Protocol
Web Server
Wireless Security
Privacy Rule
50. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
CCHIT(Certification Commission for Health Information Technology)
NIST (National Institute of Standards and Technology)
Nursing Home
Level III Trauma Center