SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mechanism that are put in place to limit access to electronic health information.
Nursing Home
Medical Record Controls
Fire Suppression
FireWire Connection
2. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.
Break Glass Access
HTTPS (Hypertext Transfer Protocol Secure)
Security Rule
CCHIT(Certification Commission for Health Information Technology)
3. A server that stores files and programs.
Storage Server
ASP (Active Server Pages)
Public Health Record
PPTP (Point-to-Point Tunneling Protocol)
4. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Host Computer
Network Administrator
Internet Modem
Physical Security Controls
5. A family of specification developed by the IEEE for wireless LAN technology.
CCD(Continuity of Care Document)
War Chalking
Document Imaging
802.11
6. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
Phishing
FDA (Food and Drug Administration)
Tape Drive
Scheduling Software
7. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.
Bedside Medication Verification
ROI Department
L2TP (Layer Two Tunneling Protocol)
Human Interface Devices
8. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
TKIP (Temporary Key Integrity Protocol)
Integrity
Coaxial Cable
Encryption
9. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
VPN Protocol
HIPAA (Health Insurance Portability and Accountability Act)
L2TP (Layer Two Tunneling Protocol)
Hoax
10. A personal computer storage device that stores data magnetically on a removable tape.
Billing and Coding Software
802.11g
Tape Drive
Parallel Connection
11. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.
HL7
Print Server
E/M Codes (Evaluation and Management Codes)
PaaS
12. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
DNS Server
Application Server
Scope of Practice
EHR (Electronic Health Record)
13. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
Private Practice
Software Update
WTLS (Wireless Transport Layer Security)
Coaxial Cable
14. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.
OR (Operating Room)
Site Survey
Virtualization
Fax Server
15. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o
Spyware
OR (Operating Room)
DDoS (Distributed Denial of Service)
Schedule V Controlled Substance
16. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
CPOE (Computerized Physician Order Entry)
Security Rule
SSTP (Secure Socket Tunneling Protocol)
Billing and Coding Software
17. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Worm
Fax Printer
Zombie
Medicare
18. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
SATA Connection
Float Room
Serial Connection
Level III Trauma Center
19. A personal computer storage decide that stores data optically - rather than magnetically.
Optical Disk
IV Attack
DHCP (Dynamic Host Control Protocol)
Internet Modem
20. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.
Print Server
RDP (Remote Desktop Protocol)
BAA (Business Associate Agreement)
Twisted Pair
21. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
802.11n
Pharming
Mail Server
OCR (Optical Character Recognition)
22. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
Remote Access
P2P
Tracking and Auditing Software
Availability
23. A backup that backs up all selected files regardless of the state of the archived bit.
Full Backup
SaaS
PPTP (Point-to-Point Tunneling Protocol)
Surgical Center
24. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
Software Patch
802.11
Hardware Attack
Man-in-the-middle
25. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
Privacy Rule
Camera
Parallel Connection
War Chalking
26. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.
PPP (Point-to-Point Protocol)
Teaching Hospital
Medical Record Controls
Public Health Record
27. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.
PHR (Personal Health Record)
Software Update
Solid State Storage
PEAP
28. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
Pharming
Inpatient Treatment
Break Glass Access
National Drug Code Directory
29. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
Schedule III Controlled Substance
Schedule IV Controlled Substance
Medication Reconciliation
Tape Drive
30. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
SNOMED CT
Strong Password
Private Practice
Systems Administrator
31. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Differential Backup
Site Survey
UPS
DC (Domain Controller)
32. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.
802.11b
Custodian
Spam
Phishing
33. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Certified EHR System
WAN (Wide Area Network )
E/M Codes (Evaluation and Management Codes)
Liability
34. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
Pharming
Spyware
TTL
Daily Backup
35. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.
Private Health Record
USB
CCR (Continuity of Care Record)
Integrity
36. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
Encryption
e-Prescribing
Public Health Record
Trojan Horse
37. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Schedule IV Controlled Substance
Coaxial Cable
DNS (Domain Name System)
PGP
38. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
Level I Trauma Center
Incremental Backup
Daily Backup
Non-profit Hospital
39. A device that provides network connectivity capabilities for computer systems.
War Chalking
National Drug Code Directory
DNS (Domain Name System)
NIC (Network Interface Card )
40. See Host Computer
Main Frame
CIA Triad(Confidentiality - Integrity - Availability)
Parallel Tracking Software
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
41. A protocol used to connect to and access a remote computer.
RDP (Remote Desktop Protocol)
ARRA (American Recovery and Reinvestment Act
Firewall
ipconfig
42. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.
Time Server
Parallel Tracking Software
Sniffing
PATA Connection
43. The management of performance levels of servers to ensure that critical operations are highly available to resources.
Database Server
Stat
Card/Badge Scanner
Server Utilization
44. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
IV Attack
Web Server
DRP (Disaster Recovery Plan)
VPN (Virtual Private Network)
45. A type of network that is established spontaneously through a peer-to-peer wireless connection.
Stat
IDS (Intrusion Detection System)
ad hoc
NIC (Network Interface Card )
46. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
HTML (Hypertext Markup Language)
OCR (Optical Character Recognition)
DBA (Database Administrator)
Physical Security Controls
47. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
IM (Instant Messaging)
Liability Waiver
Specialized Hospital
ARP(Address Resolution Protocol)
48. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
Spyware
Schedule III Controlled Substance
ARP(Address Resolution Protocol)
Systems Administrator
49. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.
HIPAA (Health Insurance Portability and Accountability Act)
Trojan Horse
NAS (Network Attached Storage)
War Chalking
50. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'
Nursing Home
USB
SCSI (Small Computer Systems Interface)
Ping