SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
ARRA (American Recovery and Reinvestment Act
NDC ID (National Drug Code Identification)
Change Management
Permission
2. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.
Billing Clearinghouse
Integrity
Parallel Connection
Fax Printer
3. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.
USB
Signature Pads
Security Rule
Nursing Home
4. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Spam
PHR (Personal Health Record)
Application Server
PACS
5. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
ARP(Address Resolution Protocol)
Serial Connection
Social Engineering Attack
Firewall
6. A family of specification developed by the IEEE for wireless LAN technology.
Serial Connection
802.11
Parallel Tracking Software
Card/Badge Scanner
7. A personal computer storage decide that stores data optically - rather than magnetically.
XML (EXtensible Markup Language)
Logical Access Control
IDF (International Distribution Frame)
Optical Disk
8. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are
Stat
DBA (Database Administrator)
Availability
Bluetooth
9. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.
ipconfig
Public Health Record
Signature Pads
Meaningful Use
10. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
TTL
Strong Password
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Pharming
11. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
IV Attack
FDA (Food and Drug Administration)
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
e-Prescribing
12. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.
General/Community Hospital
Assisted Living Facility
ONC (Office of the National Coordinator)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
13. A server that provides database services to other computers in a network.
CCD(Continuity of Care Document)
Security Policy
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Database Server
14. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
VPN Protocol
Secure Shredding
Logical Access Control
Bedside Medication Verification
15. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Solid State Storage
Teaching Hospital
Imaging Center
Schedule IV Controlled Substance
16. A communication protocol that enables the transfer of files between a user's workstation and a remote host
Logic Bomb
Availability
Schedule I Controlled Substance
FTP (File Transfer Protocol)
17. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
DNS (Domain Name System)
Scheduling Software
Network Administrator
IEEE (Institute of Electrical and Electronic Engineers)
18. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.
DBA (Database Administrator)
Public Hospital
PaaS
Float Room
19. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Software Patch
Email
Legal Health Record
EAP (Extensible Authentication Protocol)
20. The role - department - or individual that is formally responsible for a health record.
Acuity
FDA (Food and Drug Administration)
Ping
Custodian
21. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
PATA Connection
EMI (Electromagnetic Interference)
Nursing Home
802.1x
22. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
NIST (National Institute of Standards and Technology)
DNS (Domain Name System)
CCR (Continuity of Care Record)
HIPAA (Health Insurance Portability and Accountability Act)
23. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.
ARP(Address Resolution Protocol)
Stat
War Chalking
adware
24. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition
Trojan Horse
OCR (Optical Character Recognition)
PHR (Personal Health Record)
PCP Primary Care Physician
25. Secure Shell - A protocol for secure remote logon and secure transfer of data.
Structured Data
Level IV Trauma Center
SSH
802.11b
26. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
Host Computer
PPTP (Point-to-Point Tunneling Protocol)
Protected Health Information
Billing Clearinghouse
27. Application code that enables various applications to communicate with each other.
WTLS (Wireless Transport Layer Security)
API (Application Programming Interface)
Print Server
Archive Flag
28. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
CPT (Current Procedural Terminology)
Centralized
Worm
Specialized Hospital
29. A device that connects multiple network that use the same protocol.
Integrity
Secure Shredding
Router
SLA
30. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
CPOE (Computerized Physician Order Entry)
Confidentiality
Privacy Rule
Parallel Tracking Software
31. The fundamental security goal of ensuring that electronic data is not altered or tampered with.
Integrity
External Devices
Stat
Urgent Care Facility
32. A document that defines the authorized uses of PHI and how the information is to be used and managed.
Trauma Center
802.11i
BAA (Business Associate Agreement)
Session Hijacking
33. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
CCR (Continuity of Care Record)
WEP (Wired Equivalency Protocol)
BAA (Business Associate Agreement)
PAN (Personal Area Network)
34. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
Differential Backup
Strong Password
Private Health Insurers
Medicare
35. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
Level I Trauma Center
Non-profit Hospital
CPT (Current Procedural Terminology)
ASP (Active Server Pages)
36. A server that proves the most accurate actual time to all clients in a computer network.
802.1x
FireWire Connection
Imaging Center
Time Server
37. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
Private Practice
Twisted Pair
MDF (Main Distribution Frame)
NAC (Network Access Control)
38. The U.S. Agency charged with protecting the health of the population and providing various human services.
RHIO (Regional Health Information Organization)
HHS (U.S. Department of Health and Human Services)
Barcode Scanner
802.11i
39. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.
PPP (Point-to-Point Protocol)
VoIP (Voice over IP)
Site Survey
DHCP Server
40. The management of performance levels of servers to ensure that critical operations are highly available to resources.
Eligible Provider
Covered Entity
VoIP (Voice over IP)
Server Utilization
41. Authentication schemes based on individuals' physical characters.
Session Hijacking
Systems Administrator
Biometrics
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
42. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.
Medicare
Internet Modem
SSL (Secure Sockets Layer)
Superbill
43. An Instant messaging service that uses strong encryption to send and receive secure messages.
Logical Security
Secure Chat
ASP (Active Server Pages)
Virus
44. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.
Biometrics
Medicaid
Trojan Horse
Tracking and Auditing Software
45. A method used to securely remove data from hard drives and other electronic storage devices.
VPN (Virtual Private Network)
Secure Shredding
SATA Connection
Coaxial Cable
46. A protocol used to connect to and access a remote computer.
Teaching Hospital
RDP (Remote Desktop Protocol)
Legal Health Record
SSH
47. A Protocol used to automatically assign IP addressing information to IP network computers.
lient-Server
DHCP (Dynamic Host Control Protocol)
ATA (Advanced Technology Attachment)
Medical Record Controls
48. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.
PHP
PPTP (Point-to-Point Tunneling Protocol)
SaaS
ipconfig
49. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
SSTP (Secure Socket Tunneling Protocol)
SNOMED CT
Daily Backup
Security Policy
50. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's
CCMP (Counter Mode with Cipher Block Changing Message Authentication Code Protocol)
Interference
DC (Domain Controller)
PaaS