Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






2. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






3. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






4. Records that are released for public viewing.






5. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






6. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






7. Authentication schemes based on individuals' physical characters.






8. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






9. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






10. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






11. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






12. An Instant messaging service that uses strong encryption to send and receive secure messages.






13. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






14. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






15. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






16. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






17. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






18. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






19. Electronic messages sent between users or groups.






20. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






21. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






22. A security setting that determines the level of access a user or group account has to be particular resource.






23. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






24. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






25. A private room where a patient is examined and diagnosed by a medical practitioner.






26. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.






27. A device that has multiple network ports and combines multiple physical network segments into a single logical network.






28. Software protection systems in an organization.






29. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






30. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






31. Software as a Service - A method that uses the cloud to provide application services to users.






32. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






33. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






34. A server that is primarily used to share - store - and access files.






35. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






36. Any adverse reaction to a medication being taken.






37. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.






38. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






39. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






40. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






41. See Host Computer






42. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






43. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






44. A private network that is configured within a public network such as the Internet.






45. A utility used to determine the route data takes to get to a particular destination.






46. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






47. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






48. A company that provides access to the Internet.






49. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






50. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests