Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






2. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






3. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






4. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






5. Cisco Systems' proprietary EAP implementation.






6. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






7. The acuteness - or level of severity - of an illness or disease.






8. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






9. A private room where a patient is examined and diagnosed by a medical practitioner.






10. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






11. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






12. A software or hardware device that protects a system or network by blocking unwanted network traffic.






13. A programming and query language common to many large scale database systems.






14. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






15. A backup that backs up all selected files regardless of the state of the archived bit.






16. A protocol that provides VPN functionality.






17. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






18. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






19. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






20. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






21. A server that contains at least one DHCP scope.






22. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






23. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






24. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






25. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






26. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






27. A Protocol used to automatically assign IP addressing information to IP network computers.






28. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






29. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






30. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






31. A formalized statement that defines how security will be implemented within a particular organization.






32. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






33. The U.S. federal program to provide healthcare for certain low-income individual and families.






34. A facility equipped to treat patients suffering traumatic injuries.






35. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






36. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






37. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






38. Software as a Service - A method that uses the cloud to provide application services to users.






39. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






40. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






41. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






42. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






43. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






44. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.






45. A method used to remove any sensitive data from a mobile device and permanently delete it.






46. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






47. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






48. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






49. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






50. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.