Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






2. A team of clinicians assigned to work with a specific patient at any given time.






3. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






4. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are






5. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






6. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






7. The management of performance levels of servers to ensure that critical operations are highly available to resources.






8. A server that provides database services to other computers in a network.






9. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






10. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






11. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.






12. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






13. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






14. A server that proves the most accurate actual time to all clients in a computer network.






15. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






16. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






17. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






18. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






19. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






20. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






21. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






22. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






23. Electronic conversion of hard copy documents to digital form.






24. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






25. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






26. A company that provides access to the Internet.






27. The U.S. federal program to provide healthcare for certain low-income individual and families.






28. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






29. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






30. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






31. A communication protocol that enables the transfer of files between a user's workstation and a remote host






32. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






33. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






34. Data that fits into a well-defined data model.






35. Cisco Systems' proprietary EAP implementation.






36. Software components that allow users to perform specific tasks and job functions on a computer.






37. The ability to connect to systems and services from an offsite or remote location using a remote access method.






38. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.






39. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






40. A Protocol used to automatically assign IP addressing information to IP network computers.






41. A private room where a patient is examined and diagnosed by a medical practitioner.






42. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






43. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






44. A VPN protocol that is an extension of the PPP remote access protocol.






45. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






46. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






47. A device that connects multiple network that use the same protocol.






48. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






49. An area where all medical imaging procedures are conducted.






50. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests