Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






2. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






3. A formalized statement that defines how security will be implemented within a particular organization.






4. A protocol that provides VPN functionality.






5. A network that connects wireless devices in a very close proximity but not though a wireless access point.






6. A LAN implementation in which nodes use a wireless network card to connect to other stations.






7. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






8. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






9. Systems that store networking hardware and provide networking services to local area networks within a medical environment.






10. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






11. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






12. A private room where a patient is examined and diagnosed by a medical practitioner.






13. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






14. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






15. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






16. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.






17. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






18. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






19. A server that is primarily used to share - store - and access files.






20. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






21. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






22. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






23. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






24. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






25. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






26. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






27. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






28. Authentication schemes based on individuals' physical characters.






29. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






30. An EHR system that had been certified by ONC






31. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






32. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






33. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






34. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






35. A facility equipped to treat patients suffering traumatic injuries.






36. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






37. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






38. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






39. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






40. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






41. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






42. Data that is added to a patient EMR to allow for quick searching and file location.






43. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






44. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






45. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






46. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






47. A personal computer storage device that uses fixed media and magnetic data storage.






48. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






49. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






50. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.