Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






2. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






3. Data that fits into a well-defined data model.






4. An EHR system that had been certified by ONC






5. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






6. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






7. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






8. A family of specification developed by the IEEE for wireless LAN technology.






9. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






10. Cisco Systems' proprietary EAP implementation.






11. A server that is primarily used to share - store - and access files.






12. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






13. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






14. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






15. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






16. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






17. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






18. The role - department - or individual that is formally responsible for a health record.






19. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






20. A security setting that determines the level of access a user or group account has to be particular resource.






21. A system that extinguishes fire using special gases.






22. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.






23. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






24. The official record that an organization would release if requested.






25. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






26. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






27. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






28. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






29. A device used for patient billing to capture an electronic signature.






30. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.






31. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






32. A facility equipped to treat patients suffering traumatic injuries.






33. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






34. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






35. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






36. A formalized statement that defines how security will be implemented within a particular organization.






37. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






38. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






39. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






40. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






41. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






42. Secure Shell - A protocol for secure remote logon and secure transfer of data.






43. A file property that essentially indicates whether the file has been modified since the last back up.






44. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






45. An IT role that is responsible for the network infrastructure and components withing an organization.






46. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






47. Hardware components that enable users to interact with computers.






48. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






49. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






50. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests