Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A Protocol used to automatically assign IP addressing information to IP network computers.






2. Secure Shell - A protocol for secure remote logon and secure transfer of data.






3. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






4. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






5. A network that displays characteristics of more than one of the three standard network models.






6. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






7. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






8. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






9. A document that lists agreed upon actions between two parties.






10. Data that is added to a patient EMR to allow for quick searching and file location.






11. A physical security control system that has a door at each end of a secure chamber.






12. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






13. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






14. See Host Computer






15. A server that is primarily used to share - store - and access files.






16. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






17. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.






18. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






19. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






20. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






21. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






22. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






23. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






24. A device that connects multiple network that use the same protocol.






25. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






26. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






27. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






28. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






29. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






30. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






31. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






32. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






33. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






34. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






35. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






36. A device that distributes and manages print jobs sent from client computers.






37. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






38. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






39. A private network that is configured within a public network such as the Internet.






40. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






41. A widely adopted markup language used in many documents - websites - and web applications.






42. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






43. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






44. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






45. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






46. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






47. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






48. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






49. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






50. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests