Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any adverse reaction to a medication being taken.






2. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






3. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






4. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






5. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






6. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






7. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






8. A physical security control system that has a door at each end of a secure chamber.






9. The role - department - or individual that is formally responsible for a health record.






10. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






11. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






12. A formalized statement that defines how security will be implemented within a particular organization.






13. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






14. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






15. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






16. A programming and query language common to many large scale database systems.






17. A standard that adds AES security to the 802.11 standard






18. A server that stores files and programs.






19. A security protocol created by the IEEE task group to replace WEP.






20. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






21. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






22. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






23. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






24. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






25. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






26. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






27. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






28. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






29. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






30. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






31. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






32. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






33. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






34. A residential facility for patients who need constant medical or nursing care and supervision.






35. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






36. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






37. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






38. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






39. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






40. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






41. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






42. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






43. An Instant messaging service that uses strong encryption to send and receive secure messages.






44. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






45. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.






46. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






47. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






48. A private room where a patient is examined and diagnosed by a medical practitioner.






49. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.






50. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.