Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






2. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






3. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






4. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






5. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






6. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






7. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






8. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






9. An AES cipher-based encryption protocol used in WPA2.






10. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






11. A backup that backs up all selected files regardless of the state of the archived bit.






12. An implementation in which voice signals are transmitter over IP networks.






13. The ability to connect to systems and services from an offsite or remote location using a remote access method.






14. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






15. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






16. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






17. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






18. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






19. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






20. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






21. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






22. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






23. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






24. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






25. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






26. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






27. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






28. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






29. A device used for patient billing to capture an electronic signature.






30. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






31. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






32. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






33. Systems that store networking hardware and provide networking services to local area networks within a medical environment.






34. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






35. A security designation that determines the clearance for an information zone within the EHR system.






36. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






37. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.






38. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.






39. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






40. A formalized statement that defines how security will be implemented within a particular organization.






41. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






42. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






43. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






44. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






45. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






46. A backup that backs up all selected files on a daily basis.






47. Software as a Service - A method that uses the cloud to provide application services to users.






48. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






49. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






50. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.