Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mechanism that are put in place to limit access to electronic health information.






2. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






3. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are






4. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






5. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






6. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






7. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






8. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






9. The U.S. federal program to provide healthcare for certain low-income individual and families.






10. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






11. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






12. A method used to securely remove data from hard drives and other electronic storage devices.






13. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






14. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






15. A device that provides network connectivity capabilities for computer systems.






16. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






17. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






18. A widely adopted markup language used in many documents - websites - and web applications.






19. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






20. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






21. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






22. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






23. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






24. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






25. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






26. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






27. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






28. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






29. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






30. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






31. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.






32. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






33. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






34. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






35. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






36. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






37. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






38. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






39. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






40. A VPN protocol that is an extension of the PPP remote access protocol.






41. A facility equipped to treat patients suffering traumatic injuries.






42. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






43. An Instant messaging service that uses strong encryption to send and receive secure messages.






44. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






45. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






46. A device that distributes and manages print jobs sent from client computers.






47. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






48. A protocol used to connect to and access a remote computer.






49. A server that is primarily used to share - store - and access files.






50. A server that stores files and programs.