Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server that proves the most accurate actual time to all clients in a computer network.






2. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






3. A team of clinicians assigned to work with a specific patient at any given time.






4. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






5. A facility equipped to treat patients suffering traumatic injuries.






6. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






7. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






8. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






9. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






10. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






11. A physical security control system that has a door at each end of a secure chamber.






12. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






13. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






14. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






15. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






16. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






17. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






18. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.






19. Hardware components that enable users to interact with computers.






20. An IT role that is responsible for the network infrastructure and components withing an organization.






21. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






22. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






23. Electronic messages sent between users or groups.






24. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






25. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






26. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






27. An EHR system that had been certified by ONC






28. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






29. A personal computer storage device that uses fixed media and magnetic data storage.






30. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






31. A device that provides network connectivity capabilities for computer systems.






32. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






33. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






34. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






35. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






36. An Instant messaging service that uses strong encryption to send and receive secure messages.






37. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






38. A security protocol created by the IEEE task group to replace WEP.






39. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






40. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






41. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






42. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






43. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






44. A standard that adds AES security to the 802.11 standard






45. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






46. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.






47. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






48. Systems that store networking hardware and provide networking services to local area networks within a medical environment.






49. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






50. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests