Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






2. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






3. Unwanted software that collects personal user data from a system and transmits it to a third party.






4. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






5. A physical security control system that has a door at each end of a secure chamber.






6. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






7. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






8. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






9. A LAN implementation in which nodes use a wireless network card to connect to other stations.






10. A utility used to determine the route data takes to get to a particular destination.






11. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






12. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






13. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






14. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






15. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






16. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






17. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






18. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






19. A device that has multiple network ports and combines multiple physical network segments into a single logical network.






20. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






21. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






22. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






23. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






24. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






25. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






26. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






27. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






28. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






29. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






30. Software components that allow users to perform specific tasks and job functions on a computer.






31. Mechanism that are put in place to limit access to electronic health information.






32. A network that connects wireless devices in a very close proximity but not though a wireless access point.






33. The acuteness - or level of severity - of an illness or disease.






34. Electronic conversion of hard copy documents to digital form.






35. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






36. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






37. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






38. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






39. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






40. A file property that essentially indicates whether the file has been modified since the last back up.






41. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






42. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






43. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






44. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






45. Any adverse reaction to a medication being taken.






46. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






47. A device that distributes and manages print jobs sent from client computers.






48. Data that fits into a well-defined data model.






49. A programming and query language common to many large scale database systems.






50. A protocol used to connect to and access a remote computer.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests