Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






2. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






3. An implementation in which voice signals are transmitter over IP networks.






4. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






5. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






6. A hospital specialized to treat a specific disease or condition or a specific type of patient.






7. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






8. A facility equipped to treat patients suffering traumatic injuries.






9. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






10. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






11. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






12. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






13. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






14. Cisco Systems' proprietary EAP implementation.






15. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






16. A security setting that determines the level of access a user or group account has to be particular resource.






17. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






18. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






19. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






20. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






21. Records that are not for public consumption and require appropriate release before they can be shared.






22. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






23. Data that fits into a well-defined data model.






24. A device used for patient billing to capture an electronic signature.






25. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






26. A network that displays characteristics of more than one of the three standard network models.






27. A network that connects wireless devices in a very close proximity but not though a wireless access point.






28. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






29. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.






30. A type of network that is established spontaneously through a peer-to-peer wireless connection.






31. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






32. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






33. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






34. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






35. A device that connects multiple network that use the same protocol.






36. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






37. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.






38. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






39. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






40. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






41. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






42. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






43. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






44. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






45. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.






46. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






47. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






48. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






49. A private network that is configured within a public network such as the Internet.






50. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ