Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






2. Electronic messages sent between users or groups.






3. A network that connects wireless devices in a very close proximity but not though a wireless access point.






4. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






5. A Protocol used to automatically assign IP addressing information to IP network computers.






6. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






7. A physical security control system that has a door at each end of a secure chamber.






8. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






9. A server that proves the most accurate actual time to all clients in a computer network.






10. A family of specification developed by the IEEE for wireless LAN technology.






11. A software or hardware device that protects a system or network by blocking unwanted network traffic.






12. A protocol that provides VPN functionality.






13. A VPN protocol that is an extension of the PPP remote access protocol.






14. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






15. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






16. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






17. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






18. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






19. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






20. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






21. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






22. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






23. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






24. The amount of work a server performs on a regular basis.






25. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






26. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






27. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






28. A programming and query language common to many large scale database systems.






29. Cisco Systems' proprietary EAP implementation.






30. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






31. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






32. A backup that backs up all selected files regardless of the state of the archived bit.






33. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






34. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






35. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.






36. A method used to remove any sensitive data from a mobile device and permanently delete it.






37. A type of network that is established spontaneously through a peer-to-peer wireless connection.






38. A device used to convert paper to electronic format and then associates the file with the proper patient.






39. A widely adopted markup language used in many documents - websites - and web applications.






40. The acuteness - or level of severity - of an illness or disease.






41. A protocol used to connect to and access a remote computer.






42. Secure Shell - A protocol for secure remote logon and secure transfer of data.






43. An area where surgical procedures are performer in a sterile environment.






44. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






45. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






46. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






47. A backup that backs up all selected files on a daily basis.






48. A network that displays characteristics of more than one of the three standard network models.






49. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






50. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.