Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






2. A method used to remove any sensitive data from a mobile device and permanently delete it.






3. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






4. A portable electronic security token that contains biometric user data - or other identification information.






5. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






6. A server that displays web pages to clients.






7. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.






8. A device used for patient billing to capture an electronic signature.






9. Data that is added to a patient EMR to allow for quick searching and file location.






10. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






11. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






12. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






13. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






14. A backup that backs up all selected files on a daily basis.






15. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






16. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






17. A server that is primarily used to share - store - and access files.






18. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.






19. A utility used to determine the route data takes to get to a particular destination.






20. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






21. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






22. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






23. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






24. A widely adopted markup language used in many documents - websites - and web applications.






25. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






26. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






27. A device used to convert paper to electronic format and then associates the file with the proper patient.






28. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






29. An EHR system that had been certified by ONC






30. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






31. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






32. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.






33. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






34. A security protocol created by the IEEE task group to replace WEP.






35. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






36. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






37. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






38. Electronic messages sent between users or groups.






39. An AES cipher-based encryption protocol used in WPA2.






40. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






41. The U.S. Agency charged with protecting the health of the population and providing various human services.






42. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






43. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






44. Cisco Systems' proprietary EAP implementation.






45. A formalized statement that defines how security will be implemented within a particular organization.






46. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






47. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






48. A company that provides access to the Internet.






49. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






50. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.