Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device that connects multiple network that use the same protocol.






2. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






3. A security protocol created by the IEEE task group to replace WEP.






4. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






5. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






6. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






7. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






8. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is required to provide services 24 hours a






9. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are






10. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






11. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






12. See Host Computer






13. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






14. A portable electronic security token that contains biometric user data - or other identification information.






15. The amount of work a server performs on a regular basis.






16. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






17. A residential facility for patients who need constant medical or nursing care and supervision.






18. A hospital specialized to treat a specific disease or condition or a specific type of patient.






19. Mechanism that are put in place to limit access to electronic health information.






20. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






21. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






22. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






23. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






24. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






25. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






26. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






27. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






28. Electronic messages sent between users or groups.






29. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






30. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






31. A facility equipped to treat patients suffering traumatic injuries.






32. A network that connects wireless devices in a very close proximity but not though a wireless access point.






33. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






34. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






35. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






36. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






37. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






38. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






39. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






40. A method that uses the cloud to provide any or all infrastructure needs.






41. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.






42. Records that are not for public consumption and require appropriate release before they can be shared.






43. The standard language that defines how web pages are formatted and displayed.






44. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






45. A server that proves the most accurate actual time to all clients in a computer network.






46. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






47. A device used to fax prescription or to print out prescription information for the EMR/EHR system.






48. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






49. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






50. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.