Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






2. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






3. Personal computer components that enable users to enter data or instructions into a computer.






4. A file property that essentially indicates whether the file has been modified since the last back up.






5. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






6. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






7. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






8. A document that lists agreed upon actions between two parties.






9. A device used for patient billing to capture an electronic signature.






10. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






11. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






12. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






13. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






14. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






15. A family of specification developed by the IEEE for wireless LAN technology.






16. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






17. The amount of work a server performs on a regular basis.






18. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






19. Software as a Service - A method that uses the cloud to provide application services to users.






20. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is required to provide services 24 hours a






21. A backup that backs up all selected files on a daily basis.






22. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






23. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






24. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






25. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






26. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






27. An area where surgical procedures are performer in a sterile environment.






28. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






29. The role - department - or individual that is formally responsible for a health record.






30. A programming and query language common to many large scale database systems.






31. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.






32. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






33. A type of network that is established spontaneously through a peer-to-peer wireless connection.






34. The management of performance levels of servers to ensure that critical operations are highly available to resources.






35. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






36. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






37. An Instant messaging service that uses strong encryption to send and receive secure messages.






38. A method used to remove any sensitive data from a mobile device and permanently delete it.






39. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






40. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






41. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






42. A portable electronic security token that contains biometric user data - or other identification information.






43. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






44. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






45. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






46. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






47. A company that provides access to the Internet.






48. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






49. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






50. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.