Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.






2. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






3. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






4. A network that connects wireless devices in a very close proximity but not though a wireless access point.






5. Records that are released for public viewing.






6. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






7. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






8. A security protocol that uses certificates for authentication and encryption to protect web communication.






9. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






10. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






11. A widely adopted markup language used in many documents - websites - and web applications.






12. Systems that store networking hardware and provide networking services to local area networks within a medical environment.






13. A family of specification developed by the IEEE for wireless LAN technology.






14. Secure Shell - A protocol for secure remote logon and secure transfer of data.






15. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






16. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






17. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






18. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






19. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






20. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






21. Software as a Service - A method that uses the cloud to provide application services to users.






22. Mechanism that are put in place to limit access to electronic health information.






23. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.






24. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






25. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






26. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






27. A personal computer storage decide that stores data optically - rather than magnetically.






28. The U.S. Agency charged with protecting the health of the population and providing various human services.






29. A utility used to determine the route data takes to get to a particular destination.






30. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






31. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






32. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






33. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.






34. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






35. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






36. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






37. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






38. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






39. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






40. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






41. A server that is primarily used to share - store - and access files.






42. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






43. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






44. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






45. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






46. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






47. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






48. A LAN implementation in which nodes use a wireless network card to connect to other stations.






49. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






50. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.