Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






2. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






3. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






4. A private network that is configured within a public network such as the Internet.






5. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






6. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






7. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






8. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






9. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






10. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






11. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






12. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






13. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






14. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






15. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






16. The U.S. federal program to provide healthcare for certain low-income individual and families.






17. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






18. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






19. Any medical treatment or services provided on an outpatient basis.






20. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






21. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






22. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






23. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






24. A protocol that provides VPN functionality.






25. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






26. A document that defines the authorized uses of PHI and how the information is to be used and managed.






27. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






28. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






29. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






30. A widely adopted markup language used in many documents - websites - and web applications.






31. Software protection systems in an organization.






32. A standard that adds AES security to the 802.11 standard






33. A network that displays characteristics of more than one of the three standard network models.






34. The ability to connect to systems and services from an offsite or remote location using a remote access method.






35. A security designation that determines the clearance for an information zone within the EHR system.






36. Mechanism that are put in place to limit access to electronic health information.






37. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






38. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






39. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






40. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






41. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






42. A device that connects multiple network that use the same protocol.






43. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






44. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






45. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






46. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.






47. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






48. A residential facility for patients who need constant medical or nursing care and supervision.






49. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






50. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests