Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






2. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






3. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






4. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






5. Personal computer components that enable users to enter data or instructions into a computer.






6. The standard language that defines how web pages are formatted and displayed.






7. A software or hardware device that protects a system or network by blocking unwanted network traffic.






8. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






9. An area where surgical procedures are performer in a sterile environment.






10. A security protocol that uses certificates for authentication and encryption to protect web communication.






11. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






12. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






13. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






14. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






15. Unwanted software that collects personal user data from a system and transmits it to a third party.






16. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






17. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






18. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






19. Hardware components that enable users to interact with computers.






20. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






21. A device used to convert paper to electronic format and then associates the file with the proper patient.






22. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






23. The U.S. federal program to provide healthcare for certain low-income individual and families.






24. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






25. The management of performance levels of servers to ensure that critical operations are highly available to resources.






26. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






27. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






28. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






29. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






30. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






31. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






32. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






33. A device used for patient billing to capture an electronic signature.






34. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






35. Data that fits into a well-defined data model.






36. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






37. A VPN protocol that is an extension of the PPP remote access protocol.






38. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






39. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






40. Systems that store networking hardware and provide networking services to local area networks within a medical environment.






41. A server that provides database services to other computers in a network.






42. A method used to remove any sensitive data from a mobile device and permanently delete it.






43. A facility equipped to treat patients suffering traumatic injuries.






44. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






45. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






46. An IT role that is responsible for the network infrastructure and components withing an organization.






47. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






48. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






49. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






50. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests