Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device used to convert paper to electronic format and then associates the file with the proper patient.






2. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






3. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






4. A VPN protocol that is an extension of the PPP remote access protocol.






5. A residential facility for patients who need constant medical or nursing care and supervision.






6. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






7. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






8. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






9. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






10. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






11. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






12. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






13. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






14. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






15. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






16. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






17. A Protocol used to automatically assign IP addressing information to IP network computers.






18. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






19. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






20. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






21. A company that provides access to the Internet.






22. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






23. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






24. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






25. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






26. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






27. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






28. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






29. A server that displays web pages to clients.






30. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






31. Systems that store networking hardware and provide networking services to local area networks within a medical environment.






32. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






33. A portable electronic security token that contains biometric user data - or other identification information.






34. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






35. An IT role that is responsible for the network infrastructure and components withing an organization.






36. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






37. An area where surgical procedures are performer in a sterile environment.






38. A utility used to determine the route data takes to get to a particular destination.






39. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






40. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






41. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






42. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.






43. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






44. The ability to connect to systems and services from an offsite or remote location using a remote access method.






45. The official ANSI term for IDE drives.






46. A network that connects wireless devices in a very close proximity but not though a wireless access point.






47. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






48. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






49. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






50. A device used for patient billing to capture an electronic signature.