Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol that provides VPN functionality.






2. A document that lists agreed upon actions between two parties.






3. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






4. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






5. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






6. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






7. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






8. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






9. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






10. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






11. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






12. Cisco Systems' proprietary EAP implementation.






13. A device that has multiple network ports and combines multiple physical network segments into a single logical network.






14. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






15. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






16. A Protocol used to automatically assign IP addressing information to IP network computers.






17. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






18. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






19. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






20. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






21. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






22. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






23. A security designation that determines the clearance for an information zone within the EHR system.






24. Personal computer components that enable users to view the text and graphical data output from a computer.






25. Software as a Service - A method that uses the cloud to provide application services to users.






26. A private network that is configured within a public network such as the Internet.






27. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






28. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






29. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






30. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






31. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






32. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






33. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






34. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






35. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






36. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






37. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






38. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






39. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






40. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






41. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






42. Records that are not for public consumption and require appropriate release before they can be shared.






43. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






44. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






45. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






46. A system that extinguishes fire using special gases.






47. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






48. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






49. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






50. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.