Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Application code that enables various applications to communicate with each other.






2. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






3. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






4. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






5. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






6. The role - department - or individual that is formally responsible for a health record.






7. The ability to connect to systems and services from an offsite or remote location using a remote access method.






8. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






9. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






10. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






11. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






12. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






13. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






14. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






15. A method used to remove any sensitive data from a mobile device and permanently delete it.






16. A communication protocol that enables the transfer of files between a user's workstation and a remote host






17. A backup that backs up all selected files on a daily basis.






18. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






19. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.






20. An EHR system that had been certified by ONC






21. The U.S. federal program to provide healthcare for certain low-income individual and families.






22. A backup that backs up all selected files regardless of the state of the archived bit.






23. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






24. A device that connects multiple network that use the same protocol.






25. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.






26. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






27. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






28. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.






29. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






30. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






31. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






32. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






33. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.






34. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






35. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






36. A physical security control system that has a door at each end of a secure chamber.






37. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






38. A VPN protocol that is an extension of the PPP remote access protocol.






39. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






40. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






41. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






42. A type of network that is established spontaneously through a peer-to-peer wireless connection.






43. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.






44. The fundamental security goal of ensuring that electronic data is not altered or tampered with.






45. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






46. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






47. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






48. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






49. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






50. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.