Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A company that provides access to the Internet.






2. An AES cipher-based encryption protocol used in WPA2.






3. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






4. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






5. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






6. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






7. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






8. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






9. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






10. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






11. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






12. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






13. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






14. The U.S. Agency charged with protecting the health of the population and providing various human services.






15. Mechanism that are put in place to limit access to electronic health information.






16. A security protocol created by the IEEE task group to replace WEP.






17. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






18. A method used to remove any sensitive data from a mobile device and permanently delete it.






19. An EHR system that had been certified by ONC






20. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.






21. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






22. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






23. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






24. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






25. A protocol used to connect to and access a remote computer.






26. A LAN implementation in which nodes use a wireless network card to connect to other stations.






27. A method used to securely remove data from hard drives and other electronic storage devices.






28. The ability to connect to systems and services from an offsite or remote location using a remote access method.






29. A TCP/IP utility used to verity the network connectivity of a computer.






30. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






31. World Health Organization - A division of the United Nations that manages the authority of international public health.






32. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






33. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






34. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






35. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






36. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






37. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






38. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






39. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.






40. Authentication schemes based on individuals' physical characters.






41. A server that proves the most accurate actual time to all clients in a computer network.






42. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






43. A system that extinguishes fire using special gases.






44. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






45. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






46. An area where surgical procedures are performer in a sterile environment.






47. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






48. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






49. A device used to fax prescription or to print out prescription information for the EMR/EHR system.






50. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.