Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






2. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






3. An AES cipher-based encryption protocol used in WPA2.






4. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






5. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






6. Unwanted software that collects personal user data from a system and transmits it to a third party.






7. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






8. A physical security control system that has a door at each end of a secure chamber.






9. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






10. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






11. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.






12. A backup that backs up all selected files regardless of the state of the archived bit.






13. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






14. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






15. Data that fits into a well-defined data model.






16. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






17. A backup that backs up all selected files on a daily basis.






18. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






19. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






20. A server that is primarily used to share - store - and access files.






21. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






22. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






23. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






24. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






25. Mechanism that are put in place to limit access to electronic health information.






26. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






27. A standard that adds AES security to the 802.11 standard






28. A private network that is configured within a public network such as the Internet.






29. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






30. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






31. The fundamental security goal of ensuring that electronic data is not altered or tampered with.






32. The role - department - or individual that is formally responsible for a health record.






33. A network that displays characteristics of more than one of the three standard network models.






34. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






35. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






36. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






37. A security designation that determines the clearance for an information zone within the EHR system.






38. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






39. A personal computer storage decide that stores data optically - rather than magnetically.






40. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






41. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






42. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






43. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






44. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






45. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






46. A LAN implementation in which nodes use a wireless network card to connect to other stations.






47. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






48. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






49. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






50. A protocol used to connect to and access a remote computer.