Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






2. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






3. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






4. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






5. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






6. An AES cipher-based encryption protocol used in WPA2.






7. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






8. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






9. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.






10. An area where surgical procedures are performer in a sterile environment.






11. A communication protocol that enables the transfer of files between a user's workstation and a remote host






12. A team of clinicians assigned to work with a specific patient at any given time.






13. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






14. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






15. Records that are not for public consumption and require appropriate release before they can be shared.






16. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






17. Cisco Systems' proprietary EAP implementation.






18. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






19. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






20. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






21. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






22. Mechanism that are put in place to limit access to electronic health information.






23. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






24. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






25. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






26. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.






27. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






28. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






29. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






30. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






31. Personal computer components that enable users to enter data or instructions into a computer.






32. A security protocol created by the IEEE task group to replace WEP.






33. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






34. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






35. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






36. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






37. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






38. A protocol used to connect to and access a remote computer.






39. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






40. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






41. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






42. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.






43. A security designation that determines the clearance for an information zone within the EHR system.






44. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






45. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






46. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






47. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






48. A network that displays characteristics of more than one of the three standard network models.






49. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






50. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests