Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






2. Secure Shell - A protocol for secure remote logon and secure transfer of data.






3. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






4. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






5. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






6. A TCP/IP utility used to verity the network connectivity of a computer.






7. A method used to remove any sensitive data from a mobile device and permanently delete it.






8. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






9. A portable electronic security token that contains biometric user data - or other identification information.






10. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






11. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






12. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.






13. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






14. A server that proves the most accurate actual time to all clients in a computer network.






15. Records that are not for public consumption and require appropriate release before they can be shared.






16. Authentication schemes based on individuals' physical characters.






17. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






18. A company that provides access to the Internet.






19. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






20. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






21. Any medical treatment or services provided on an outpatient basis.






22. A family of specification developed by the IEEE for wireless LAN technology.






23. A device that connects multiple network that use the same protocol.






24. The amount of work a server performs on a regular basis.






25. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






26. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






27. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






28. A personal computer storage decide that stores data optically - rather than magnetically.






29. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






30. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






31. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






32. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






33. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






34. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






35. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






36. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






37. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






38. The management of performance levels of servers to ensure that critical operations are highly available to resources.






39. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.






40. Software protection systems in an organization.






41. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






42. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






43. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






44. Application code that enables various applications to communicate with each other.






45. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






46. A document that defines the authorized uses of PHI and how the information is to be used and managed.






47. A device used to convert paper to electronic format and then associates the file with the proper patient.






48. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






49. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






50. The standard language that defines how web pages are formatted and displayed.