Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data that fits into a well-defined data model.






2. The management of performance levels of servers to ensure that critical operations are highly available to resources.






3. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






4. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






5. Any adverse reaction to a medication being taken.






6. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






7. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






8. A network that connects wireless devices in a very close proximity but not though a wireless access point.






9. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






10. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






11. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






12. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






13. A formalized statement that defines how security will be implemented within a particular organization.






14. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






15. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






16. The fundamental security goal of ensuring that electronic data is not altered or tampered with.






17. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






18. The official record that an organization would release if requested.






19. A security protocol that uses certificates for authentication and encryption to protect web communication.






20. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






21. Data that is added to a patient EMR to allow for quick searching and file location.






22. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






23. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






24. A backup that backs up all selected files regardless of the state of the archived bit.






25. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






26. A hospital specialized to treat a specific disease or condition or a specific type of patient.






27. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






28. A type of network that is established spontaneously through a peer-to-peer wireless connection.






29. See Host Computer






30. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






31. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






32. The amount of work a server performs on a regular basis.






33. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






34. A physical security control system that has a door at each end of a secure chamber.






35. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






36. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






37. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






38. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






39. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.






40. An Instant messaging service that uses strong encryption to send and receive secure messages.






41. A server that contains at least one DHCP scope.






42. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






43. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






44. An area where all medical imaging procedures are conducted.






45. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






46. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






47. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






48. The ability to connect to systems and services from an offsite or remote location using a remote access method.






49. A protocol that provides VPN functionality.






50. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.