Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.






2. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






3. A TCP/IP utility used to verity the network connectivity of a computer.






4. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






5. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






6. A device used to convert paper to electronic format and then associates the file with the proper patient.






7. A system that extinguishes fire using special gases.






8. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






9. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






10. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






11. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






12. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






13. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






14. A standard that adds AES security to the 802.11 standard






15. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






16. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






17. A VPN protocol that is an extension of the PPP remote access protocol.






18. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






19. The U.S. Agency charged with protecting the health of the population and providing various human services.






20. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






21. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






22. An AES cipher-based encryption protocol used in WPA2.






23. Secure Shell - A protocol for secure remote logon and secure transfer of data.






24. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






25. A network that displays characteristics of more than one of the three standard network models.






26. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






27. A protocol that provides VPN functionality.






28. An IT role that is responsible for the network infrastructure and components withing an organization.






29. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.






30. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






31. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






32. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






33. A server that contains at least one DHCP scope.






34. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






35. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






36. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






37. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






38. An area where surgical procedures are performer in a sterile environment.






39. A server that is primarily used to share - store - and access files.






40. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






41. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.






42. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






43. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






44. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






45. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






46. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






47. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






48. A communication protocol that enables the transfer of files between a user's workstation and a remote host






49. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






50. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.