Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






2. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






3. A portable electronic security token that contains biometric user data - or other identification information.






4. An implementation in which voice signals are transmitter over IP networks.






5. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






6. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






7. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






8. The management of performance levels of servers to ensure that critical operations are highly available to resources.






9. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






10. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






11. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






12. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






13. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






14. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






15. A security protocol created by the IEEE task group to replace WEP.






16. A programming and query language common to many large scale database systems.






17. An EHR system that had been certified by ONC






18. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






19. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






20. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






21. An AES cipher-based encryption protocol used in WPA2.






22. A network attack in which an attacker disables systems that provide network services by consuming a networks link's available bandwidth - consuming a single system's available resources - or exploiting programming flaws in an application or operation






23. A private room where a patient is examined and diagnosed by a medical practitioner.






24. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






25. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






26. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






27. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






28. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






29. A family of specification developed by the IEEE for wireless LAN technology.






30. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






31. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






32. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






33. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






34. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






35. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






36. A security designation that determines the clearance for an information zone within the EHR system.






37. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






38. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






39. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






40. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






41. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






42. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






43. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






44. A hospital specialized to treat a specific disease or condition or a specific type of patient.






45. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






46. A security protocol that uses certificates for authentication and encryption to protect web communication.






47. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






48. World Health Organization - A division of the United Nations that manages the authority of international public health.






49. Mechanism that are put in place to limit access to electronic health information.






50. The role - department - or individual that is formally responsible for a health record.