Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






2. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






3. A method that uses the cloud to provide any or all infrastructure needs.






4. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






5. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






6. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






7. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






8. A server that is primarily used to share - store - and access files.






9. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






10. Records that are released for public viewing.






11. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






12. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






13. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






14. A portable electronic security token that contains biometric user data - or other identification information.






15. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






16. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






17. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






18. A method used to securely remove data from hard drives and other electronic storage devices.






19. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






20. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






21. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






22. A security protocol that uses certificates for authentication and encryption to protect web communication.






23. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






24. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






25. An implementation in which voice signals are transmitter over IP networks.






26. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






27. A device that distributes and manages print jobs sent from client computers.






28. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






29. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






30. Any medical treatment or services provided on an outpatient basis.






31. Unwanted software that collects personal user data from a system and transmits it to a third party.






32. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






33. A standard that adds AES security to the 802.11 standard






34. A network that displays characteristics of more than one of the three standard network models.






35. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






36. Authentication schemes based on individuals' physical characters.






37. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






38. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






39. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






40. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






41. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






42. A private network that is configured within a public network such as the Internet.






43. A residential facility for patients who need constant medical or nursing care and supervision.






44. A server that proves the most accurate actual time to all clients in a computer network.






45. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






46. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






47. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






48. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






49. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






50. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.