Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






2. A device that distributes and manages print jobs sent from client computers.






3. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






4. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






5. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






6. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






7. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






8. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






9. A Specialized file server that is designed and dedicated to support only data storage needs.






10. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






11. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






12. A utility used to determine the route data takes to get to a particular destination.






13. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






14. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






15. A document that defines the authorized uses of PHI and how the information is to be used and managed.






16. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






17. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






18. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






19. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






20. A VPN protocol that is an extension of the PPP remote access protocol.






21. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.






22. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






23. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






24. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






25. A method used to remove any sensitive data from a mobile device and permanently delete it.






26. A team of clinicians assigned to work with a specific patient at any given time.






27. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






28. Records that are not for public consumption and require appropriate release before they can be shared.






29. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






30. Personal computer components that enable users to view the text and graphical data output from a computer.






31. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






32. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






33. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






34. A hospital specialized to treat a specific disease or condition or a specific type of patient.






35. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






36. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






37. A security setting that determines the level of access a user or group account has to be particular resource.






38. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






39. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






40. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






41. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






42. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.






43. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






44. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






45. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






46. A TCP/IP utility used to verity the network connectivity of a computer.






47. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






48. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






49. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






50. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests