Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The management of performance levels of servers to ensure that critical operations are highly available to resources.






2. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






3. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






4. A server that stores files and programs.






5. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






6. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






7. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






8. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






9. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






10. A device used to convert paper to electronic format and then associates the file with the proper patient.






11. Software protection systems in an organization.






12. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






13. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






14. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






15. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






16. An implementation in which voice signals are transmitter over IP networks.






17. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






18. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






19. A protocol that provides VPN functionality.






20. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






21. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






22. A device used for patient billing to capture an electronic signature.






23. A server that provides database services to other computers in a network.






24. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






25. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






26. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






27. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






28. Cisco Systems' proprietary EAP implementation.






29. Systems that store networking hardware and provide networking services to local area networks within a medical environment.






30. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






31. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






32. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






33. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






34. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






35. A system that extinguishes fire using special gases.






36. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






37. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






38. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






39. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






40. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






41. A device that provides network connectivity capabilities for computer systems.






42. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






43. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






44. Data that is added to a patient EMR to allow for quick searching and file location.






45. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






46. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






47. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.






48. A method used to remove any sensitive data from a mobile device and permanently delete it.






49. Electronic conversion of hard copy documents to digital form.






50. A network that displays characteristics of more than one of the three standard network models.