Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






2. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






3. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






4. Electronic conversion of hard copy documents to digital form.






5. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






6. A formalized statement that defines how security will be implemented within a particular organization.






7. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.






8. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






9. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






10. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.






11. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






12. A hospital specialized to treat a specific disease or condition or a specific type of patient.






13. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






14. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






15. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






16. A document that defines the authorized uses of PHI and how the information is to be used and managed.






17. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






18. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






19. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






20. Authentication schemes based on individuals' physical characters.






21. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






22. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






23. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






24. Any adverse reaction to a medication being taken.






25. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.






26. An area where all medical imaging procedures are conducted.






27. A security designation that determines the clearance for an information zone within the EHR system.






28. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.






29. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






30. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






31. The role - department - or individual that is formally responsible for a health record.






32. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






33. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






34. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






35. The management of performance levels of servers to ensure that critical operations are highly available to resources.






36. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






37. Personal computer components that enable users to view the text and graphical data output from a computer.






38. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






39. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






40. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






41. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






42. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






43. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






44. A method that uses the cloud to provide any or all infrastructure needs.






45. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






46. A device that connects multiple network that use the same protocol.






47. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






48. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






49. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






50. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.