Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An area where surgical procedures are performer in a sterile environment.






2. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






3. Mechanism that are put in place to limit access to electronic health information.






4. Records that are not for public consumption and require appropriate release before they can be shared.






5. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






6. A Specialized file server that is designed and dedicated to support only data storage needs.






7. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






8. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






9. An AES cipher-based encryption protocol used in WPA2.






10. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






11. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






12. The acuteness - or level of severity - of an illness or disease.






13. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






14. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






15. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






16. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






17. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






18. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






19. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






20. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






21. A method used to securely remove data from hard drives and other electronic storage devices.






22. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






23. Software protection systems in an organization.






24. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






25. An IT role that is responsible for the network infrastructure and components withing an organization.






26. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






27. A server that proves the most accurate actual time to all clients in a computer network.






28. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






29. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






30. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






31. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






32. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






33. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






34. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






35. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






36. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






37. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






38. A residential facility for patients who need constant medical or nursing care and supervision.






39. A backup that backs up all selected files on a daily basis.






40. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






41. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






42. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






43. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






44. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






45. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






46. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






47. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






48. A security protocol that uses certificates for authentication and encryption to protect web communication.






49. A LAN implementation in which nodes use a wireless network card to connect to other stations.






50. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.