Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






2. An AES cipher-based encryption protocol used in WPA2.






3. Personal computer components that enable users to view the text and graphical data output from a computer.






4. The official record that an organization would release if requested.






5. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






6. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






7. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






8. A protocol used to connect to and access a remote computer.






9. Mechanism that are put in place to limit access to electronic health information.






10. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






11. A Protocol used to automatically assign IP addressing information to IP network computers.






12. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






13. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.






14. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






15. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






16. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






17. A server that displays web pages to clients.






18. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






19. A device that connects multiple network that use the same protocol.






20. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






21. Data that is added to a patient EMR to allow for quick searching and file location.






22. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






23. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






24. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






25. Application code that enables various applications to communicate with each other.






26. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






27. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






28. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






29. A programming and query language common to many large scale database systems.






30. The standard language that defines how web pages are formatted and displayed.






31. Authentication schemes based on individuals' physical characters.






32. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






33. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






34. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






35. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






36. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






37. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






38. A protocol that provides VPN functionality.






39. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






40. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






41. A server that stores files and programs.






42. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






43. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






44. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






45. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






46. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






47. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






48. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






49. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






50. A type of network that is established spontaneously through a peer-to-peer wireless connection.