Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






2. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






3. Personal computer components that enable users to enter data or instructions into a computer.






4. A server that proves the most accurate actual time to all clients in a computer network.






5. A server that contains at least one DHCP scope.






6. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






7. A method used to remove any sensitive data from a mobile device and permanently delete it.






8. The U.S. Agency charged with protecting the health of the population and providing various human services.






9. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






10. A network that displays characteristics of more than one of the three standard network models.






11. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






12. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






13. A device that provides network connectivity capabilities for computer systems.






14. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






15. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






16. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






17. A personal computer storage device that uses fixed media and magnetic data storage.






18. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






19. Unwanted software that collects personal user data from a system and transmits it to a third party.






20. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






21. The standard language that defines how web pages are formatted and displayed.






22. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






23. An Instant messaging service that uses strong encryption to send and receive secure messages.






24. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






25. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






26. A server that displays web pages to clients.






27. Data that fits into a well-defined data model.






28. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






29. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






30. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






31. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






32. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






33. The official record that an organization would release if requested.






34. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






35. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






36. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






37. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






38. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






39. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






40. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






41. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






42. A Specialized file server that is designed and dedicated to support only data storage needs.






43. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






44. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






45. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






46. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






47. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






48. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.






49. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






50. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.