Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.






2. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






3. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






4. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






5. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






6. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






7. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






8. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






9. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






10. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






11. Software components that allow users to perform specific tasks and job functions on a computer.






12. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






13. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






14. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






15. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






16. Any adverse reaction to a medication being taken.






17. Records that are released for public viewing.






18. A server that contains at least one DHCP scope.






19. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.






20. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






21. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






22. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






23. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






24. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.






25. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






26. The fundamental security goal of ensuring that electronic data is not altered or tampered with.






27. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






28. The management of performance levels of servers to ensure that critical operations are highly available to resources.






29. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






30. World Health Organization - A division of the United Nations that manages the authority of international public health.






31. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






32. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






33. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






34. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






35. The U.S. federal program to provide healthcare for certain low-income individual and families.






36. A type of network that is established spontaneously through a peer-to-peer wireless connection.






37. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






38. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






39. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






40. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






41. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






42. A private network that is configured within a public network such as the Internet.






43. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






44. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






45. A method used to remove any sensitive data from a mobile device and permanently delete it.






46. A hospital specialized to treat a specific disease or condition or a specific type of patient.






47. Personal computer components that enable users to enter data or instructions into a computer.






48. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






49. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






50. A method used to securely remove data from hard drives and other electronic storage devices.