Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






2. Software components that allow users to perform specific tasks and job functions on a computer.






3. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






4. A formalized statement that defines how security will be implemented within a particular organization.






5. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






6. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.






7. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






8. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






9. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






10. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






11. A type of network that is established spontaneously through a peer-to-peer wireless connection.






12. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






13. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






14. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






15. A file property that essentially indicates whether the file has been modified since the last back up.






16. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






17. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






18. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






19. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






20. A device that has multiple network ports and combines multiple physical network segments into a single logical network.






21. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






22. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






23. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






24. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






25. Mechanism that are put in place to limit access to electronic health information.






26. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






27. The role - department - or individual that is formally responsible for a health record.






28. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






29. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






30. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






31. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






32. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






33. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






34. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






35. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






36. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






37. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






38. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






39. An implementation in which voice signals are transmitter over IP networks.






40. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






41. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






42. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






43. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






44. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






45. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






46. See Host Computer






47. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






48. An area where surgical procedures are performer in a sterile environment.






49. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






50. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.