Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






2. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






3. Software components that allow users to perform specific tasks and job functions on a computer.






4. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






5. A VPN protocol that is an extension of the PPP remote access protocol.






6. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






7. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






8. A security designation that determines the clearance for an information zone within the EHR system.






9. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.






10. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






11. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






12. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






13. A system that extinguishes fire using special gases.






14. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






15. The U.S. federal program to provide healthcare for certain low-income individual and families.






16. A device that provides network connectivity capabilities for computer systems.






17. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






18. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.






19. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






20. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






21. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






22. Software protection systems in an organization.






23. A method used to remove any sensitive data from a mobile device and permanently delete it.






24. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






25. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.






26. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






27. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






28. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






29. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






30. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






31. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






32. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






33. The ability to connect to systems and services from an offsite or remote location using a remote access method.






34. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






35. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






36. The management of performance levels of servers to ensure that critical operations are highly available to resources.






37. The official record that an organization would release if requested.






38. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






39. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






40. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






41. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






42. A server that is primarily used to share - store - and access files.






43. An EHR system that had been certified by ONC






44. A device used to fax prescription or to print out prescription information for the EMR/EHR system.






45. A standard that adds AES security to the 802.11 standard






46. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






47. A residential facility for patients who need constant medical or nursing care and supervision.






48. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






49. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






50. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests