Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A facility equipped to treat patients suffering traumatic injuries.






2. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






3. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






4. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.






5. A company that provides access to the Internet.






6. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






7. Electronic messages sent between users or groups.






8. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






9. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






10. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






11. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






12. Any adverse reaction to a medication being taken.






13. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






14. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






15. A server that stores files and programs.






16. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






17. The official record that an organization would release if requested.






18. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






19. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






20. Records that are not for public consumption and require appropriate release before they can be shared.






21. Software protection systems in an organization.






22. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






23. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






24. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






25. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






26. Unwanted software that collects personal user data from a system and transmits it to a third party.






27. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






28. A server that displays web pages to clients.






29. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






30. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






31. A server that proves the most accurate actual time to all clients in a computer network.






32. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






33. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






34. The official ANSI term for IDE drives.






35. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






36. A protocol used to connect to and access a remote computer.






37. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






38. A family of specification developed by the IEEE for wireless LAN technology.






39. A server that provides database services to other computers in a network.






40. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






41. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






42. An IT role that is responsible for the network infrastructure and components withing an organization.






43. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






44. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.






45. Personal computer components that enable users to enter data or instructions into a computer.






46. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






47. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






48. A method used to remove any sensitive data from a mobile device and permanently delete it.






49. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






50. A security protocol created by the IEEE task group to replace WEP.