Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






2. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






3. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






4. A portable electronic security token that contains biometric user data - or other identification information.






5. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






6. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






7. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






8. A protocol used to connect to and access a remote computer.






9. A security setting that determines the level of access a user or group account has to be particular resource.






10. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






11. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






12. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






13. The official record that an organization would release if requested.






14. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






15. A team of clinicians assigned to work with a specific patient at any given time.






16. A type of network that is established spontaneously through a peer-to-peer wireless connection.






17. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






18. A file property that essentially indicates whether the file has been modified since the last back up.






19. World Health Organization - A division of the United Nations that manages the authority of international public health.






20. A personal computer storage device that stores data magnetically on a removable tape.






21. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.






22. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






23. A device used to convert paper to electronic format and then associates the file with the proper patient.






24. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






25. An EHR system that had been certified by ONC






26. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






27. Data that fits into a well-defined data model.






28. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






29. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






30. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






31. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






32. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






33. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






34. A device that provides network connectivity capabilities for computer systems.






35. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






36. Cisco Systems' proprietary EAP implementation.






37. A communication protocol that enables the transfer of files between a user's workstation and a remote host






38. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






39. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






40. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






41. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






42. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






43. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






44. A Specialized file server that is designed and dedicated to support only data storage needs.






45. A method used to remove any sensitive data from a mobile device and permanently delete it.






46. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






47. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






48. Software protection systems in an organization.






49. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






50. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests