Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. World Health Organization - A division of the United Nations that manages the authority of international public health.






2. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






3. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






4. A system that extinguishes fire using special gases.






5. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






6. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






7. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






8. A method that uses the cloud to provide any or all infrastructure needs.






9. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






10. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






11. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






12. A security setting that determines the level of access a user or group account has to be particular resource.






13. A protocol that provides VPN functionality.






14. A device used for patient billing to capture an electronic signature.






15. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






16. A server that provides database services to other computers in a network.






17. A family of specification developed by the IEEE for wireless LAN technology.






18. A Protocol used to automatically assign IP addressing information to IP network computers.






19. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






20. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






21. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






22. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






23. A document that defines the authorized uses of PHI and how the information is to be used and managed.






24. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






25. A utility used to determine the route data takes to get to a particular destination.






26. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






27. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






28. A VPN protocol that is an extension of the PPP remote access protocol.






29. Cisco Systems' proprietary EAP implementation.






30. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






31. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






32. A formalized statement that defines how security will be implemented within a particular organization.






33. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






34. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






35. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






36. A network that connects wireless devices in a very close proximity but not though a wireless access point.






37. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






38. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






39. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






40. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






41. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






42. Software as a Service - A method that uses the cloud to provide application services to users.






43. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






44. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






45. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






46. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






47. Personal computer components that enable users to enter data or instructions into a computer.






48. A server that contains at least one DHCP scope.






49. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






50. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.