Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method used to securely remove data from hard drives and other electronic storage devices.






2. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






3. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






4. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






5. A system that extinguishes fire using special gases.






6. An area where all medical imaging procedures are conducted.






7. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






8. A formalized statement that defines how security will be implemented within a particular organization.






9. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






10. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






11. A company that provides access to the Internet.






12. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






13. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






14. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






15. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






16. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






17. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






18. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.






19. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






20. A security protocol created by the IEEE task group to replace WEP.






21. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.






22. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






23. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






24. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






25. A backup that backs up all selected files regardless of the state of the archived bit.






26. A protocol that provides VPN functionality.






27. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






28. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






29. A Protocol used to automatically assign IP addressing information to IP network computers.






30. A software or hardware device that protects a system or network by blocking unwanted network traffic.






31. Unwanted software that collects personal user data from a system and transmits it to a third party.






32. An area where surgical procedures are performer in a sterile environment.






33. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






34. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






35. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






36. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.






37. Any medical treatment or services provided on an outpatient basis.






38. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






39. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






40. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






41. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






42. A physical security control system that has a door at each end of a secure chamber.






43. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






44. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






45. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






46. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






47. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






48. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






49. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






50. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.