Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An area where all medical imaging procedures are conducted.






2. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






3. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






4. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






5. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






6. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






7. A device used for patient billing to capture an electronic signature.






8. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






9. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






10. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






11. A device used to convert paper to electronic format and then associates the file with the proper patient.






12. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






13. A personal computer storage device that uses fixed media and magnetic data storage.






14. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






15. The U.S. Agency charged with protecting the health of the population and providing various human services.






16. An implementation in which voice signals are transmitter over IP networks.






17. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






18. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






19. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






20. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






21. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






22. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






23. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






24. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






25. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






26. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






27. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






28. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






29. Secure Shell - A protocol for secure remote logon and secure transfer of data.






30. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is required to provide services 24 hours a






31. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






32. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






33. The official ANSI term for IDE drives.






34. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






35. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






36. A server that contains at least one DHCP scope.






37. World Health Organization - A division of the United Nations that manages the authority of international public health.






38. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






39. A team of clinicians assigned to work with a specific patient at any given time.






40. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






41. The U.S. federal program to provide healthcare for certain low-income individual and families.






42. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






43. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






44. Any medical treatment or services provided on an outpatient basis.






45. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






46. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






47. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






48. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






49. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.






50. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests