Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






2. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






3. A personal computer storage device that stores data magnetically on a removable tape.






4. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






5. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






6. A family of specification developed by the IEEE for wireless LAN technology.






7. A hospital specialized to treat a specific disease or condition or a specific type of patient.






8. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






9. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






10. A widely adopted markup language used in many documents - websites - and web applications.






11. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






12. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






13. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






14. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






15. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






16. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






17. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






18. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






19. Any medical treatment or services provided on an outpatient basis.






20. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






21. Electronic messages sent between users or groups.






22. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






23. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






24. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






25. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






26. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






27. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






28. A software or hardware device that protects a system or network by blocking unwanted network traffic.






29. A Specialized file server that is designed and dedicated to support only data storage needs.






30. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






31. An Instant messaging service that uses strong encryption to send and receive secure messages.






32. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






33. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






34. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






35. A device used to convert paper to electronic format and then associates the file with the proper patient.






36. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






37. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






38. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






39. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






40. A formalized statement that defines how security will be implemented within a particular organization.






41. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






42. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






43. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






44. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






45. A document that lists agreed upon actions between two parties.






46. Personal computer components that enable users to enter data or instructions into a computer.






47. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






48. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






49. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






50. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.