Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






2. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






3. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






4. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






5. A type of network that is established spontaneously through a peer-to-peer wireless connection.






6. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






7. A device that provides network connectivity capabilities for computer systems.






8. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






9. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






10. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






11. Application code that enables various applications to communicate with each other.






12. Any medical treatment or services provided on an outpatient basis.






13. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






14. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






15. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






16. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






17. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






18. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






19. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






20. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






21. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






22. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






23. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






24. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






25. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






26. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






27. A method used to remove any sensitive data from a mobile device and permanently delete it.






28. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






29. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






30. Data that is added to a patient EMR to allow for quick searching and file location.






31. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






32. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






33. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






34. An AES cipher-based encryption protocol used in WPA2.






35. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






36. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






37. A personal computer storage decide that stores data optically - rather than magnetically.






38. A method used to securely remove data from hard drives and other electronic storage devices.






39. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






40. The U.S. federal program to provide healthcare for certain low-income individual and families.






41. The ability to connect to systems and services from an offsite or remote location using a remote access method.






42. A method that uses the cloud to provide any or all infrastructure needs.






43. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






44. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






45. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






46. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






47. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






48. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






49. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






50. A private network that is configured within a public network such as the Internet.