Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server that provides database services to other computers in a network.






2. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






3. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






4. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






5. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






6. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






7. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






8. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






9. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






10. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






11. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






12. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






13. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






14. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






15. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






16. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






17. Cisco Systems' proprietary EAP implementation.






18. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






19. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.






20. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.






21. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.






22. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






23. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






24. Any adverse reaction to a medication being taken.






25. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






26. A network that displays characteristics of more than one of the three standard network models.






27. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






28. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






29. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






30. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






31. A server that is primarily used to share - store - and access files.






32. A device used for patient billing to capture an electronic signature.






33. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






34. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






35. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






36. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






37. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






38. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






39. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






40. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






41. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






42. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






43. The amount of work a server performs on a regular basis.






44. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






45. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






46. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






47. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






48. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






49. Electronic messages sent between users or groups.






50. Personal computer components that enable users to enter data or instructions into a computer.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests