Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






2. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






3. A network attack in which an attacker disables systems that provide network services by consuming a networks link's available bandwidth - consuming a single system's available resources - or exploiting programming flaws in an application or operation






4. A residential facility for patients who need constant medical or nursing care and supervision.






5. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






6. A protocol that provides VPN functionality.






7. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






8. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






9. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






10. Application code that enables various applications to communicate with each other.






11. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






12. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






13. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






14. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.






15. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






16. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






17. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






18. Secure Shell - A protocol for secure remote logon and secure transfer of data.






19. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






20. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






21. A LAN implementation in which nodes use a wireless network card to connect to other stations.






22. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.






23. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






24. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






25. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






26. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






27. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






28. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






29. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






30. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






31. The official ANSI term for IDE drives.






32. A server that provides database services to other computers in a network.






33. A personal computer storage device that stores data magnetically on a removable tape.






34. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.






35. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






36. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






37. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






38. An implementation in which voice signals are transmitter over IP networks.






39. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.






40. A facility equipped to treat patients suffering traumatic injuries.






41. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






42. A security designation that determines the clearance for an information zone within the EHR system.






43. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






44. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






45. A network that connects wireless devices in a very close proximity but not though a wireless access point.






46. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






47. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






48. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






49. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






50. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.