Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






2. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






3. A private room where a patient is examined and diagnosed by a medical practitioner.






4. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






5. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






6. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






7. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






8. A system that extinguishes fire using special gases.






9. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






10. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






11. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






12. A personal computer storage device that stores data magnetically on a removable tape.






13. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






14. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






15. A hospital specialized to treat a specific disease or condition or a specific type of patient.






16. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






17. A device that provides network connectivity capabilities for computer systems.






18. A security protocol that uses certificates for authentication and encryption to protect web communication.






19. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.






20. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






21. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






22. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






23. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






24. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






25. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






26. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






27. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






28. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






29. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






30. A server that contains at least one DHCP scope.






31. An EHR system that had been certified by ONC






32. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






33. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






34. Data that fits into a well-defined data model.






35. A method used to remove any sensitive data from a mobile device and permanently delete it.






36. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






37. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






38. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






39. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






40. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






41. A device used for patient billing to capture an electronic signature.






42. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






43. A VPN protocol that is an extension of the PPP remote access protocol.






44. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






45. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






46. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






47. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.






48. A personal computer storage device that uses fixed media and magnetic data storage.






49. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






50. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.