Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






2. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






3. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






4. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






5. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






6. A security protocol that uses certificates for authentication and encryption to protect web communication.






7. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






8. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






9. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






10. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






11. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






12. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






13. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.






14. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






15. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






16. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.






17. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






18. A communication protocol that enables the transfer of files between a user's workstation and a remote host






19. Mechanism that are put in place to limit access to electronic health information.






20. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






21. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






22. A server that proves the most accurate actual time to all clients in a computer network.






23. An AES cipher-based encryption protocol used in WPA2.






24. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






25. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






26. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






27. A protocol used to connect to and access a remote computer.






28. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






29. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






30. The standard language that defines how web pages are formatted and displayed.






31. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






32. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






33. A backup that backs up all selected files on a daily basis.






34. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






35. An implementation in which voice signals are transmitter over IP networks.






36. A programming and query language common to many large scale database systems.






37. An Instant messaging service that uses strong encryption to send and receive secure messages.






38. Electronic conversion of hard copy documents to digital form.






39. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






40. The U.S. Agency charged with protecting the health of the population and providing various human services.






41. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






42. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






43. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






44. A server that is primarily used to share - store - and access files.






45. A document that lists agreed upon actions between two parties.






46. The U.S. federal program to provide healthcare for certain low-income individual and families.






47. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






48. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






49. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






50. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests