Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






2. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






3. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






4. A device used to convert paper to electronic format and then associates the file with the proper patient.






5. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.






6. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






7. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.






8. A server that provides database services to other computers in a network.






9. A security protocol created by the IEEE task group to replace WEP.






10. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






11. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.






12. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






13. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






14. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






15. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






16. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






17. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






18. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






19. An Instant messaging service that uses strong encryption to send and receive secure messages.






20. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






21. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






22. An independent - non-regulatory - not-for-profit organization that provides accreditation and certification for healthcare organizations in the United States.






23. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






24. A server that is primarily used to share - store - and access files.






25. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






26. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.






27. The U.S. Agency charged with protecting the health of the population and providing various human services.






28. Software as a Service - A method that uses the cloud to provide application services to users.






29. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






30. A system that extinguishes fire using special gases.






31. A personal computer storage device that uses fixed media and magnetic data storage.






32. A family of specification developed by the IEEE for wireless LAN technology.






33. Personal computer components that enable users to view the text and graphical data output from a computer.






34. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






35. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






36. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






37. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






38. Data that is added to a patient EMR to allow for quick searching and file location.






39. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






40. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






41. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






42. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






43. A method used to securely remove data from hard drives and other electronic storage devices.






44. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






45. A hospital specialized to treat a specific disease or condition or a specific type of patient.






46. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






47. A private room where a patient is examined and diagnosed by a medical practitioner.






48. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






49. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






50. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because