WGU C468 Knowledge Checks 2 | Questions with 100% Correct Answers | Verified | Latest Update

WGU C468 Knowledge Checks 2
System security involves protection against – ✔✔deliberate attacks, errors, omissions, disasters
and viruses
Which of the following is a mechanism that logs the user off a system after a specified period of
inactivity on the terminal or computer? – ✔✔automatic sign off
The sharing of private information in a situation in which a relationship has been established for
the purpose of treatment with the understanding this information will remain protected is –
✔✔Confidentiality
_ is a combo of hardware and software that forms a barrier between systems or different parts of a single system to protect those systems from unauthorized access – ✔✔Firewall The ability to use a health enterprise’s information system from outside locations such as a physician’s office is known as __. – ✔✔Remote access
What are forces behind the Health Information Exchange – ✔✔Federal legislation and demands
for safer more efficient healthcare

How do Health Information Exchanges (HIEs) impact healthcare delivery? – ✔✔HIEs increase
the efficiency and potentially the quality of the healthcare delivery system
Information & Data privacy – ✔✔includes the right to choose the condition and extent to which
information is shared
The Health Information Technology for Economic & Clinical Health Act (HITECH) is –
✔✔Included a privacy rule establishing national standards for protecting health information.
The SWOT analysis is conducted in which phase of the information system
Strengths Weakness Opportunities Threats – ✔✔Strategic planning stage
Training documents are developed and user training occurs in which phase of the project –
✔✔Implementation phase
Maintenance of an information system includes all of the following – ✔✔problem
solving/debugging
updating security protections
performing file back up procedures
Who determines the project implementation strategy? – ✔✔The implementation committee

Leave a Comment

Scroll to Top