PDF Download
FREE AND STUDY GAMES ABOUT HI150 EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -137 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: Integrity
Answer:
is the security principle that protects data from inappropriate modification or corruption.
Question 2: Which of the following would make patient information phi?
Answer:
account number
Question 3: Passwords
Answer:
should contain at least 7 characters, upper and lower case, special character Question 4: An e-mail that looks legitimate but is actually trying to obtain personal information
is called:
Answer:
phishing
Question 5: Using a magnet to destroy data on a magnetic disk is called
Answer:
degaussing
Question 6: Forensics steps
Answer:
documentation of the investigation conducted, protection and preservation of any evidence found, the logs reviewed, and reports, documentation of the chain of custody (who had access), the use of an exact copy of the media in the investigation
Question 7: Methods of authentication
Answer:
something the individual knows, such as a password or personal identifcation number. Something the individual has, such as a smart card or token. Something unique to the individual such as biometrics.
Question 8: Spyware
Answer:
may be used to track keystrokes and passwords, monitor Web sites visited, or other actions, and report these actions back to the creator of the spyware.
Question 9: Mitigation
Answer:
is the process of attempting to reduce or eliminate harmful effects of the breach Question 10: A type of network security is:
Answer:
Encryption
Question 11: Code sets
Answer:
a set of codes used to encode data elements. These codes record medical diagnoses, procedures, drugs, dental procedures, and other data elements.
Question 12: ASC X12 standard
Answer:
which it is used are: claims, encounters, & coordination of benefits, remittance advice, eligibility inquiry & response, precertification & referral authorization, enrollment in a health plan, premium payment Question 13: Poor security practices that do not lead to disclosure of ePHI are called;
Answer:
security events Question 14: A token is an example of:
Answer:
Something you have
Question 15: Examples of triggers are
Answer:
user has same last name as patient ? patient is a celebrity, employee, or other public figure ? access to sensitive diagnoses ? care providers accessing a patient in whose care they were not involved
Question 16: Network security
Answer:
is using technology to protect the data transmitted across the network and includes fire walls, encryption, and data integrity.
Question 17: Administrative safeguards include
Answer:
security management, assigned security responsibility, workforce security, information access management, security awareness & training, security incident procedures, contingency plan, evaluation, & business associate contract and other arrangements
Question 18: HIPAA technical safeguards
Answer:
access control, audit controls, integrity, person or entity authentication, transmission security
Question 19: Degausssing
Answer:
is application of a magnetic field to the media to render the data on it useless
Question 20: security rule utilizes
Answer:
administraive as well as technical safeguards in order to protect the ephi Question 21: During the course of forensics investigation a number of steps may be taken such as
Answer:
recovering deleted files, recovering passwords, analyzing file access creation and modification times, analyzing system and application logs, determining user and application activity on a system Question 22: bob.smith is an example of:
Answer:
Username
Question 23: Audit controls
Answer:
one component of this monitoring program. Mechanisms that record and examine activity in information systems
Question 24: which of the following is an example of the designated code set?
Answer:
icd-9-cm
Question 25: Physical safeguards
Answer:
physical measures, policies, and procedures to protect a covered entity's electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion