• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT HI150 EXAM QUESTIONS

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT HI150 EXAM QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -137 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation

Question 1: Integrity

Answer:

is the security principle that protects data from inappropriate modification or corruption.

Question 2: Which of the following would make patient information phi?

Answer:

account number

Question 3: Passwords

Answer:

should contain at least 7 characters, upper and lower case, special character Question 4: An e-mail that looks legitimate but is actually trying to obtain personal information

is called:

Answer:

phishing

Question 5: Using a magnet to destroy data on a magnetic disk is called

Answer:

degaussing

Question 6: Forensics steps

Answer:

documentation of the investigation conducted, protection and preservation of any evidence found, the logs reviewed, and reports, documentation of the chain of custody (who had access), the use of an exact copy of the media in the investigation

Question 7: Methods of authentication

Answer:

something the individual knows, such as a password or personal identifcation number. Something the individual has, such as a smart card or token. Something unique to the individual such as biometrics.

Question 8: Spyware

Answer:

may be used to track keystrokes and passwords, monitor Web sites visited, or other actions, and report these actions back to the creator of the spyware.

Question 9: Mitigation

Answer:

is the process of attempting to reduce or eliminate harmful effects of the breach Question 10: A type of network security is:

Answer:

Encryption

Question 11: Code sets

Answer:

a set of codes used to encode data elements. These codes record medical diagnoses, procedures, drugs, dental procedures, and other data elements.

Question 12: ASC X12 standard

Answer:

which it is used are: claims, encounters, & coordination of benefits, remittance advice, eligibility inquiry & response, precertification & referral authorization, enrollment in a health plan, premium payment Question 13: Poor security practices that do not lead to disclosure of ePHI are called;

Answer:

security events Question 14: A token is an example of:

Answer:

Something you have

Question 15: Examples of triggers are

Answer:

user has same last name as patient ? patient is a celebrity, employee, or other public figure ? access to sensitive diagnoses ? care providers accessing a patient in whose care they were not involved

Question 16: Network security

Answer:

is using technology to protect the data transmitted across the network and includes fire walls, encryption, and data integrity.

Question 17: Administrative safeguards include

Answer:

security management, assigned security responsibility, workforce security, information access management, security awareness & training, security incident procedures, contingency plan, evaluation, & business associate contract and other arrangements

Question 18: HIPAA technical safeguards

Answer:

access control, audit controls, integrity, person or entity authentication, transmission security

Question 19: Degausssing

Answer:

is application of a magnetic field to the media to render the data on it useless

Question 20: security rule utilizes

Answer:

administraive as well as technical safeguards in order to protect the ephi Question 21: During the course of forensics investigation a number of steps may be taken such as

Answer:

recovering deleted files, recovering passwords, analyzing file access creation and modification times, analyzing system and application logs, determining user and application activity on a system Question 22: bob.smith is an example of:

Answer:

Username

Question 23: Audit controls

Answer:

one component of this monitoring program. Mechanisms that record and examine activity in information systems

Question 24: which of the following is an example of the designated code set?

Answer:

icd-9-cm

Question 25: Physical safeguards

Answer:

physical measures, policies, and procedures to protect a covered entity's electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE AND STUDY GAMES ABOUT HI150 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -137 Questions and Answers -format set of mul...

UNLOCK ACCESS $11.99