Build Users & Grant Access Flashcards

1
Q

EMP

A

user master file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ECL

A

security classification master file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

User templates, also built in the EMP master file, allow you to maintain shared settings for ____ user records.

A

multiple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

four examples of settings set for an individual user

A

User ID and system login, password, default login department, link to a provider (SER) record if appropriate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False? An SER (provider record) can only be linked to one user record.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false? Linkable templates = user templates

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ records enable users to log in to Hyperspace

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Within Epic, access is controlled by security ____ and security ____.

A

points, classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security ____ grant users access to a piece of Epic functionality, like a key that allows you to open a specific door.

A

points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provider on the Fly or In Basket are examples of security points for features shared across ____ applications

A

multiple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

There are about ____ security points related to imaging functionality in Epic

A

200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A group of security points of the same type is a ____

A

security class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Basket is a type of security class that controls ____.

A

secure messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shared is a type of security class that controls ____

A

miscellaneous Epic-wide functionality (i.e. Provider on the Fly, documenting a PCP, SmartTools configuration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Radar is a type of security class that controls _____

A

Reporting and Learning Home dashboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reporting Workbench is a type of security class that controls ____

A

on demand reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EpicCare is a type of security class that controls

A

shared clinical activities, including Chart Review and Manage Orders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EpicCare Inpatient is a security class that controls ____

A

shared clinical activities for inpatients like Patient Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OpTime security class controls access to ___-

A

invasive tools, including timeouts, implants, and case-based functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

General Procedural security class controls shared imaging functionality including ____

A

ancillary orders, the tech work list, the reading worklist, plus case entry, case scheduling, and log creation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cupid security class controls Cupid-specific registry activities and exports like ___

A

CathPCI, ICD, PINNACLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Radiant security class controls ____

A

Breast imaging-specific activities, like Track Recs and Path Results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Registry security class controls ____

A

Shared clinical registry activities like Registry Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cadence security class controls ____

A

viewing, scheduling, and checking in appointments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Prelude security controls
registration screens
26
The Security Point Dictionary available via Galaxy contains all of the Epic-released security points, broken out by the type of security ____ to which they belong
points
27
If you make a print group report available on the Tech Work List via the profile, users will only be able to see that report if they have the ____ to access that activity.
security
28
The General Procedural security class contains security points for ___ procedural functionality.
shared
29
Most activities in Cupid and Radiant run off of ____ reports
application
30
Some activities, like the Tech work List and the Reading Work List, only require ____ security. There is no associated ____.
report, security point
31
security points } security class } template } ____
user
32
overbook security point
schedule appointments into time slots with available overbooks
33
super overbook security point
schedule appointments into time slots without available overbooks
34
override security point
schedule appointments outside of a provider's schedule
35
You just super-overbooked a time slot. In which security class did you set that up?
cadence
36
What are the four loevels of report security you can assign in the General Procedural security class?
Administrator, Power User, User (no edit), User (with edit)
37
If a user is unable to access the Tech Work List, which security class should you troubleshoot?
General Procedural
38
If a user is unable to check in patients, which security class should you troubleshoot?
Cadence
39
To troubleshoot scheduling issues for an end user, you will likely need to add a ____ to a ____ and link it to a ____
security point, security class, user template
40
true or false: User roles are records in the E2R master file that control much about how Hyperspace looks for a group of users
True
41
Every user needs a ___ in order to use Hyperspace.
role
42
A ____ tells the system what eactly Hyperspace should look like and how it should behave.
role
43
5 key settings associated with a role record
menu configuration, home workspace, maximum number of workspaces that can be opened at once, length of time for inactivity, recall for the user's last login department
44
Which settings does the role record control?
Hyperspace toolbar, startup activities, whether the system will remember the user's last login department
45
True or false: the same timeout settings are appropriate for all imaging users?
false
46
Cardiologists should only have two patient workspaces open at a time. In their user role, what should you enter in the maximum workspaces field?
3
47
To identify the descriptor for an activity, you should use ____.
About Hyperspace
48
When entering an order in Ancillary Orders, the Prov field is a required ____, and the patient's name is the ____ that the front desk user will enter in the Prov field.
item, value
49
You are updating the provider records for a few physicians who were recently hired at your organization. if you pres Shift+F5 in a given field, what is the result?
access to help text or possible values in a category list
50
When building and configuring reports, why is it useful to know the particular style of a print group?
Print groups that you add to a report should match the style of those already included in the report, and you can use the style to filter the Data Handbook when searching for print groups
51
What steps should you take to find the record IDs of a particular report or print group?
access the session information report in hyperspace and click the show report and print group IDs link
52
A user can be affected by up to ____ profiles at once, with ___ being the most specific level of the hierarchy.
6, user template
53
Which settings are controlled by a user's compiled profile?
status board quick buttons, chart review tabs, print group reports
54
true or false: When reading a Workflow Engine rule, the system typically stops reading once it matches on a series of nested conditions and executes any directives.
true
55
true or false: items (E2U) in Hyperspace can be both within menus or nested in submenus.
true
56
As an analyst in charge of troubleshooting menu configuration, how can the Menu Summary activity be useful to you?
Identifying the E3U records affecting users Viewing the menus records in a hierarchy similar to what an end user would see Identifying items that have been filtered out because of security
57
When building a provider record, setting the orders authorizing provider item to Yes gives end users the ability to do what?
authorize imaging orders
58
true or false: Anesthesiologists at your organization work in IR and the cath lab, as well as the OR. The anesthesiologist resource type should be available for both cases and appointments
true
59
In addition to configuring access to imaging specific-functionality, all clinical users working in imaging departments will need which types of security classes?
EpicCare, In Basket, Reporting Workbench, Shared
60
A front desk user is unable to access Ancillary Orders. What could be the problem?
He does not have general procedural security class or he is missing the access ancillary orders security point or he is missing the patient ancillary orders report security
61
What are configured in the user role record?
the limit for number of open workspaces, menu configuration, startup activities
62
Why do reading workstations or reading physicians need different settings than other users or workstations?
timeouts - radiologists read for long periods of time