Chapter 7 Review Questions Flashcards

1
Q

What is the purpose of spyware?

A

Spyware is designed to secretly collect information on a computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of permission does a administrator account have?

A

An administrator account has full access to the data on a system and the administrator can make security changes to other user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Besides user accounts, what other controls do AD groups control?

A

In addition to using AD groups to assign permissions to user accounts, AD groups can also affect permissions of computers, printers, and any other device that joins the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four methods to unlock secured locks?

A

Keys, key fob, badges, and biometric scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the recommended specifications for the HVAC in the datacenter?

A

Recommended specifications are temperatures 64-80 degrees Fahrenheit with humidity ranging from 30%-55%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are surveillance cameras limited?

A

A limitation to surveillance cameras is they can only witness criminal activity; they cannot correct or stop it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three goals for storage encryption methods?

A

The three goals of encryption are:

1) Information in storage should remain confidential.
2) Data storage and retrieval should be fast.
3) Encryption should not waste space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why might PHI be shared outside of the facility’s personal?

A

PHI might need to be shared with the patient, another healthcare provider as a referral, or insurance agency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are remote employees issued computers owned by the facility?

A

The employee is typically issued a computer by the facility that is preconfigured for a VPN connection. Generally, facilities so not want employees tp connect using personal computers because the facility cannot control the security of any data moved to the personal computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the goal when disposing of media that contains PHI?

A

The basic rule is to make sure the data - whether hardcopy or on an electronic device - is unreadable, indecipherable, and cannot be reconstructed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly