Final Part 13 Flashcards

1
Q

Firewalls are part of _______.

A. Physical security
B. Encryption
C. Network Security
D. Administrative security

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT one of the goals of the HIPAA security rule?

A. Integrity
B. Confidentiality
C. Availability
D. Classification

A

Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An employee received an email that he thought was from the information technology department. He provided personal information. He was tricked by ______.

A. Phishing
B. Ransomware

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identify the true statement about audit logs.

A. Audit logs monitor only user actions
B. Audit logs only capture actions that are outside the norm
C. Audit logs should be available to a wide range of employees to facilitate audits
D. Audit logs should be stored on a different server than the ePHI

A

Audit logs should be stored on a different server than the ePHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the computer notified the security officer that a user accessed the PHI of a patient who is a celebrity. This is an example of a(n) ______.

A. Integrity
B. Transmission security
C. Trigger
D. Authentication

A

Trigger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Administrative safeguards include which of the following?

A. Audit controls
B. Emergency access procedure
C. Security awareness and training
D. Mechanism to authenticate ePHI

A

Security awareness and training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TRUE/FALSE: “At home” workers such as transcriptionists are not required to follow the workstation security rules for passwords, viewing of monitors by others, or locking computer screens

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The act of changing readable text into a vast series of “garbled” characters using complex mathematical algorithms is called:

A. Encryption
B. Transmission architecture
C. HIPAA protocol
D. Decoded messages

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The healthcare facility wants to do all it can to prevent downtime. Identify the concept that can help with this goal.

A. Redundancy
B. Facility access control
C. Emergency access procedures
D. Integrity

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use of e-mail for transmitting PHI is:

A. Permitted without restrictions
B. Allowed only if both sender and receiver(s) agree to keep ePHI private
C. Permitted only if a security algorithm is in place
D. Excluded from possible use under the security rule

A

Permitted only if a security algorithm is in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly