Final Part 13 Flashcards
Firewalls are part of _______.
A. Physical security
B. Encryption
C. Network Security
D. Administrative security
Network Security
Which of the following is NOT one of the goals of the HIPAA security rule?
A. Integrity
B. Confidentiality
C. Availability
D. Classification
Classification
An employee received an email that he thought was from the information technology department. He provided personal information. He was tricked by ______.
A. Phishing
B. Ransomware
Phishing
Identify the true statement about audit logs.
A. Audit logs monitor only user actions
B. Audit logs only capture actions that are outside the norm
C. Audit logs should be available to a wide range of employees to facilitate audits
D. Audit logs should be stored on a different server than the ePHI
Audit logs should be stored on a different server than the ePHI
the computer notified the security officer that a user accessed the PHI of a patient who is a celebrity. This is an example of a(n) ______.
A. Integrity
B. Transmission security
C. Trigger
D. Authentication
Trigger
Administrative safeguards include which of the following?
A. Audit controls
B. Emergency access procedure
C. Security awareness and training
D. Mechanism to authenticate ePHI
Security awareness and training
TRUE/FALSE: “At home” workers such as transcriptionists are not required to follow the workstation security rules for passwords, viewing of monitors by others, or locking computer screens
False
The act of changing readable text into a vast series of “garbled” characters using complex mathematical algorithms is called:
A. Encryption
B. Transmission architecture
C. HIPAA protocol
D. Decoded messages
Encryption
The healthcare facility wants to do all it can to prevent downtime. Identify the concept that can help with this goal.
A. Redundancy
B. Facility access control
C. Emergency access procedures
D. Integrity
Redundancy
Use of e-mail for transmitting PHI is:
A. Permitted without restrictions
B. Allowed only if both sender and receiver(s) agree to keep ePHI private
C. Permitted only if a security algorithm is in place
D. Excluded from possible use under the security rule
Permitted only if a security algorithm is in place