Final Part 14 Flashcards

1
Q

The information system crashed. It is now working but data was lost. Identify the process that needs to be performed.

A. Audit trail
B. Data recovery
C. Data integrity
D. Firewall

A

Data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unfortunately the facility had a hacker invade the EHR. What is the process that should be used to gather evidence?

A. Forensics
B. Mitigation
C. Spoliation
D. Security event

A

Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A username and password is an example of a ________.

A. One-factor authentication
B. Single sign-on
C. Call back
D. Two-factor authentication

A

One-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Our CE cannot access the data in the EHR due to a type of malware. The CE has been asked to pay $10,000 to get access back. This is known as ______.

A. Ransomware
B. Phishing
C. Virus
D. Bot

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a strong password?

A. jsmith
B. 1234
C. Xerh54=
D. rachel

A

Xerh54=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data required by a court case was deleted by the attending physician. The attorney for the opposing side has found out that the data has been deleted and has accused the CE of ________.

A. A security breach
B. Mitigation
C. Spoilation
D. Information access management

A

Spoilation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access controls are classified as something you know, something you have, and something you ______.

A. Are
B. Choose
C. Design
D. Develop

A

Are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To access PHI, the user enters a user name and places their thumb in a reader. This is an example of what?

A. Two-factor authentication
B. Token
C. Biometric
D. One factor authentication

A

Two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify where ePHI is stored.

A. Voicemail
B. Paper health record
C. Fax machines and EHR
D. EHR

A

EHR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Connection to ePHI via the Internet has benefits but it also a(n) ______.

A. Vulnerability
B. Integrity issues
C. Threat
D. Security incident

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly