Final Part 14 Flashcards
The information system crashed. It is now working but data was lost. Identify the process that needs to be performed.
A. Audit trail
B. Data recovery
C. Data integrity
D. Firewall
Data recovery
Unfortunately the facility had a hacker invade the EHR. What is the process that should be used to gather evidence?
A. Forensics
B. Mitigation
C. Spoliation
D. Security event
Forensics
A username and password is an example of a ________.
A. One-factor authentication
B. Single sign-on
C. Call back
D. Two-factor authentication
One-factor authentication
Our CE cannot access the data in the EHR due to a type of malware. The CE has been asked to pay $10,000 to get access back. This is known as ______.
A. Ransomware
B. Phishing
C. Virus
D. Bot
Ransomware
Which of the following is a strong password?
A. jsmith
B. 1234
C. Xerh54=
D. rachel
Xerh54=
Data required by a court case was deleted by the attending physician. The attorney for the opposing side has found out that the data has been deleted and has accused the CE of ________.
A. A security breach
B. Mitigation
C. Spoilation
D. Information access management
Spoilation
Access controls are classified as something you know, something you have, and something you ______.
A. Are
B. Choose
C. Design
D. Develop
Are
To access PHI, the user enters a user name and places their thumb in a reader. This is an example of what?
A. Two-factor authentication
B. Token
C. Biometric
D. One factor authentication
Two-factor authentication
Identify where ePHI is stored.
A. Voicemail
B. Paper health record
C. Fax machines and EHR
D. EHR
EHR
Connection to ePHI via the Internet has benefits but it also a(n) ______.
A. Vulnerability
B. Integrity issues
C. Threat
D. Security incident
Vulnerability