This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Hebda, Handbook of Informatics, 5/e Test Bank
Chapter 12
Question 1
Type: MCSA
Which of these is accurate about the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
and the use of technology?
1. Does not specify the use of particular technology
2. Refers to the Joint Commission standards for technology
3. Specifies the utilization of HIPAA approved technology
4. Provides a monthly Web-based list of approved technology
Question 2
Type: MCSA
During the course of client care, the 21-year-old client tells the nurse that she had an abortion last year but that no
one in her family knows. Which of these terms best describes the situation?
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
1. Consent
2. Privacy
3. Security
4. Confidentiality
Question 3
Type: MCSA
An overlay occurs when one individual is assigned in the master patient index to another individual's health
record. A health care facility has discovered that an overlay has occurred resulting in invalid data being stored in
key identifying fields. Which of the following information security areas does this breach affect?
1. Survivability
2. Integrity
3. Availability
4. Inadvertent disclosure
Question 4
Type: MCMA
Survivability is the capability of a system as a whole to fulfill its mission, in a timely manner, in the presence of
attacks, failures, or accidents. United States Hospitals (USH) is a large national hospital corporation with
processing centralized at their headquarters. USH is reviewing their information security plan. Part of their
mission is to provide emergency services to each regional area during catastrophic events. Which of the following
indicate that survivability has been specifically considered in the plan?
Standard Text: Select all that apply.
1. One hospital in each regional area has multiple sources of communication with USH central processing.
2. Emergency power generators for all associate hospitals are tested and serviced each week
3. Each night the system at USH central processing is backed up and stored in a remote location.
4. One hospital in each regional area has an emergency protocol in place for communicating directly with the
Department of Homeland Security.
5. One hospital in each regional area is especially prepared to maintain information system functionality for the
emergency, operating room, lab, and pharmacy units.
Question 5
Type: MCSA
Which one of the following passwords provides the most information and system security?
1. StJohns3821
2. p#3J24q7
3. p#5N24p7#hN5
4. p#3J24q7?hN5
Question 6
Type: MCSA
E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA
regulations affect e-mail use and routing infrastructures. When may potentially sensitive information be sent via
e-mail?
1. Client's consent was obtained to send information via e-mail
2. Recipient is known to the sender
3. E-mail is sent encrypted.
4. Organization's e-mail system has appropriate firewalls
Question 7
Type: MCMA
A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access
to client information, the NP must first slide a smartcard through a card reader and then place a finger on a
scanner. Which authentication measures were used to verify the NP's authorization to access client data?
Standard Text: Select all that apply.
1. Appearance of the user's name on a screen
2. Biometric authentication
3. Picture authentication package
4. Proximity radio authentication
5. Encrypted pass key authentication
Question 8
Type: FIB
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use
of information.
Standard Text:
Question 9
Type: MCSA
Why do most breaches of confidentiality occur?
1. Malicious behavior
2. System hacking
3. Intent
4. Carelessness
Question 10
Type: MCSA
A certified nursing assistant (CNA) at a local nursing home logs on to the facility's clinical information system.
The CNA can only see information about the clients that were assigned by the registered nurse for that day. The
CNA cannot see financial data regarding any of the assigned clients. This situation is an example of which of the
following?
1. Password protection
2. Computer forensics
3. Access levels
4. User authentication
Question 11
Type: FIB
A(n) ____________________ is one of the greatest threats that may come from inside sources, namely
employees, contractors, consultants, outsourced services, and vendors who view information inappropriately,
disrupt information availability, or corrupt data integrity.
Standard Text:
Question 12
Type: MCMA
Passwords are a common means to authenticate access to automated records. Which of the following are
recommendations for password selection and use?
Standard Text: Select all that apply.
1. Using software to test and eliminate easily compromised passwords
2. Using the browser "password save" feature
3. Deleting and replacing all system user passwords when an employee is terminated
4. Storing passwords in a file on the computer
5. Using the same password for access to all sites or systems
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.