Type
Quiz
Book Title
Handbook of Informatics for Nurses & Healthcare Professionals 5th Edition
ISBN 13
978-0132574952

978-0132574952 Chapter 12 Part 1

August 31, 2019
Hebda, Handbook of Informatics, 5/e Test Bank
Chapter 12
Question 1
Type: MCSA
Which of these is accurate about the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
and the use of technology?
1. Does not specify the use of particular technology
2. Refers to the Joint Commission standards for technology
3. Specifies the utilization of HIPAA approved technology
4. Provides a monthly Web-based list of approved technology
Question 2
Type: MCSA
During the course of client care, the 21-year-old client tells the nurse that she had an abortion last year but that no
one in her family knows. Which of these terms best describes the situation?
1. Consent
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
2. Privacy
3. Security
4. Confidentiality
Question 3
Type: MCSA
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
An overlay occurs when one individual is assigned in the master patient index to another individual's health
record. A health care facility has discovered that an overlay has occurred resulting in invalid data being stored in
key identifying fields. Which of the following information security areas does this breach affect?
1. Survivability
2. Integrity
3. Availability
4. Inadvertent disclosure
Question 4
Type: MCMA
Survivability is the capability of a system as a whole to fulfill its mission, in a timely manner, in the presence of
attacks, failures, or accidents. United States Hospitals (USH) is a large national hospital corporation with
processing centralized at their headquarters. USH is reviewing their information security plan. Part of their
mission is to provide emergency services to each regional area during catastrophic events. Which of the following
indicate that survivability has been specifically considered in the plan?
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
Standard Text: Select all that apply.
1. One hospital in each regional area has multiple sources of communication with USH central processing.
2. Emergency power generators for all associate hospitals are tested and serviced each week
3. Each night the system at USH central processing is backed up and stored in a remote location.
4. One hospital in each regional area has an emergency protocol in place for communicating directly with the
Department of Homeland Security.
5. One hospital in each regional area is especially prepared to maintain information system functionality for the
emergency, operating room, lab, and pharmacy units.
Question 5
Type: MCSA
Which one of the following passwords provides the most information and system security?
1. StJohns3821
2. p#3J24q7
3. p#5N24p7#hN5
4. p#3J24q7?hN5
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
Question 6
Type: MCSA
E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA
regulations affect e-mail use and routing infrastructures. When may potentially sensitive information be sent via
e-mail?
1. Client's consent was obtained to send information via e-mail
2. Recipient is known to the sender
3. E-mail is sent encrypted.
4. Organization's e-mail system has appropriate firewalls
Question 7
Type: MCMA
A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access
to client information, the NP must first slide a smartcard through a card reader and then place a finger on a
scanner. Which authentication measures were used to verify the NP's authorization to access client data?
Standard Text: Select all that apply.
1. Appearance of the user's name on a screen
2. Biometric authentication
3. Picture authentication package
4. Proximity radio authentication
5. Encrypted pass key authentication
Question 8
Type: FIB
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use
of information.
Standard Text:
Correct Answer: audit trail
Rationale : Software that tracks system access by users, creates a(n) audit trail that can reveal unusual activity or
inappropriate use of information.
Global Rationale:
Cognitive Level: Applying
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:
Question 9
Type: MCSA
Why do most breaches of confidentiality occur?
1. Malicious behavior
2. System hacking
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
3. Intent
4. Carelessness
Question 10
Type: MCSA
A certified nursing assistant (CNA) at a local nursing home logs on to the facility's clinical information system.
The CNA can only see information about the clients that were assigned by the registered nurse for that day. The
CNA cannot see financial data regarding any of the assigned clients. This situation is an example of which of the
following?
1. Password protection
2. Computer forensics
3. Access levels
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
4. User authentication
Question 11
Type: FIB
A(n) ____________________ is one of the greatest threats that may come from inside sources, namely
employees, contractors, consultants, outsourced services, and vendors who view information inappropriately,
disrupt information availability, or corrupt data integrity.
Standard Text:
Correct Answer: unauthorized user
Rationale : An opportunist looks to attack a new, unfamiliar operating system. An unauthorized user is one of the
greatest threats that may come from inside sources, namely employees, contractors, consultants, outsourced
services, and vendors who view information inappropriately, disrupt information availability, or corrupt data
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.