Chapter 12 1 While Having The Clients Consent Necessary Share

subject Type Homework Help
subject Pages 9
subject Words 3807
subject Authors Toni Hebda

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Hebda, Handbook of Informatics, 5/e Test Bank
Chapter 12
Question 1
Type: MCSA
Which of these is accurate about the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
and the use of technology?
1. Does not specify the use of particular technology
2. Refers to the Joint Commission standards for technology
3. Specifies the utilization of HIPAA approved technology
4. Provides a monthly Web-based list of approved technology
Question 2
Type: MCSA
During the course of client care, the 21-year-old client tells the nurse that she had an abortion last year but that no
one in her family knows. Which of these terms best describes the situation?
page-pf2
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
1. Consent
2. Privacy
3. Security
4. Confidentiality
Question 3
page-pf3
Type: MCSA
An overlay occurs when one individual is assigned in the master patient index to another individual's health
record. A health care facility has discovered that an overlay has occurred resulting in invalid data being stored in
key identifying fields. Which of the following information security areas does this breach affect?
1. Survivability
2. Integrity
3. Availability
4. Inadvertent disclosure
Question 4
Type: MCMA
Survivability is the capability of a system as a whole to fulfill its mission, in a timely manner, in the presence of
attacks, failures, or accidents. United States Hospitals (USH) is a large national hospital corporation with
processing centralized at their headquarters. USH is reviewing their information security plan. Part of their
page-pf4
mission is to provide emergency services to each regional area during catastrophic events. Which of the following
indicate that survivability has been specifically considered in the plan?
Standard Text: Select all that apply.
1. One hospital in each regional area has multiple sources of communication with USH central processing.
2. Emergency power generators for all associate hospitals are tested and serviced each week
3. Each night the system at USH central processing is backed up and stored in a remote location.
4. One hospital in each regional area has an emergency protocol in place for communicating directly with the
Department of Homeland Security.
5. One hospital in each regional area is especially prepared to maintain information system functionality for the
emergency, operating room, lab, and pharmacy units.
page-pf5
Question 5
Type: MCSA
Which one of the following passwords provides the most information and system security?
1. StJohns3821
2. p#3J24q7
3. p#5N24p7#hN5
4. p#3J24q7?hN5
page-pf6
Question 6
Type: MCSA
E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA
regulations affect e-mail use and routing infrastructures. When may potentially sensitive information be sent via
e-mail?
1. Client's consent was obtained to send information via e-mail
2. Recipient is known to the sender
3. E-mail is sent encrypted.
4. Organization's e-mail system has appropriate firewalls
page-pf7
Question 7
Type: MCMA
A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access
to client information, the NP must first slide a smartcard through a card reader and then place a finger on a
scanner. Which authentication measures were used to verify the NP's authorization to access client data?
Standard Text: Select all that apply.
1. Appearance of the user's name on a screen
2. Biometric authentication
3. Picture authentication package
4. Proximity radio authentication
5. Encrypted pass key authentication
page-pf8
Question 8
Type: FIB
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use
of information.
Standard Text:
Question 9
page-pf9
Type: MCSA
Why do most breaches of confidentiality occur?
1. Malicious behavior
2. System hacking
3. Intent
4. Carelessness
Question 10
Type: MCSA
A certified nursing assistant (CNA) at a local nursing home logs on to the facility's clinical information system.
The CNA can only see information about the clients that were assigned by the registered nurse for that day. The
page-pfa
CNA cannot see financial data regarding any of the assigned clients. This situation is an example of which of the
following?
1. Password protection
2. Computer forensics
3. Access levels
4. User authentication
Question 11
Type: FIB
page-pfb
A(n) ____________________ is one of the greatest threats that may come from inside sources, namely
employees, contractors, consultants, outsourced services, and vendors who view information inappropriately,
disrupt information availability, or corrupt data integrity.
Standard Text:
Question 12
Type: MCMA
Passwords are a common means to authenticate access to automated records. Which of the following are
recommendations for password selection and use?
Standard Text: Select all that apply.
1. Using software to test and eliminate easily compromised passwords
2. Using the browser "password save" feature
3. Deleting and replacing all system user passwords when an employee is terminated
4. Storing passwords in a file on the computer
5. Using the same password for access to all sites or systems

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.