978-0132574952 Chapter 12 Part 2

subject Type Homework Help
subject Pages 6
subject Words 2244
subject Authors Toni Lee Hebda

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
integrity. A hacker is an individual who has an average, or above average, knowledge of computer technology and
who dislike rules and restrictions.
Global Rationale:
Cognitive Level: Analyzing
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:
Question 12
Type: MCMA
Passwords are a common means to authenticate access to automated records. Which of the following are
recommendations for password selection and use?
Standard Text: Select all that apply.
1. Using software to test and eliminate easily compromised passwords
2. Using the browser "password save" feature
3. Deleting and replacing all system user passwords when an employee is terminated
4. Storing passwords in a file on the computer
5. Using the same password for access to all sites or systems
page-pf2
Question 13
Type: MCMA
Which of the following measures are recommended for enhancing information security?
Standard Text: Select all that apply.
1. File deletion software is used to overwrite hard disk files, using meaningless information.
2. Storage media that has been erased is disposed of in the dumpster.
3. Individuals routinely witness and record the destruction of records.
4. Papers such as prescriptions, laboratory specimen labels, and identification bracelets are disposed of in the
dumpster.
5. Each page of output is assigned a serial number and the numbers are recorded when documents are destroyed.
page-pf3
Question 14
Type: MCSA
Which of the following is the protection of information against threats to its integrity, inadvertent disclosure, or
availability?
1. Information security
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
page-pf4
2. Survivability
3. Confidentiality
4. Privacy
Question 15
Type: MCSA
During an attempted carjacking, the female victim slams a car door on the male assailant's hand, possibly causing
serious injuries. The assailant runs away. Local police contact the emergency department of a local hospital to
determine if anyone matching the assailant's description has been treated for a hand injury. The hospital reveals
that they currently have such a patient. The police ask the nurse manager to reveal the identity of the patient. It is
noted that no court order has been issued. The nurse manager asks the patient to sign a consent form that allows
the hospital to reveal his name and does mention the police. If the patient signs the consent form, what would it be
considered?
1. Informed consent
2. Consent
3. HIPAA violation
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
page-pf5
4. Breech of privacy
Question 16
Type: MCSA
Which of the following is a state of mind, a specific place, freedom from intrusion, or control over the exposure of
self or of personal information?
1. Privacy
2. Confidentiality
3. Security
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
page-pf6
4. HIPAA
Question 17
Type: MCSA
Which of the following is not a clue that spyware has infected a computer?
1. Ability to SKYPE
2. Appearance of pop-ups
3. Random error messages
4. Poor system performance

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.