Type
Quiz
Book Title
Handbook of Informatics for Nurses & Healthcare Professionals 5th Edition
ISBN 13
978-0132574952

978-0132574952 Chapter 12 Part 3

August 31, 2019
Rationale 2: Clues that spyware has infected a computer include the presence of pop-up ads, keys that do not
work, random error messages, and poor system performance. Because of the security threat to PHI that this
represents, spyware detection software should be utilized.
Rationale 3: Clues that spyware has infected a computer include the presence of pop-up ads, keys that do not
work, random error messages, and poor system performance. Because of the security threat to PHI that this
represents, spyware detection software should be utilized.
Rationale 4: Clues that spyware has infected a computer include the presence of pop-up ads, keys that do not
work, random error messages, and poor system performance. Because of the security threat to PHI that this
represents, spyware detection software should be utilized.
Global Rationale:
Cognitive Level: Understanding
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:
Question 18
Type: MCMA
The security of any information system is part of the strategic planning process. Information system security is
planned for with the intention of achieving which of the following goals?
Standard Text: Select all that apply.
1. Patient confidentiality protection
2. Information integrity protection
3. Timely availability protection
4. Cybercrime prevention
5. HIT compliance
Question 19
Type: MCSA
Which of the following is true about effective security?
1. Assessment of security resources enables organizational personnel to devise methods to protect information
systems data.
2. Assessment of security resources provides super users with in depth access knowledge.
3. Assessment of security resources enables organizational personnel to alter the flow of information.
4. Assessment of security resources enables organizational personnel to define terms in the data dictionary.
Question 20
Type: FIB
______________________________ is the process of determining whether someone is who he or she professes to
be. This usually involves a username and a password, but can include other methods of proving identity, such as a
smart card, retina scan, voice recognition, or fingerprints.
Standard Text:
Correct Answer: Authentication
Rationale : Authentication is the process of determining whether someone is who he or she professes to be. This
usually involves a username and a password, but can include other methods of proving identity, such as a smart
card, retina scan, voice recognition, or fingerprints.
Global Rationale:
Cognitive Level: Remembering
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:
Question 21
Type: MCSA
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
Which of the following best depicts the impact that Internet technology has on the security of health related
information?
1. Health information on the Internet requires the same types of safeguards provided for information found in
private offices and information systems.
2. Health information on the Internet does not require the same types of safeguards provided for information
found in private offices and information systems.
3. Health information on the Internet requires more types of safeguards than what are provided for information
found in private offices and information systems.
4. Health information on the Internet requires fewer safeguards than what are provided for information found in
private offices and information systems.
Question 22
Type: MCSA
The Health Insurance Portability and Accountability Act (HIPAA) requires organizations to determine threats and
appropriate protective measures for information, not only in electronic formats, but in all formats. Which of the
following measures cannot be incorporated by organizations to secure all data?
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
1. Creation of authentication policies
2. Specific software
3. Spyware
4. Firewall
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.