Chapter 12 2 Storage media that has been erased is disposed of in the dumpster

subject Type Homework Help
subject Pages 9
subject Words 3417
subject Authors Toni Hebda

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Question 13
Type: MCMA
Which of the following measures are recommended for enhancing information security?
Standard Text: Select all that apply.
1. File deletion software is used to overwrite hard disk files, using meaningless information.
2. Storage media that has been erased is disposed of in the dumpster.
3. Individuals routinely witness and record the destruction of records.
4. Papers such as prescriptions, laboratory specimen labels, and identification bracelets are disposed of in the
dumpster.
5. Each page of output is assigned a serial number and the numbers are recorded when documents are destroyed.
page-pf2
page-pf3
Question 14
Type: MCSA
Which of the following is the protection of information against threats to its integrity, inadvertent disclosure, or
availability?
1. Information security
2. Survivability
3. Confidentiality
4. Privacy
Question 15
Type: MCSA
page-pf4
During an attempted carjacking, the female victim slams a car door on the male assailant's hand, possibly causing
serious injuries. The assailant runs away. Local police contact the emergency department of a local hospital to
determine if anyone matching the assailant's description has been treated for a hand injury. The hospital reveals
that they currently have such a patient. The police ask the nurse manager to reveal the identity of the patient. It is
noted that no court order has been issued. The nurse manager asks the patient to sign a consent form that allows
the hospital to reveal his name and does mention the police. If the patient signs the consent form, what would it be
considered?
1. Informed consent
2. Consent
3. HIPAA violation
4. Breech of privacy
page-pf5
Question 16
Type: MCSA
Which of the following is a state of mind, a specific place, freedom from intrusion, or control over the exposure of
self or of personal information?
1. Privacy
2. Confidentiality
3. Security
4. HIPAA
Question 17
Type: MCSA
page-pf6
Which of the following is not a clue that spyware has infected a computer?
1. Ability to SKYPE
2. Appearance of pop-ups
3. Random error messages
4. Poor system performance
Question 18
Type: MCMA
The security of any information system is part of the strategic planning process. Information system security is
planned for with the intention of achieving which of the following goals?
Standard Text: Select all that apply.
1. Patient confidentiality protection
2. Information integrity protection
page-pf7
3. Timely availability protection
4. Cybercrime prevention
5. HIT compliance
Question 19
Type: MCSA
Which of the following is true about effective security?
page-pf8
1. Assessment of security resources enables organizational personnel to devise methods to protect information
systems data.
2. Assessment of security resources provides super users with in depth access knowledge.
3. Assessment of security resources enables organizational personnel to alter the flow of information.
4. Assessment of security resources enables organizational personnel to define terms in the data dictionary.
Question 20
Type: FIB
______________________________ is the process of determining whether someone is who he or she professes to
be. This usually involves a username and a password, but can include other methods of proving identity, such as a
smart card, retina scan, voice recognition, or fingerprints.
Standard Text:
page-pf9
Question 21
Type: MCSA
Which of the following best depicts the impact that Internet technology has on the security of health related
information?
1. Health information on the Internet requires the same types of safeguards provided for information found in
private offices and information systems.
2. Health information on the Internet does not require the same types of safeguards provided for information
found in private offices and information systems.
3. Health information on the Internet requires more types of safeguards than what are provided for information
found in private offices and information systems.
4. Health information on the Internet requires fewer safeguards than what are provided for information found in
private offices and information systems.
page-pfa
Question 22
Type: MCSA
The Health Insurance Portability and Accountability Act (HIPAA) requires organizations to determine threats and
appropriate protective measures for information, not only in electronic formats, but in all formats. Which of the
following measures cannot be incorporated by organizations to secure all data?
1. Creation of authentication policies
2. Specific software
3. Spyware
4. Firewall

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.