Exam 4: Security Ruling Explained
Exam 1: Introduction to Hipaa43 Questions
Exam 2: Privacy Issues Explained47 Questions
Exam 3: Transactions and Code Sets46 Questions
Exam 4: Security Ruling Explained53 Questions
Exam 5: Unique Health Identifiers and Hipaa Myths50 Questions
Exam 6: Further Rulings Influencing Hipaa34 Questions
Select questions type
Security of e-PHI has to do with keeping the data secure from a breach in the information system's security protocols.
(True/False)
4.8/5
(33)
Match the HIPAA term with the correct definition.
-A study to find the problems or gaps between current practices and what the Security Rule requires.
(Multiple Choice)
4.8/5
(35)
Only monetary fines may be levied for violation under the HIPAA Security Rule.
(True/False)
4.8/5
(38)
Identify the choice that best completes the statement or answers the question.
-Audit trails of computer systems include
(Multiple Choice)
4.8/5
(33)
Match the item that is addressed under the Security Rule with the correct area of safeguards.
-access control by login and password
(Multiple Choice)
5.0/5
(31)
Identify the choice that best completes the statement or answers the question.
-The Security Officer is to keep record of
(Multiple Choice)
4.7/5
(42)
Match the HIPAA term with the correct definition.
-A process whereby cost-effective security control measures may be selected to balance the cost of security control measures against the losses expected if these measures were not in place.
(Multiple Choice)
4.7/5
(32)
Identify the choice that best completes the statement or answers the question.
-Risk analysis in the Security Rule considers
(Multiple Choice)
4.9/5
(40)
Identify the choice that best completes the statement or answers the question.
-HIPAA training must be provided to
(Multiple Choice)
4.8/5
(37)
Security and privacy of protected health information really cover the same issues.
(True/False)
4.8/5
(35)
Identify the choice that best completes the statement or answers the question.
-Which are the five areas the DHHS has mandated each covered entity to address so that e-PHI is maintained securely?
(Multiple Choice)
4.8/5
(35)
Identify the choice that best completes the statement or answers the question.
-Complaints about security breaches may be reported to
(Multiple Choice)
4.9/5
(34)
Identify the choice that best completes the statement or answers the question.
-What step is part of reporting of security incidents?
(Multiple Choice)
4.9/5
(31)
Match the item that is addressed under the Security Rule with the correct area of safeguards.
-integrity of data
(Multiple Choice)
4.9/5
(37)
The Office of HIPAA Standards seeks voluntary compliance to the Security Rule.
(True/False)
4.8/5
(38)
Identify the choice that best completes the statement or answers the question.
-The policy of disclosing the "minimum necessary" e-PHI addresses
(Multiple Choice)
4.8/5
(42)
Match the item that is addressed under the Security Rule with the correct area of safeguards.
-device and media controls
(Multiple Choice)
5.0/5
(28)
Identify the choice that best completes the statement or answers the question.
-Integrity of e-PHI requires confirmation that the data
(Multiple Choice)
4.9/5
(38)
One good requirement to ensure secure access control is to install automatic logoff at each workstation.
(True/False)
4.9/5
(33)
Identify the choice that best completes the statement or answers the question.
-The required areas of the Security Rule
(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 53
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)