Exam 4: Security Rule Explained
Exam 1: Introduction to Hipaa37 Questions
Exam 2: Privacy Issues Explained37 Questions
Exam 3: Transactions and Code Sets31 Questions
Exam 4: Security Rule Explained47 Questions
Exam 5: Unique Health Identifiers and Hipaa Myths43 Questions
Select questions type
The ability to continue after a disaster of some kind is a requirement of Security Rule. What item is considered part of the contingency plan or business continuity plan?
Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
C
If a business visitor is also a Business Associate, that individual does not need to be escorted in the building to ensure protection of PHI.
Free
(True/False)
4.8/5
(35)
Correct Answer:
False
Only monetary fines may be levied for violation under the HIPAA Security Rule.
Free
(True/False)
4.7/5
(38)
Correct Answer:
False
The Office of HIPAA Standards may not initiate an investigation without receiving a formal complaint.
(True/False)
4.9/5
(41)
Match the HIPAA term with the correct definition.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(38)
One good requirement to ensure secure access control is to install automatic logoff at each workstation.
(True/False)
4.9/5
(24)
To protect e-PHI that is sent through the Internet, a covered entity must use encryption technology to minimize the risks. E-PHI that is "at rest" must also be encrypted to maintain security.
(True/False)
4.8/5
(38)
"At home" workers such as transcriptionists are not required to follow the workstation security rules for passwords, viewing of monitors by others, or locking of computer screens.
(True/False)
4.9/5
(29)
Which of the following items is a technical safeguard of the Security Rule?
(Multiple Choice)
4.8/5
(25)
The documentation for policies and procedures of the Security Rule must be kept for
(Multiple Choice)
4.7/5
(44)
The act of changing readable text into a vast series of "garbled" characters using complex mathematical algorithms is called
(Multiple Choice)
4.9/5
(32)
Security of e-PHI has to do with keeping the data secure from a breach in the information system's security protocols.
(True/False)
4.8/5
(33)
Reasonable physical safeguards for patient care areas include:
(Multiple Choice)
4.8/5
(33)
The Security Rule addresses four areas in order to provide sufficient physical safeguards. Which of the following is NOT one of them?
(Multiple Choice)
4.8/5
(32)
Compliance to the Security Rule is solely the responsibility of the Security Officer.
(True/False)
4.8/5
(42)
Whenever a device has become obsolete, the Security Office must
(Multiple Choice)
4.8/5
(34)
The Administrative Safeguards mandated by HIPAA include which of the following?
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 47
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)