Go to the previous assignment Previous
Rose's assignments
Next Go to the next assignment
Rose's final grade is 75/95, C+ (78.95%)
Rework the quiz - If Rose needs to make corrections (or answer skipped questions) on a submitted quiz, use this option.
Grant a retake - If Rose needs a brand new attempt, use this option to let them take the quiz again.
View Rose's detailed history
for this assignment

About this grade

This quiz was turned in on time on Thursday, December 1 at 3:54 PM
Response from guest guest

excellent work Notino slevovy kod

feedback from you, 7/20/2020 4:55 AM
Rose submitted this Attempt on time on Thursday, December 1 at 3:54 PM Rose spent 1 hour taking the Attempt
Rose took this quiz from IP address 208.209.191.108
Add a bonus Expand all responses
Quiz
1)
5/5
5/5

The primary reason that healthcare organizations develop business continuity plans to minimize the effects of which of the following?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Electrical power surges
Unselected
Hardware and software malfunctions
Correct Selected
Computer downtime
Unselected
Deliberate damage to information systems caused by computer hackers
2)
5/5
5/5

Critique this statement : HIPAA  represents an attempt ot establish best practices and standards for health information security.

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
This is a true statement
Unselected
This is not a true statement as HIPAA does not establish best practices for health information security
Unselected
This is not a true stement as HIPAA does not establish standards for health informaiton security
Unselected
This is not a true statement as HIPAA does not address health information security
3)
5/5
5/5

A risk analysis is useful to ________

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
Identify security threats
Unselected
Identify which employees should have access to data
Unselected
Establish password controls
Unselected
Establish audit controls
4)
0/5
0/5

Which of the following is true regarding HIPAA security provisions?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Covered entities must appoint two chief security officers who can share security responsibilites for 24 hour coverage
Incorrect Selected
Covered entities must conduct employee security training sessions every six months for all employees
Unscored Unselected
Covered entities must retain policies for 6 years after they are not longer used
Unselected
Covered entities must conduct technical and nontechnical evaluations every six years
5)
5/5
5/5

Which of the following is a technique that can be used to determine what information access privileges an employee should have?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
Context-based
Unselected
Risk assessment
Unselected
Risk anylysis
Unselected
Business continuity
6)
0/5
0/5

The HIPAA data integrity standard requires that organizations do which of the following?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unscored Unselected
Keep documented logs of system access and access attempts.
Incorrect Selected
Assign role-based access privileges
Unselected
Establish workstation security
Unselected
Conduct workforce training for correct data input
7)
5/5
5/5

Which of the following is required by HIPAA  standards?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
A written contingency plan
Unselected
Review of audit trails every 24 hours
Unselected
Use passwords for all transactions
Unselected
Permanent bolting of workstations in public areas
8)
5/5
5/5

Security controls built into a computer software program to protect information security and integrity are which of the following?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Physical controls
Unselected
Administrative controls
Correct Selected
Application controls
Unselected
Media controls
9)
5/5
5/5

This type of control is designed to prevent damage caused by computer hackers.

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Administrative control
Unselected
Access control
Correct Selected
Network control
Unselected
Physical access control
10)
0/5
0/5

Policies and procedures that address the management of computer resources and security are which of the following?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Incorrect Selected
Access controls
Unscored Unselected
Adminiistrative controls
Unselected
Audit controls
Unselected
Role based controls
11)
0/5
0/5

 Match the following concepts embodies by information security programs with their functions.

(5pts)
For this:Rose selected: Student Results Answer key:
Safeguarding system access
Availabilty
Privacy
Safeguarding data accuracy
Integrity
Ensuring system access when needed
Privacy
Availabilty
12)
5/5
5/5

Which of the following terms means that data should be complete, accurate, and consistent?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Data privacy
Unselected
Data confidentiality
Correct Selected
Data integrity
Unselected
Data safety
13)
5/5
5/5

What is the biggest threat to the security of healthcare  data?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Natural disasters
Unselected
Fires
Correct Selected
Employees
Unselected
Equipment malfunctions
14)
5/5
5/5

What does the term access control mean?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Identifying the greatest security risks
Correct Selected
Identifying which data employees should have a right to use
Unselected
Implementing safeguards that protect physical media
Unselected
Prohibiting employees from accessing a computer system
15)
5/5
5/5

Which of the following is  a software program that tracks every access to data in the computer system?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Access control
Correct Selected
Audit trail
Unselected
Edit check
Unselected
Risk assessement
16)
5/5
5/5

Which of the following is an example of technical security?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
Integrity
Unselected
Workforce security
Unselected
Sniffer
Unselected
Facility access controls
17)
5/5
5/5

Policies were recently rewritten.  How long does the facility need to retain the obsolete policies?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Five years
Correct Selected
Six years
Unselected
Two years
Unselected
One year
18)
5/5
5/5

An audit identifies that an employee accessed a patient whose name is the same as the employee. this is known as a/an ______

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Personal authentication
Unselected
Unsecured data
Unselected
Audit control
Correct Selected
Trigger
19)
5/5
5/5

In two computer systems the same data element is different. This is what type of issue?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Data availability
Correct Selected
Data consistency
Unselected
Data definition
Unselected
Data dictionary

Go to the previous assignment Previous
Rose's assignments
Next Go to the next assignment