Go to the previous assignment Previous
Anita's assignments
Next Go to the next assignment
Anita's final grade is 80/95, B (84.21%)
Rework the quiz - If Anita needs to make corrections (or answer skipped questions) on a submitted quiz, use this option.
Reopen the quiz - Anita did not use 2 retakes. Use this option to give access to those attempts.
View Anita's detailed history
for this assignment

About this grade

This quiz was turned in on time on Sunday, March 19 at 11:55 PM
This grade is based on the average of all grades received among all attempts. You can edit the final grade options to change those settings.
Response from guest guest

Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Cracking Cracked Crack Nulled Jasa SEO Jasa SEO Profesional Jasa Pembuatan Website Jasa Google Adwords Jasa Pembuatan Website Jasa Google Adwords Cracking Cracked Crack Diabolic Traffic Bot Crack SEO Tools Jasa SEO SEO Checker

feedback from you, 3/26/2017 8:10 PM
yfydu etut
feedback from you, 3/26/2017 8:11 PM
Anita submitted this Attempt on time on Sunday, November 27 at 3:55 PM Anita spent 41 minutes taking the Attempt
Anita took this quiz from IP address 67.255.253.208
Add a bonus Expand all responses
Quiz
1)
5/5
5/5

The primary reason that healthcare organizations develop business continuity plans to minimize the effects of which of the following?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Electrical power surges
Unselected
Hardware and software malfunctions
Correct Selected
Computer downtime
Unselected
Deliberate damage to information systems caused by computer hackers
2)
5/5
5/5

Critique this statement : HIPAA  represents an attempt ot establish best practices and standards for health information security.

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
This is a true statement
Unselected
This is not a true statement as HIPAA does not establish best practices for health information security
Unselected
This is not a true stement as HIPAA does not establish standards for health informaiton security
Unselected
This is not a true statement as HIPAA does not address health information security
3)
5/5
5/5

A risk analysis is useful to ________

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
Identify security threats
Unselected
Identify which employees should have access to data
Unselected
Establish password controls
Unselected
Establish audit controls
4)
5/5
5/5

Which of the following is true regarding HIPAA security provisions?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Covered entities must appoint two chief security officers who can share security responsibilites for 24 hour coverage
Unselected
Covered entities must conduct employee security training sessions every six months for all employees
Correct Selected
Covered entities must retain policies for 6 years after they are not longer used
Unselected
Covered entities must conduct technical and nontechnical evaluations every six years
5)
5/5
5/5

Which of the following is a technique that can be used to determine what information access privileges an employee should have?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
Context-based
Unselected
Risk assessment
Unselected
Risk anylysis
Unselected
Business continuity
6)
5/5
5/5

The HIPAA data integrity standard requires that organizations do which of the following?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
Keep documented logs of system access and access attempts.
Unselected
Assign role-based access privileges
Unselected
Establish workstation security
Unselected
Conduct workforce training for correct data input
7)
0/5
0/5

Which of the following is required by HIPAA  standards?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Correct Selected
A written contingency plan
Unselected
Review of audit trails every 24 hours
Unselected
Use passwords for all transactions
Unselected
Permanent bolting of workstations in public areas
8)
5/5
5/5

Security controls built into a computer software program to protect information security and integrity are which of the following?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Physical controls
Unselected
Administrative controls
Correct Selected
Application controls
Unselected
Media controls
9)
5/5
5/5

This type of control is designed to prevent damage caused by computer hackers.

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Administrative control
Unselected
Access control
Correct Selected
Network control
Unselected
Physical access control
10)
5/5
5/5

Policies and procedures that address the management of computer resources and security are which of the following?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Access controls
Correct Selected
Adminiistrative controls
Unselected
Audit controls
Unselected
Role based controls
11)
5/5
5/5

 Match the following concepts embodies by information security programs with their functions.

(5pts)
For this:Anita selected: Student Results  
Safeguarding system access
Privacy
Safeguarding data accuracy
Integrity
Ensuring system access when needed
Availabilty
12)
5/5
5/5

Which of the following terms means that data should be complete, accurate, and consistent?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Data privacy
Unselected
Data confidentiality
Correct Selected
Data integrity
Unselected
Data safety
13)
5/5
5/5

What is the biggest threat to the security of healthcare  data?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Natural disasters
Unselected
Fires
Correct Selected
Employees
Unselected
Equipment malfunctions
14)
5/5
5/5

What does the term access control mean?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Identifying the greatest security risks
Correct Selected
Identifying which data employees should have a right to use
Unselected
Implementing safeguards that protect physical media
Unselected
Prohibiting employees from accessing a computer system
15)
0/5
0/5

Which of the following is  a software program that tracks every access to data in the computer system?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Incorrect Selected
Access control
Unscored Unselected
Audit trail
Unselected
Edit check
Unselected
Risk assessement
16)
0/5
0/5

Which of the following is an example of technical security?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unscored Unselected
Integrity
Unselected
Workforce security
Incorrect Selected
Sniffer
Unselected
Facility access controls
17)
5/5
5/5

Policies were recently rewritten.  How long does the facility need to retain the obsolete policies?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Five years
Correct Selected
Six years
Unselected
Two years
Unselected
One year
18)
5/5
5/5

An audit identifies that an employee accessed a patient whose name is the same as the employee. this is known as a/an ______

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Personal authentication
Unselected
Unsecured data
Incorrect Selected
Audit control
Unscored Unselected
Trigger
19)
5/5
5/5

In two computer systems the same data element is different. This is what type of issue?

(5pts)
Student Results Multiple Choice Multiple Choice Options
Unselected
Data availability
Correct Selected
Data consistency
Unselected
Data definition
Unselected
Data dictionary

Go to the previous assignment Previous
Anita's assignments
Next Go to the next assignment