HIS Test Bank Chapter 9 Questions

1- __________ is an individual's constitutional right to be left alone and to limit access to his or her health care information.




... Answer is A)
2- __________ relies on trust that information shared with a health care provider during the course of treatment will be used only for its intended purpose and not disclosed otherwise.




... Answer is C)
3- Which of the following is NOT one of the key sources regarding legal protection of an individual's health information?




... Answer is C)
4- Which law was written specifically to protect patient confidentiality only in federally operated health care facilities, such as Veterans Administration hospitals, Indian Health service facilities, and military health care organizations?




... Answer is B)
5- Which HIPAA rule was added as part of the HITECT Act in 2009?




... Answer is C)
6- Which of the following elements is NOT required on a valid release of information form?




... Answer is B)
7- Which of the following is a standard of the HIPAA Security Administrative Safeguards?




... Answer is D)
8- Which standard related to the HIPAA Security Physical safeguards requires the CE to implement policies and procedures for the movement of hardware and electronic media that contain ePHI into and out of the facility and within a facility?




... Answer is A)
9- Which of the following is NOT a specification of the access control standard related to the HIPAA Security Technical Safeguards?




... Answer is D)
10- If a breach of unsecured protected health information occurs, all of the following should be notified except:




... Answer is D)
11- __________ is a general term for software that is written to "infect" and subsequently harm a computer system.




... Answer is B)
12- __________ are a type of virus specifically designed to look like a safe program.




... Answer is C)
13- According to the text, what is the primary challenge of developing an effective security program in a health care organization?




... Answer is A)
14- All of the following are components that should be addressed in anorganization's security action plan except:




... Answer is D)
15- According to the text, what is the cause of 41% of all data breaches?




... Answer is B)
16- __________ protect systems that utilize the Internet from intrusions and threats from outside sources.




... Answer is C)
17- Which of the following is NOT characteristic of a strong password?




... Answer is C)
18- Which of the following is an action taken to limit network access?




... Answer is D)
19- Which of the following is NOT a component of the NIST cybersecurity framework?




... Answer is A)
20- Which of the following is NOT one of the five concurrent and continuous functions the Framework Core?




... Answer is A)

Powered by Issa Aldababseh