A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Workstation Security
Correct Answer
verified
Multiple Choice
A) Protections
B) Analysis
C) Measures
D) Plan
Correct Answer
verified
Multiple Choice
A) Implementing technical controls that protect ePHI from improper alteration or destruction
B) Restricting access to ePHI only to users and processes that have been specifically authorized
C) Implementing hardware, software, and procedural mechanisms that record and examine activity in information systems that contain ePHI
D) Verification that a person or process seeking to access ePHI is the one claimed
Correct Answer
verified
Multiple Choice
A) Health-care providers
B) Health plans
C) Health-care clearinghouses
D) All of the above
Correct Answer
verified
Multiple Choice
A) Staff
B) Personnel
C) Employee
D) Workforce
Correct Answer
verified
Multiple Choice
A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Security Incident Response
Correct Answer
verified
Multiple Choice
A) Covered entities are required to notify individuals for any ePHI breach within 90 days after the discovery of the breach.
B) Covered entities are required to notify individuals for breach of unsecured ePHI within 60 days after the discovery of the breach.
C) Covered entities are required to notify individuals for any ePHI breach within 30 days after the discovery of the breach.
D) Covered entities are required to notify individuals for breach of unsecured ePHI within 30 days after the discovery of the breach.
Correct Answer
verified
Multiple Choice
A) Retention, availability, and update requirements related to supporting documentation
B) The use of technical security measures to protect ePHI data
C) Standards for business associate contracts and other arrangements
D) Documented policies and procedures for managing day-to-day operations and access to ePHI
Correct Answer
verified
Multiple Choice
A) Expanded the definition of "business associates"
B) Increased penalties for violations to up to $1.5 million
C) Granting authority to state Attorneys General to enforce HIPAA rules and pursue criminal and civil cases
D) All of the above
Correct Answer
verified
Multiple Choice
A) Department of Justice
B) Local law enforcement
C) Department of Health and Human Services
D) State Attorney
Correct Answer
verified
Multiple Choice
A) A person or organization that provides patient or medical services
B) An entity that provides payment for medical services
C) An entity that processes nonstandard health information it receives from another entity
D) A person or entity that creates, receives, maintains, transmits, accesses, or has the potential to access ePHI
Correct Answer
verified
Multiple Choice
A) Administrative safeguards
B) Physical safeguards
C) Technical safeguards
D) Organizational requirements
Correct Answer
verified
Multiple Choice
A) Unique user identification and establishing emergency access procedures
B) Implementing automatic logoff procedures and encrypting/decrypting information at rest
C) Unique user identification and implementing automatic logoff procedures
D) Encrypting/decrypting information at rest and establishing emergency access procedures
Correct Answer
verified
Multiple Choice
A) Differential
B) Cumulative incremental
C) Incremental
D) Full
Correct Answer
verified
Multiple Choice
A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Workstation Security
Correct Answer
verified
Multiple Choice
A) Department of Justice
B) Local law enforcement
C) Department of Health and Human Services
D) State Attorney
Correct Answer
verified
Multiple Choice
A) Implementing technical controls that protect ePHI from improper alteration or destruction
B) Restricting access to ePHI only to users and processes that have been specifically authorized
C) Implementing hardware, software, and procedural mechanisms that record and examine activity in information systems that contain ePHI
D) Verifying that a person or process seeking to access ePHI is the one claimed
Correct Answer
verified
Multiple Choice
A) Electronic private health information
B) Electronic protected health information
C) Encrypted private health information
D) Encrypted protected health information
Correct Answer
verified
Multiple Choice
A) A person or organization that provides patient or medical services
B) An entity that provides payment for medical services
C) An entity that processes nonstandard health information it receives from another entity
D) A person or entity that creates, receives, maintains, transmits, accesses, or has the potential to access ePHI
Correct Answer
verified
Multiple Choice
A) Covered entities
B) Employees
C) Covered entities and employees
D) Anyone who wrongly discloses PHI
Correct Answer
verified
Showing 1 - 20 of 20
Related Exams