Deck 14: Regulatory Compliance for the Health-Care Sector
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
العب
ملء الشاشة (f)
Deck 14: Regulatory Compliance for the Health-Care Sector
1
Which of the following statements best describes a health-care provider?
A) A person or organization that provides patient or medical services
B) An entity that provides payment for medical services
C) An entity that processes nonstandard health information it receives from another entity
D) A person or entity that creates, receives, maintains, transmits, accesses, or has the potential to access ePHI
A) A person or organization that provides patient or medical services
B) An entity that provides payment for medical services
C) An entity that processes nonstandard health information it receives from another entity
D) A person or entity that creates, receives, maintains, transmits, accesses, or has the potential to access ePHI
A person or organization that provides patient or medical services
2
Which of the following statements best describes a health-care clearinghouse?
A) A person or organization that provides patient or medical services
B) An entity that provides payment for medical services
C) An entity that processes nonstandard health information it receives from another entity
D) A person or entity that creates, receives, maintains, transmits, accesses, or has the potential to access ePHI
A) A person or organization that provides patient or medical services
B) An entity that provides payment for medical services
C) An entity that processes nonstandard health information it receives from another entity
D) A person or entity that creates, receives, maintains, transmits, accesses, or has the potential to access ePHI
An entity that processes nonstandard health information it receives from another entity
3
Which of the following best describes HIPAA administrative safeguards?
A) Retention, availability, and update requirements related to supporting documentation
B) The use of technical security measures to protect ePHI data
C) Standards for business associate contracts and other arrangements
D) Documented policies and procedures for managing day-to-day operations and access to ePHI
A) Retention, availability, and update requirements related to supporting documentation
B) The use of technical security measures to protect ePHI data
C) Standards for business associate contracts and other arrangements
D) Documented policies and procedures for managing day-to-day operations and access to ePHI
Documented policies and procedures for managing day-to-day operations and access to ePHI
4
Which of the following is the goal of an Audit Controls standard?
A) Implementing technical controls that protect ePHI from improper alteration or destruction
B) Restricting access to ePHI only to users and processes that have been specifically authorized
C) Implementing hardware, software, and procedural mechanisms that record and examine activity in information systems that contain ePHI
D) Verifying that a person or process seeking to access ePHI is the one claimed
A) Implementing technical controls that protect ePHI from improper alteration or destruction
B) Restricting access to ePHI only to users and processes that have been specifically authorized
C) Implementing hardware, software, and procedural mechanisms that record and examine activity in information systems that contain ePHI
D) Verifying that a person or process seeking to access ePHI is the one claimed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is the goal of an Integrity Controls standard?
A) Implementing technical controls that protect ePHI from improper alteration or destruction
B) Restricting access to ePHI only to users and processes that have been specifically authorized
C) Implementing hardware, software, and procedural mechanisms that record and examine activity in information systems that contain ePHI
D) Verification that a person or process seeking to access ePHI is the one claimed
A) Implementing technical controls that protect ePHI from improper alteration or destruction
B) Restricting access to ePHI only to users and processes that have been specifically authorized
C) Implementing hardware, software, and procedural mechanisms that record and examine activity in information systems that contain ePHI
D) Verification that a person or process seeking to access ePHI is the one claimed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following statements best describes the HIPAA breach notification rules?
A) Covered entities are required to notify individuals for any ePHI breach within 90 days after the discovery of the breach.
B) Covered entities are required to notify individuals for breach of unsecured ePHI within 60 days after the discovery of the breach.
C) Covered entities are required to notify individuals for any ePHI breach within 30 days after the discovery of the breach.
D) Covered entities are required to notify individuals for breach of unsecured ePHI within 30 days after the discovery of the breach.
A) Covered entities are required to notify individuals for any ePHI breach within 90 days after the discovery of the breach.
B) Covered entities are required to notify individuals for breach of unsecured ePHI within 60 days after the discovery of the breach.
C) Covered entities are required to notify individuals for any ePHI breach within 30 days after the discovery of the breach.
D) Covered entities are required to notify individuals for breach of unsecured ePHI within 30 days after the discovery of the breach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
Who should be notified of ePHI breaches?
A) Department of Justice
B) Local law enforcement
C) Department of Health and Human Services
D) State Attorney
A) Department of Justice
B) Local law enforcement
C) Department of Health and Human Services
D) State Attorney
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
Security awareness and training and workforce security standards are examples of which of the following?
A) Administrative safeguards
B) Physical safeguards
C) Technical safeguards
D) Organizational requirements
A) Administrative safeguards
B) Physical safeguards
C) Technical safeguards
D) Organizational requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
Under the HITECH Act criminal violations can be brought against which of the following?
A) Covered entities
B) Employees
C) Covered entities and employees
D) Anyone who wrongly discloses PHI
A) Covered entities
B) Employees
C) Covered entities and employees
D) Anyone who wrongly discloses PHI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is an example of a HIPAA physical safeguard standard?
A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Security Incident Response
A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Security Incident Response
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is an example of a HIPAA administrative safeguard standard?
A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Workstation Security
A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Workstation Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is an example of a HIPAA technical safeguard standard?
A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Workstation Security
A) Workforce Security
B) Workstation Use
C) Audit Controls
D) Workstation Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is a change made to HIPAA by the Omnibus Rule?
A) Expanded the definition of "business associates"
B) Increased penalties for violations to up to $1.5 million
C) Granting authority to state Attorneys General to enforce HIPAA rules and pursue criminal and civil cases
D) All of the above
A) Expanded the definition of "business associates"
B) Increased penalties for violations to up to $1.5 million
C) Granting authority to state Attorneys General to enforce HIPAA rules and pursue criminal and civil cases
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following are the two required implementation specifications of the access control standard under HIPAA?
A) Unique user identification and establishing emergency access procedures
B) Implementing automatic logoff procedures and encrypting/decrypting information at rest
C) Unique user identification and implementing automatic logoff procedures
D) Encrypting/decrypting information at rest and establishing emergency access procedures
A) Unique user identification and establishing emergency access procedures
B) Implementing automatic logoff procedures and encrypting/decrypting information at rest
C) Unique user identification and implementing automatic logoff procedures
D) Encrypting/decrypting information at rest and establishing emergency access procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is not one of the three risk management activities in the security management process?
A) Protections
B) Analysis
C) Measures
D) Plan
A) Protections
B) Analysis
C) Measures
D) Plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
According to HIPAA, which of the following refers to anyone who does work at or for an organization?
A) Staff
B) Personnel
C) Employee
D) Workforce
A) Staff
B) Personnel
C) Employee
D) Workforce
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following backup types backs up anything that has changed since the last backup of any type?
A) Differential
B) Cumulative incremental
C) Incremental
D) Full
A) Differential
B) Cumulative incremental
C) Incremental
D) Full
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following was given the authority to bring criminal action against covered entities that wrongly disclose ePHI?
A) Department of Justice
B) Local law enforcement
C) Department of Health and Human Services
D) State Attorney
A) Department of Justice
B) Local law enforcement
C) Department of Health and Human Services
D) State Attorney
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
Covered entities (CEs) include which of the following?
A) Health-care providers
B) Health plans
C) Health-care clearinghouses
D) All of the above
A) Health-care providers
B) Health plans
C) Health-care clearinghouses
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
ePHI refers to which of the following?
A) Electronic private health information
B) Electronic protected health information
C) Encrypted private health information
D) Encrypted protected health information
A) Electronic private health information
B) Electronic protected health information
C) Encrypted private health information
D) Encrypted protected health information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck

