Deck 9: Privacy and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 9: Privacy and Security
1
Which of the following is NOT a component of the NIST cybersecurity framework?
A)Framework Analysis
B)Framework Core
C)Framework Implementation Tiers
D)Framework Profile
A)Framework Analysis
B)Framework Core
C)Framework Implementation Tiers
D)Framework Profile
Framework Analysis
2
Which of the following is an action taken to limit network access?
A)Keep machines in locked rooms.
B)Manage keys to facilities.
C)Restrict removal of devices from secure areas.
D)Set up wireless routers to operate only in encrypted mode.
A)Keep machines in locked rooms.
B)Manage keys to facilities.
C)Restrict removal of devices from secure areas.
D)Set up wireless routers to operate only in encrypted mode.
Set up wireless routers to operate only in encrypted mode.
3
All of the following are components that should be addressed in an organization's security action plan except:
A)Administrative safeguards
B)Organizational standards
C)Policies and procedures
D)All of the above are components
A)Administrative safeguards
B)Organizational standards
C)Policies and procedures
D)All of the above are components
All of the above are components
4
__________ are a type of virus specifically designed to look like a safe program.
A)Spyware
B)Ransomware
C)Trojans
D)Worms
A)Spyware
B)Ransomware
C)Trojans
D)Worms
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Which HIPAA rule was added as part of the HITECT Act in 2009?
A)Privacy Rule
B)Security Rule
C)Breach Notification Rule
D)None of the above
A)Privacy Rule
B)Security Rule
C)Breach Notification Rule
D)None of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
__________ is a general term for software that is written to "infect" and subsequently harm a computer system.
A)Spyware
B)Malware
C)Ransomware
D)Virus
A)Spyware
B)Malware
C)Ransomware
D)Virus
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
__________ relies on trust that information shared with a health care provider during the course of treatment will be used only for its intended purpose and not disclosed otherwise.
A)Privacy
B)Security
C)Confidentiality
D)Protection
A)Privacy
B)Security
C)Confidentiality
D)Protection
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
If a breach of unsecured protected health information occurs,all of the following should be notified except:
A)Individuals affected
B)Major media outlets
C)Office for Civil Rights
D)Office of the National Coordinator for Health IT
A)Individuals affected
B)Major media outlets
C)Office for Civil Rights
D)Office of the National Coordinator for Health IT
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Which standard related to the HIPAA Security Physical safeguards requires the CE to implement policies and procedures for the movement of hardware and electronic media that contain ePHI into and out of the facility and within a facility?
A)Device and media controls
B)Facility access controls
C)Workstation security
D)Workforce security
A)Device and media controls
B)Facility access controls
C)Workstation security
D)Workforce security
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT one of the five concurrent and continuous functions the Framework Core?
A)Analyze
B)Detect
C)Respond
D)Recover
A)Analyze
B)Detect
C)Respond
D)Recover
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following elements is NOT required on a valid release of information form?
A)Name of person/entity receiving information
B)Marital status
C)Patient's signature and date
D)All of the above are required
A)Name of person/entity receiving information
B)Marital status
C)Patient's signature and date
D)All of the above are required
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is NOT a specification of the access control standard related to the HIPAA Security Technical Safeguards?
A)Unique user identification
B)Emergency access procedure
C)Automatic log-off
D)Data storage
A)Unique user identification
B)Emergency access procedure
C)Automatic log-off
D)Data storage
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is NOT one of the key sources regarding legal protection of an individual's health information?
A)HIPAA
B)State privacy laws
C)The Joint Commission
D)Federal Trade Commission Act
A)HIPAA
B)State privacy laws
C)The Joint Commission
D)Federal Trade Commission Act
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which law was written specifically to protect patient confidentiality only in federally operated health care facilities,such as Veterans Administration hospitals,Indian Health service facilities,and military health care organizations?
A)HIPAA
B)Privacy Act of 1974
C)Freedom of Information Act
D)Federal Trade Commission Act
A)HIPAA
B)Privacy Act of 1974
C)Freedom of Information Act
D)Federal Trade Commission Act
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
According to the text,what is the cause of 41% of all data breaches?
A)Technology malfunctions
B)Cybercrime
C)Improper use of the heath information system
D)None of the above
A)Technology malfunctions
B)Cybercrime
C)Improper use of the heath information system
D)None of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT characteristic of a strong password?
A)At least eight characters in length
B)A combination of letters,numbers,and special characters
C)Includes personal information
D)All of the above are characteristic of strong passwords
A)At least eight characters in length
B)A combination of letters,numbers,and special characters
C)Includes personal information
D)All of the above are characteristic of strong passwords
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
According to the text,what is the primary challenge of developing an effective security program in a health care organization?
A)Balancing the need for security and the cost of security
B)Preventing unintentional health care information breaches
C)Maintaining information security while allowing controlled access to information
D)Developing a comprehensive security program that is easy for the staff to understand and follow
A)Balancing the need for security and the cost of security
B)Preventing unintentional health care information breaches
C)Maintaining information security while allowing controlled access to information
D)Developing a comprehensive security program that is easy for the staff to understand and follow
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
__________ is an individual's constitutional right to be left alone and to limit access to his or her health care information.
A)Privacy
B)Security
C)Confidentiality
D)Protection
A)Privacy
B)Security
C)Confidentiality
D)Protection
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is a standard of the HIPAA Security Administrative Safeguards?
A)Device and media controls
B)Facility access controls
C)Workstation security
D)Workforce security
A)Device and media controls
B)Facility access controls
C)Workstation security
D)Workforce security
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
__________ protect systems that utilize the Internet from intrusions and threats from outside sources.
A)Antivirus software
B)Backups
C)Firewalls
D)Patches
A)Antivirus software
B)Backups
C)Firewalls
D)Patches
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck

