Deck 12: Electronic Security

Full screen (f)
exit full mode
Question
Sue is a chronic obstructive pulmonary disorder clinic nurse enrolled in a master's education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated repeat hospitalization of chronic obstructive pulmonary disorder patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that because she is a nurse and needs this information for a graduate school assignment, she is entitled to the information. Is Sue correct in her thinking? Describe why she is or is not correct.
Use Space or
up arrow
down arrow
to flip the card.
Question
The nursing education department of a large hospital system has been centralized; as a consequence, the nurse educators are no longer assigned to one hospital but must now travel among all of the hospitals. They use their smartphones to interact and share data and information. What are the first steps you would take to secure these transactions? Describe why each step is necessary.
Question
Research cloud computing in relation to health care. What are the major security and privacy challenges? Please choose three and describe them in detail.
Question
Confidential information in a secure network is most typically breached by:

A) people "hacking" in from outside the network.
B) viruses or cookies that enter from email.
C) unauthorized use by authorized users.
D) None of these is correct.
Question
Organizations can ensure information integrity in a network by developing policies to:

A) specify how data are actually input.
B) indicate who has the authorization to change such data.
C) track how and when data are changed and by whom.
D) All of these are correct.
Question
A hardware security tool that helps protect an organization against security breaches by issuing masks to protect the identity of a corporation's employees who are accessing the Internet is a(n):

A) proxy server.
B) firewall.
C) antivirus program.
D) masking program.
Question
Organizations are able to monitor who is using the organizational network and what files that user has accessed, because any use of an electronic network:

A) constitutes fair use.
B) protects against spam.
C) leaves a digital footprint.
D) All of these are correct.
Question
Computers linked together to facilitate communication and operations within and outside of an organization are known as:

A) digital operations.
B) a network.
C) a local web.
D) All of these are correct.
Question
An organization's confidentiality policy should clearly define:

A) which data are confidential.
B) procedures for releasing confidential information.
C) procedures to follow if confidential information is accidentally released without authorization.
D) All of these are correct.
Question
Acceptable use policies in an organization typically restrict downloads of files by employees because:

A) employees may waste work time.
B) downloads increase vulnerabilities to viruses.
C) downloads interfere with backup and storage of data.
D) All of these are correct.
Question
An ID badge is an example of authentication by:

A) something the user knows.
B) something the user has.
C) something the user is.
D) All of these are correct.
Question
Devices that recognize thumb prints, retina patterns, or facial patterns are known as:

A) biologic devices.
B) biometric devices.
C) radiofrequency identifiers.
D) All of these are correct.
Question
Behaviors leading to unintentional data breaches include:

A) safeguarding an input device.
B) walking away from a workstation without logging off.
C) using numeral characters in passwords.
D) All of these are correct.
Question
Email scanning software helps to detect:

A) worms.
B) known viruses.
C) social engineering attempts.
D) All of these are correct.
Question
Some organizations provide offsite employees such as homecare nurses with a network interface device that does not have private information stored on it. These devices are also known as:

A) secure devices.
B) networking facilitators.
C) thin clients.
D) All of these are correct.
Question
If an employee wants to work on patient information at home, typically he or she can download information to a flash drive from the network.
Question
Browser privacy settings can control how cookies are used.
Question
A password consisting of the user's initials and one capital letter is strong.
Question
A password consisting the dollar character ($) and the user's last name is strong.
Question
A password that is the phrase from a song, such as "Let It Be," is strong.
Question
The password *tomatoSoup 7 is strong.
Question
The password !E1E2E30 is strong.
Question
A password consisting of the ampersand character (&) and the user's birthdate is strong.
Question
It is safe to open an email attachment from a known sender.
Question
A nurse is documenting in a patient record and is unsure what information is considered confidential. To which policy should the nurse refer?

A) Confidentiality policy
B) Privacy policy
C) Documentation policy
D) Information technology policy
Question
The healthcare system has lost electrical power. To which policy should the nurse refer?

A) Accessibility policy
B) Availability policy
C) Outage policy
D) Privacy policy
Question
A nurse logs in to the electronic health record. The login with a password represents which of the following?

A) Authentication
B) Biometrics
C) Security
D) Identification
Question
A nurse is creating a new password for logging in to the electronic health record. Which of the following is an example of a strong password?

A) X2#4!mK60
B) 12345678
C) KRI12KRI
D) 12281976
Question
A nurse is unaware of threats to information security in the health system and does not follow policies and procedures related to security. A subsequent breach in security would be caused by which of the following?

A) Human error
B) Insufficient employee resources
C) Inadequate staff education on security
D) Improper disposal
Question
Security breaches can occur with which of the following?

A) Electronic data
B) Personal knowledge
C) Oral reports
D) All of these are correct.
Question
A new security tool is integrated into a healthcare system. Which of the following should be included in its integration?

A) Employee awareness training
B) Mandated utilization of biometrics
C) Password changes for logins
D) Use of malware on all computers
Question
A nurse is reviewing email while at work and notes an attachment on an email from an unknown sender. Which of the following is the nurse's next action?

A) Do not open the attachment and notify information technology
B) Open the attachment for more information
C) Close the email program and restart the computer
D) Log out of email and call the nurse supervisor
Question
Threats to data security in healthcare organizations are not common.
Question
Spear phishing uses contact information provided in an organization's directory and tailors the scam email to a specific person.
Question
A nurse receives a request for information about a patient from an outside agency. Which of the following should be the nurse's next action?

A) Access the healthcare system's confidentiality policy.
B) Ask the patient's family for permission.
C) Review the patient's chart for an informed consent.
D) Refer the outside agency to the medical records department.
Question
A nurse has requested a schedule change in work schedule. To preserve integrity, which individual would likely have access to change such data?

A) A nursing supervisor
B) A peer nurse
C) A nursing assistant
D) A physician colleague
Question
A nurse logs in to a medication dispensing system with a password and a biometric authentication. Which of the following is an example of biometric authentication?

A) Thumbprint
B) ID with radiofrequency identification chip
C) Signature
D) Passphrase
Question
A nurse is teaching a nursing student about information security and the use of passwords. Which statement by the nurse is correct?

A) "Use a combination of letters, numbers, and special characters."
B) "Avoid changing from upper- to lowercase in your password."
C) "Do not make your password long, and keep it to four characters or less."
D) "Change your password only when you must."
Question
A nurse unintentionally does not log out from a computer workstation prior to responding to a patient's call light. This is considered which of the following?

A) A negligent breach
B) A vulnerable breach
C) A computer breach
D) A patient breach
Question
An informatics nurse stores secured information in an office. Which step should the nurse take next to secure the physical location of the information?

A) Lock the office door.
B) Close the door.
C) Ask security to guard the door.
D) Request the staff to not go in the office.
Question
A nurse is using the Internet, and the website is blocked. This website is blocked by which of the following?

A) The proxy server
B) The computer's hardware
C) The intrusion detection software
D) The firewall.
Question
A healthcare provider is working on a patient electronic health record at home. Which security tool ensures that all data transmitted on unsecured networks are encrypted?

A) Virtual private network
B) Intrusion detection system
C) Proxy server
D) Mask
Question
Healthcare agencies do not require data encryption when patient health information is being transmitted over a mobile device.
Question
A brute force attack is software used to guess network passwords.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Electronic Security
1
Sue is a chronic obstructive pulmonary disorder clinic nurse enrolled in a master's education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated repeat hospitalization of chronic obstructive pulmonary disorder patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that because she is a nurse and needs this information for a graduate school assignment, she is entitled to the information. Is Sue correct in her thinking? Describe why she is or is not correct.
No Answer
2
The nursing education department of a large hospital system has been centralized; as a consequence, the nurse educators are no longer assigned to one hospital but must now travel among all of the hospitals. They use their smartphones to interact and share data and information. What are the first steps you would take to secure these transactions? Describe why each step is necessary.
No Answer
3
Research cloud computing in relation to health care. What are the major security and privacy challenges? Please choose three and describe them in detail.
No Answer
4
Confidential information in a secure network is most typically breached by:

A) people "hacking" in from outside the network.
B) viruses or cookies that enter from email.
C) unauthorized use by authorized users.
D) None of these is correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
Organizations can ensure information integrity in a network by developing policies to:

A) specify how data are actually input.
B) indicate who has the authorization to change such data.
C) track how and when data are changed and by whom.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
A hardware security tool that helps protect an organization against security breaches by issuing masks to protect the identity of a corporation's employees who are accessing the Internet is a(n):

A) proxy server.
B) firewall.
C) antivirus program.
D) masking program.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
Organizations are able to monitor who is using the organizational network and what files that user has accessed, because any use of an electronic network:

A) constitutes fair use.
B) protects against spam.
C) leaves a digital footprint.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
Computers linked together to facilitate communication and operations within and outside of an organization are known as:

A) digital operations.
B) a network.
C) a local web.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
An organization's confidentiality policy should clearly define:

A) which data are confidential.
B) procedures for releasing confidential information.
C) procedures to follow if confidential information is accidentally released without authorization.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
Acceptable use policies in an organization typically restrict downloads of files by employees because:

A) employees may waste work time.
B) downloads increase vulnerabilities to viruses.
C) downloads interfere with backup and storage of data.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
An ID badge is an example of authentication by:

A) something the user knows.
B) something the user has.
C) something the user is.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
Devices that recognize thumb prints, retina patterns, or facial patterns are known as:

A) biologic devices.
B) biometric devices.
C) radiofrequency identifiers.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
Behaviors leading to unintentional data breaches include:

A) safeguarding an input device.
B) walking away from a workstation without logging off.
C) using numeral characters in passwords.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
Email scanning software helps to detect:

A) worms.
B) known viruses.
C) social engineering attempts.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
Some organizations provide offsite employees such as homecare nurses with a network interface device that does not have private information stored on it. These devices are also known as:

A) secure devices.
B) networking facilitators.
C) thin clients.
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
If an employee wants to work on patient information at home, typically he or she can download information to a flash drive from the network.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
Browser privacy settings can control how cookies are used.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
A password consisting of the user's initials and one capital letter is strong.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
A password consisting the dollar character ($) and the user's last name is strong.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
A password that is the phrase from a song, such as "Let It Be," is strong.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
The password *tomatoSoup 7 is strong.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
The password !E1E2E30 is strong.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
A password consisting of the ampersand character (&) and the user's birthdate is strong.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
It is safe to open an email attachment from a known sender.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
A nurse is documenting in a patient record and is unsure what information is considered confidential. To which policy should the nurse refer?

A) Confidentiality policy
B) Privacy policy
C) Documentation policy
D) Information technology policy
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
The healthcare system has lost electrical power. To which policy should the nurse refer?

A) Accessibility policy
B) Availability policy
C) Outage policy
D) Privacy policy
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
A nurse logs in to the electronic health record. The login with a password represents which of the following?

A) Authentication
B) Biometrics
C) Security
D) Identification
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
A nurse is creating a new password for logging in to the electronic health record. Which of the following is an example of a strong password?

A) X2#4!mK60
B) 12345678
C) KRI12KRI
D) 12281976
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
A nurse is unaware of threats to information security in the health system and does not follow policies and procedures related to security. A subsequent breach in security would be caused by which of the following?

A) Human error
B) Insufficient employee resources
C) Inadequate staff education on security
D) Improper disposal
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
Security breaches can occur with which of the following?

A) Electronic data
B) Personal knowledge
C) Oral reports
D) All of these are correct.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
A new security tool is integrated into a healthcare system. Which of the following should be included in its integration?

A) Employee awareness training
B) Mandated utilization of biometrics
C) Password changes for logins
D) Use of malware on all computers
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
A nurse is reviewing email while at work and notes an attachment on an email from an unknown sender. Which of the following is the nurse's next action?

A) Do not open the attachment and notify information technology
B) Open the attachment for more information
C) Close the email program and restart the computer
D) Log out of email and call the nurse supervisor
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
Threats to data security in healthcare organizations are not common.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
Spear phishing uses contact information provided in an organization's directory and tailors the scam email to a specific person.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
A nurse receives a request for information about a patient from an outside agency. Which of the following should be the nurse's next action?

A) Access the healthcare system's confidentiality policy.
B) Ask the patient's family for permission.
C) Review the patient's chart for an informed consent.
D) Refer the outside agency to the medical records department.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
A nurse has requested a schedule change in work schedule. To preserve integrity, which individual would likely have access to change such data?

A) A nursing supervisor
B) A peer nurse
C) A nursing assistant
D) A physician colleague
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
A nurse logs in to a medication dispensing system with a password and a biometric authentication. Which of the following is an example of biometric authentication?

A) Thumbprint
B) ID with radiofrequency identification chip
C) Signature
D) Passphrase
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
A nurse is teaching a nursing student about information security and the use of passwords. Which statement by the nurse is correct?

A) "Use a combination of letters, numbers, and special characters."
B) "Avoid changing from upper- to lowercase in your password."
C) "Do not make your password long, and keep it to four characters or less."
D) "Change your password only when you must."
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
A nurse unintentionally does not log out from a computer workstation prior to responding to a patient's call light. This is considered which of the following?

A) A negligent breach
B) A vulnerable breach
C) A computer breach
D) A patient breach
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
An informatics nurse stores secured information in an office. Which step should the nurse take next to secure the physical location of the information?

A) Lock the office door.
B) Close the door.
C) Ask security to guard the door.
D) Request the staff to not go in the office.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
A nurse is using the Internet, and the website is blocked. This website is blocked by which of the following?

A) The proxy server
B) The computer's hardware
C) The intrusion detection software
D) The firewall.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
A healthcare provider is working on a patient electronic health record at home. Which security tool ensures that all data transmitted on unsecured networks are encrypted?

A) Virtual private network
B) Intrusion detection system
C) Proxy server
D) Mask
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
Healthcare agencies do not require data encryption when patient health information is being transmitted over a mobile device.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
A brute force attack is software used to guess network passwords.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 44 flashcards in this deck.