HIMT 1250 Data Security TEST| 81 QUESTIONS| WITH COMPLETE SOLUTIONS
1 view 0 purchase
Course
HIMT 1250
Institution
Florida State College At Jacksonville
Data security includes protecting data availability, privacy, and ________.
a. Suitability
b. Integrity
c. Flexibility
d. Quality Correct Answer: b. Integrity
Within the context of data security, protecting data privacy means defending or safeguarding _________.
a. Access to informati...
himt 1250 data security test| 81 questions| with complete solutions
Written for
Florida State College At Jacksonville
HIMT 1250
All documents for this subject (1)
Seller
Follow
Classroom
Reviews received
Content preview
Data Security TEST| 81 QUESTIONS| WITH
COMPLETE SOLUTIONS
Data security includes protecting data availability, privacy, and ________.
a. Suitability
b. Integrity
c. Flexibility
d. Quality Correct Answer: b. Integrity
Within the context of data security, protecting data privacy means defending or safeguarding
_________.
a. Access to information
b. Data availability
c. Health record quality
d. System implementation Correct Answer: a. Access to information
The greatest threat category to electronic health information is which of the following?
a. Natural disasters
b. Power surges
c. Hardware malfunctions
d. Humans Correct Answer: d. Humans
The first and most fundamental strategy for minimizing security threats is which of the
following?
a. Establish access controls
b. Implement an employee security awareness program
c. Establish a secure organization
d. Conduct a risk analysis Correct Answer: c. Establish a secure organization
Administrative safeguards include policies and procedures that address which of the following
regarding computer resources?
a. Management
b. Maintenance
c. Modification
d. Manipulation Correct Answer: a. Management
The individual responsible for ensuring that everyone follows the organization's data security
policies and procedures is which of the following?
a. Chief executive officer
b. Chief information officer
c. Chief privacy officer
d. Chief security officer Correct Answer: d. Chief security officer
An employee accesses PHI on a computer system that does not relate to her job functions. What
security mechanism should have been implemented to minimize this security breach?
, a. Access controls
b. Audit controls
c. Contingency controls
d. Security incident controls Correct Answer: a. Access controls
A visitor to the hospital looks at the screen of the admitting clerk's computer workstation when
she leaves her desk to copy some admitting documents. What security mechanism would best
have minimized this security breach?
a. Access controls
b. Audit controls
c. Automatic logoff controls
d. Device and media controls Correct Answer: c. Automatic logoff controls
A laboratory employee forgot his user ID badge at home and uses another lab employee's badge
to access the computer system. What controls should have been in place to minimize this security
breach?
a. Access controls
b. Security incident procedures
c. Security management process
d. Workforce security awareness training Correct Answer: d. Workforce security awareness
training
A dietary department donated its old microcomputer to a school. Some old patient data were still
on the microcomputer. What controls would have minimized this security breach?
a. Access controls
b. Device and media controls
c. Facility access controls
d. Workstation controls Correct Answer: b. Device and media controls
HIPAA requires that policies and procedures be maintained for a minimum of _______.
a. Seven years
b. Six years from date of creation
c. Six years from date of creation or date when last in effect, whichever is later
d. Seven years from date when last in effect Correct Answer: c. Six years from date of creation
or date when last in effect, whichever is later
A visitor walks through the computer department and picks up a CD from an employee's desk.
What security controls should have been implemented to prevent this security breach?
a. Device and media controls
b. Facility access controls
c. Workstation use controls
d. Workstation security controls Correct Answer: b. Facility access controls
Threats to data security are most likely to come from which of the following?
a. Employees
b. Natural disasters
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.