100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
HIMT 1250 Data Security TEST| 81 QUESTIONS| WITH COMPLETE SOLUTIONS $8.49   Add to cart

Exam (elaborations)

HIMT 1250 Data Security TEST| 81 QUESTIONS| WITH COMPLETE SOLUTIONS

 1 view  0 purchase
  • Course
  • Institution

Data security includes protecting data availability, privacy, and ________. a. Suitability b. Integrity c. Flexibility d. Quality Correct Answer: b. Integrity Within the context of data security, protecting data privacy means defending or safeguarding _________. a. Access to informati...

[Show more]

Preview 2 out of 9  pages

  • October 10, 2022
  • 9
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Data Security TEST| 81 QUESTIONS| WITH
COMPLETE SOLUTIONS
Data security includes protecting data availability, privacy, and ________.
a. Suitability
b. Integrity
c. Flexibility
d. Quality Correct Answer: b. Integrity

Within the context of data security, protecting data privacy means defending or safeguarding
_________.
a. Access to information
b. Data availability
c. Health record quality
d. System implementation Correct Answer: a. Access to information

The greatest threat category to electronic health information is which of the following?
a. Natural disasters
b. Power surges
c. Hardware malfunctions
d. Humans Correct Answer: d. Humans

The first and most fundamental strategy for minimizing security threats is which of the
following?
a. Establish access controls
b. Implement an employee security awareness program
c. Establish a secure organization
d. Conduct a risk analysis Correct Answer: c. Establish a secure organization

Administrative safeguards include policies and procedures that address which of the following
regarding computer resources?
a. Management
b. Maintenance
c. Modification
d. Manipulation Correct Answer: a. Management

The individual responsible for ensuring that everyone follows the organization's data security
policies and procedures is which of the following?
a. Chief executive officer
b. Chief information officer
c. Chief privacy officer
d. Chief security officer Correct Answer: d. Chief security officer

An employee accesses PHI on a computer system that does not relate to her job functions. What
security mechanism should have been implemented to minimize this security breach?

, a. Access controls
b. Audit controls
c. Contingency controls
d. Security incident controls Correct Answer: a. Access controls

A visitor to the hospital looks at the screen of the admitting clerk's computer workstation when
she leaves her desk to copy some admitting documents. What security mechanism would best
have minimized this security breach?
a. Access controls
b. Audit controls
c. Automatic logoff controls
d. Device and media controls Correct Answer: c. Automatic logoff controls

A laboratory employee forgot his user ID badge at home and uses another lab employee's badge
to access the computer system. What controls should have been in place to minimize this security
breach?
a. Access controls
b. Security incident procedures
c. Security management process
d. Workforce security awareness training Correct Answer: d. Workforce security awareness
training

A dietary department donated its old microcomputer to a school. Some old patient data were still
on the microcomputer. What controls would have minimized this security breach?
a. Access controls
b. Device and media controls
c. Facility access controls
d. Workstation controls Correct Answer: b. Device and media controls

HIPAA requires that policies and procedures be maintained for a minimum of _______.
a. Seven years
b. Six years from date of creation
c. Six years from date of creation or date when last in effect, whichever is later
d. Seven years from date when last in effect Correct Answer: c. Six years from date of creation
or date when last in effect, whichever is later

A visitor walks through the computer department and picks up a CD from an employee's desk.
What security controls should have been implemented to prevent this security breach?
a. Device and media controls
b. Facility access controls
c. Workstation use controls
d. Workstation security controls Correct Answer: b. Facility access controls

Threats to data security are most likely to come from which of the following?
a. Employees
b. Natural disasters

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72349 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.49
  • (0)
  Add to cart