COG170 Security Exam Questions and Answers
Security Point - Answer-Grants access to one feature within Epic. Think of these like a key that grants you access to one room. If a user has a security point, they have access to an activity. If they do NOT have the required security point, then the ac...
Security Point - Answer-Grants access to one feature within Epic. Think of these like a
key that grants you access to one room. If a user has a security point, they have access
to an activity. If they do NOT have the required security point, then the activity will not
be available to them; they won't even see it.
/.Security Class - Answer-Grouping of security points that grant access to related
activities and functionality in an Epic application. Think of this as a ring of keys (security
points).
/.User Role - Answer-The User Role defines the visual appearance or layout of
Hyperspace. It works very closely with security in
determining how a user can get to a given activity. It is attached to the user or template.
Some of the
things a role controls include:
What activities open upon logging in
What buttons you have across your top toolbar and under the Epic button
How long the system will stay idle before logging you out
/.True or False: Security and Roles are never shared by when they have the same job
role. - Answer-False: Security and Role can both be attached to the user or template.
Because they often determine scope, they are typically shared by users with the same
job role.
/.To control Radar, SlicerDicer, and Reporting Workbench functionality: - Answer-1.
Define the security points on the class
2. Assign the class to users
/.Radar Security Class - Answer-To define Radar security classes, open an existing
class or create a new one in the Radar Security Class Editor.
/.True or False:
All users must have a Radar security class set in their user record to access
dashboards - Answer-True:
Assign the class on the Radar form of the User Security activity.
/.Reporting Workbench Security Class - Answer-To define Reporting Workbench
security classes, open an existing class or create a new one in the
Reporting Workbench Security Class Editor.
/.True or False:
When creating a workbench security class, you have to manually go through and check
off each Security Point as needed. - Answer-False:
, If you do not want to manually go through and check off each security point as needed,
you can start from a template with the Apply default security for user type field in the
RW Security activity.
/.A Reporting Workbench security class is not necessary and would be redundant if you
already have been assigned a Radar Security Class. - Answer-False:
All users must have a Reporting Workbench security class set in their user record to run
and view
Workbench reports. Assign the class on the Reporting Workbench form of the User
Security activity.
/.What Security Class is necessary for SlicerDicer? - Answer-Analytics Security Class
The Analytics security class controls many aspects of reporting, including whether the
user can access
SlicerDicer and to what degree the user may view and interact with the data.
/.Users are able to take direct action from the results of a Reporting Workbench report.
There are two main types of actions that can appear at the top of a report -- what are
they? - Answer-activity‐based actions and extension‐based actions.
/.Activity-Based Actions - Answer-The first type of action is one that jumps the user to a
place in Hyperspace. This could be opening thepatient's chart, creating an encounter, or
opening any other activity. These actions could have also been accomplished by going
to the Epic menu and finding a menu option in the list.
The action in a report is a shortcut to the menu listing in the Epic menu.
/.User A runs the Pediatric Patients report, the action Bulk Orders is available for them
to use.
User B runs the Pediatric Patients report, the action Bulk Orders is NOT available for
them to use.
What is going on here? - Answer-User A has the application user security to access the
menu option Bulk Orders.
User B does not
Whether or not a user can take these actions is controlled by the application security
class in charge of that menu option. Reporting Workbench actions work within the
framework of other security. The only actions you will see at the top of a Workbench
report are the actions you could accomplish by going to the Epic menu and selecting the
option from there.
/.Extension‐Based Actions - Answer-Extension‐based actions are records in the HGA
master file. They execute M code when clicked. This could
include setting a flag in a record or populating data in a record.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller kartelodoc. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.