100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
COC CANCER PROGRAM STANDARDS |questions with 100% Correct Answers | Verified | Latest Update 2024 Graded A+ $13.49   Add to cart

Exam (elaborations)

COC CANCER PROGRAM STANDARDS |questions with 100% Correct Answers | Verified | Latest Update 2024 Graded A+

 0 view  0 purchase
  • Course
  • CLASSROOM
  • Institution
  • CLASSROOM

COC CANCER PROGRAM STANDARDS |questions with 100% Correct Answers | Verified | Latest Update 2024 Graded A+

Preview 4 out of 45  pages

  • October 23, 2024
  • 45
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CLASSROOM
  • CLASSROOM
avatar-seller
Examsplug
COC CANCER PROGRAM STANDARDS |questions
with 100% Correct Answers | Verified | Latest Update
2024 Graded A+


What plays significant roles in professional development - ✔✔volunteerism and networking




A patient may recover damages from a healthcare institution when - ✔✔confidential data
was unintentionally released and also when the institution did not use reasonable procedures
to protect that confidential data.




Despite HIPAA right for individuals to review their record; to provide access of information to
an individual's own records a state must - ✔✔must review applicable state law related to
the access of the individual's record




Security management planning involves - ✔✔Evaluating the flow of data throughout
the organization & identifying all unreasonable security weaknesses.




It is management's responsibility to - ✔✔Identify who has the authority and responsibility
to implement and maintain the security system.

,Developing information handling procedures refers to - ✔✔Establishing procedures to ensure
control over how confidential data is maintained




Implementing access controls refers to - ✔✔Employees that should have access to
various types of confidential data.




Security risks are inherent in - ✔✔Email and Internet. With direct ingress (entrance) and
egress (exiting) from the outside world into and out of an organization's network.




Disciplinary actions for breaches of confidentiality are - ✔✔Defined in the policies
and procedures and are not up to the manager's discretion.




What term describes the networking capability for a group of computers in close proximity
to each other such as in an office building? - ✔✔local area network (LAN)




What term describes a computer or device on a network that manages network resources. -
✔✔Server




What term describes a system designed to prevent unauthorized access to or from a
private network. - ✔✔Firewall




Firewalls can be implemented in Hardware or Software - ✔✔Both

,What term describes a method employing encryption to provide secure access to a remote
computer over the Internet. - ✔✔VPN




What type(s) of linkage application is used in a central registry to link datasets in a
statistically justifiable way? - ✔✔Probabilistic




What term describe the bringing together of information from two or more records that is
believed to relate to the same patient. - ✔✔Record Linkage




Deterministic Record Linkage - ✔✔Generates links based on the number of individual
identifiers that match among the available data sets




Probabilistic record linkage - ✔✔takes into account a wide range of potential identifiers to
link datasets in a statistically justifiable way and is the linkage form most often used in a
central registry.




This record linkage is useful when the patients in the data sets are identified by a common
identifier, or when there are several identifiers (e.g., name, date of birth, and sex when identifying
a patient) whose quality of data is relatively high. - ✔✔Deterministic Record Linkage




The critical requirement of every IT disaster recovery plan is - ✔✔the need to have a
reliable backup and recovery system.

, This term describes a program or algorithm that replicates itself over a computer network and
usually performs malicious actions; it spreads from computer to computer, and... has the
capability to travel without any human action. - ✔✔Worm




This term describes a program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes. It attaches itself to a program or file enabling it
to spread from one computer to another, leaving infections as it travels. Cannot spread
without human interaction. - ✔✔Virus




How may a virus exist on your computer but not actually infect your computer unless you run
or open the malicious program - ✔✔Distributed as an executable file




*This term describes a destructive program that masquerades as a benign application.
- ✔✔*Trojan horse




How is the trojan virus diff from a.... virus - ✔✔Unable to Replicate themselves.




This virus is known to create a backdoor on your computer that gives malicious users access
to your system, possibly allowing confidential or personal information to be compromised. -
✔✔Trojan horse




A UPS (uninterruptible power supply) is used during a power outage to - ✔✔Enables
employees to save data that is in RAM and perform an orderly shutdown of the computer.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85651 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart