CPPM
LATEST READINESS EXAM
Q&S
©2024/2025
,1. Which of the following is a key benefit of implementing
Electronic Health Records (EHRs) in a healthcare setting?
- A. Increased manual paperwork
- B. Improved patient data accuracy
- C. Reduced compliance with regulations
- D. Slower access to patient data
- Correct Answer: B. Improved patient data accuracy
- Rationale: EHRs help in maintaining accurate and up-
to-date patient data, reducing errors and enhancing the
quality of care.
2. What is the primary function of interoperability in health
IT systems?
- A. To promote data silos
- B. To enable seamless data exchange across systems
- C. To increase the complexity of IT infrastructures
- D. To decrease the number of IT vendors
- Correct Answer: B. To enable seamless data
exchange across systems
- Rationale: Interoperability allows different health IT
systems to communicate effectively, enhancing
comprehensive patient care.
### Disaster Planning
3. Which of the following components is critical in the
creation of a Disaster Recovery Plan for healthcare
facilities?
- A. Focus on physical security only
- B. Regular data backups
- C. Ensuring all employees work from home
©2024/2025
, - D. Ignoring vendor roles
- Correct Answer: B. Regular data backups
- Rationale: Regular data backups ensure that patient
and organizational data can be recovered in cases of
disaster.
4. In disaster planning, the term "business continuity"
refers to:
- A. The construction of new healthcare facilities
- B. Maintaining essential functions during and after a
disaster
- C. Limiting access to patient records
- D. Expanding service offerings
- Correct Answer: B. Maintaining essential functions
during and after a disaster
- Rationale: Business continuity focuses on keeping
vital operations running during a crisis, ensuring services
remain accessible.
### HIPAA
5. Which of these is considered a HIPAA violation?
- A. Encrypting patient data
- B. Discussing patient information with unauthorized
individuals
- C. Securing access passwords
- D. Limiting access to PHI
- Correct Answer: B. Discussing patient information with
unauthorized individuals
- Rationale: Discussing PHI with unauthorized persons
breaches HIPAA's privacy rules.
6. The primary purpose of the HIPAA Security Rule is to:
©2024/2025