__________ are used to verify the identification of the source. It binds a public key with
information about the supply.
A. PKI
b. Encryption
c. Certificates
d. Hashes - ANS-C
__________ is ensuring that best authorized individuals have get right of entry to to
information.
A. Integrity
b. Availability
c. Confidentiality
d. Nonrepudiation - ANS-C
__________ is the method of taking data applying a cipher to create ciphertext.
A. Hashing
b. Encryption
c. Scrambling
d. Ciphering - ANS-B
__________ is who or what is allowed get admission to to a particular useful resource and
what level of get right of entry to they are allowed.
A. Access Control
b. Authentication
c. Accessibility
d. Authorization - ANS-A
__________ method that the statistics on a system is similar to the records from the original
source. It has no longer been altered.
A. Integrity
b. Availability
c. Confidentiality
d. Nonrepudiation - ANS-A
__________ gives evidence that a positive motion has taken place or that some
thing/someone is what they declare to be.
, A. Integrity
b. Availability
c. Confidentiality
d. Nonrepudiation - ANS-D
__________ use Internet technology to transmit facts between web sites. Data is encrypted
as it travels from web page to website.
A. WANs
b. Intranets
c. VPNs
d. Extranets - ANS-C
According to the lecture, which confidentiality measure is usually in location in EHR
structures but regularly now not activated or monitored?
A. Audit-trail mechanisms
b. Biometric authentication methods
c. Two-degree authentication procedures
d. Remote monitoring gadgets - ANS-A
According to the lecture, which of the following statements explains why education and
schooling applications for healthcare businesses' employees are crucial in the
implementation and maintenance of protection for HIPAA expectancies?
A. Healthcare groups are held responsible for the movements in their personnel.
B. Customer satisfaction is immediately related to the safety of personal health information.
C. Healthcare employees aren't familiar with the requirements set by means of the HITECH
act.
D. Security rules and processes are regularly unnoticed if not taught formally. - ANS-A
Allowing most cancers researchers to apply the prevailing records in hospital structures, with
out asking each patient for permission, illustrates which of the following principles underlying
the HIPAA privacy rule?
A. Boundaries
b. Security
c. Consumer Control
d. Accountability
e. Public Responsibility - ANS-E
An __________ is a listing this is related to a report, directory or item that lists who has get
right of entry to to it and what get right of entry to they've.
A. Authentication
b. Accessibility
c. Authorization
d. Access Control List - ANS-D