Question 1
Access privileges for each role should be set
A. To provide the maximum access necessary
B. To provide the minimum access necessary
C. Based on the user’s request
D. Based on the user’s physical location
Question 2
Locked doors, property control tags on devices and employee identification
badges are all examples of what?
A. Technical safeguards
B. Physical safeguards
C. Audit controls
D. Access management
Question 3
The underlying principle for safeguarding a patient’s health information is
A. Timely access to the information by a clinician
B. Make informed decisions on a plan of care
C. To do no harm to the patient
D. Empower the patient to be an active member of the care team
Question 4
HIPAA requires a covered entity to maintain a program to ensure the
A. Privacy, security and standards compliance for PHI
B. Confidentiality, integrity and availability of PHI
C. Expertise, awareness and compliance of HIPAA
D. Restrictions, uses and disclosures of PHI
Question 5
The inappropriate use of PHI is presumed to be a breach unless
A. It can be proven there is a low probability the PHI was compromised
B. It can be proven that there was no harm to the patient
C. It can be proven that the data was secured
D. It can be proven that an exception to the breach rules applies
Question 6
GDPR (General Data Protection Regulation) applies to
A. The protected health information of a European Union citizen
B. The protected health information of an American living in a European
Union country
C. The personally identifiable information of a European Union citizen
D. The personally identifiable information of an American living in a European
Union country
Question 7
The best approach to reduce risk to an acceptable level is to
A. Mitigate by implementing safeguards to reduce risk to an acceptable
level
B. Transfer risk to a third party
C. Take no action and accept the risk
D. Ignore the risk
Question 8
Audits of a covered entity’s security plan can include
A. External penetration testing and internal vulnerability testing
B. Firewall rules and data schematics
C. Secret patient and social engineering
D. Rogue access points and medical device assessments