HIPAA and Privacy Act Training (CHALLENGE EXAM)
Joint Knowledge Online (JKO)
DHA-US001
Select your current Job Position:
➢ Patient Services
Is this your first time taking the HIPAA and Privacy Act Training Course?
➢ No, but I need annual training
1. In which of the following circumstances must an individual be given the opportunity to agree or
object to the use and disclosure of their PHI?
➢ A and C
2. Which of the following statements about the HIPAA Security Rule are true?
➢ All of the above
3. A covered entity (CE) must have an established complaint process.
➢ True
4. The e-Government Act promotes the use of electronic government services by the public and
improves the use of information technology in the government.
➢ True
5. When must a breach be reported to the U.S. Computer Emergency Readiness Team?
➢ Within 1 hour of discovery
6. Which of the following statements about the Privacy Act are true?
➢ All of the above
7. What of the following are categories for punishing violations of federal health care laws?
➢ All of the above
8. Which of the following are common causes of breaches?
➢ All of the above
9. Which of the following are fundamental objectives of information security?
➢ All of the above
10. If an individual believes that a DoD covered entity (CE) is not complying with HIPAA, he or she
may file a complaint with the:
➢ All of the above
11. Technical safeguards are:
➢ Information technology and the associated policies and procedures that are used to
protect and control access to ePHI
Joint Knowledge Online (JKO)
DHA-US001
Select your current Job Position:
➢ Patient Services
Is this your first time taking the HIPAA and Privacy Act Training Course?
➢ No, but I need annual training
1. In which of the following circumstances must an individual be given the opportunity to agree or
object to the use and disclosure of their PHI?
➢ A and C
2. Which of the following statements about the HIPAA Security Rule are true?
➢ All of the above
3. A covered entity (CE) must have an established complaint process.
➢ True
4. The e-Government Act promotes the use of electronic government services by the public and
improves the use of information technology in the government.
➢ True
5. When must a breach be reported to the U.S. Computer Emergency Readiness Team?
➢ Within 1 hour of discovery
6. Which of the following statements about the Privacy Act are true?
➢ All of the above
7. What of the following are categories for punishing violations of federal health care laws?
➢ All of the above
8. Which of the following are common causes of breaches?
➢ All of the above
9. Which of the following are fundamental objectives of information security?
➢ All of the above
10. If an individual believes that a DoD covered entity (CE) is not complying with HIPAA, he or she
may file a complaint with the:
➢ All of the above
11. Technical safeguards are:
➢ Information technology and the associated policies and procedures that are used to
protect and control access to ePHI