In which of the following circumstances must an individual be given the opportunity to agree or
object to the use and disclosure of their PHI? Correct Answer: A and C
Which of the following statements about the HIPAA Security Rule are true? Correct Answer:
All of the above
A covered entity (CE) must have an established complaint process. Correct Answer: True
The e-Government Act promotes the use of electronic government services by the public and
improves the use of information technology in the government. Correct Answer: True
When must a breach be reported to the U.S. Computer Emergency Readiness Team? Correct
Answer: Within 1 hour of discovery
Which of the following statements about the Privacy Act are true? Correct Answer: All of the
above
What of the following are categories for punishing violations of federal health care laws? Correct
Answer: All of the above
Which of the following are common causes of breaches? Correct Answer: All of the above
Which of the following are fundamental objectives of information security? Correct Answer: All
of the above
If an individual believes that a DoD covered entity (CE) is not complying with HIPAA, he or she
may file a complaint with the: Correct Answer: All of the above
Technical safeguards are: Correct Answer: Information technology and the associated policies
and procedures that are used to protect and control access to ePHI
A Privacy Impact Assessment (PIA) is an analysis of how information is handled: Correct
Answer: All of the above
A breach as defined by the DoD is broader than a HIPAA breach (or breach defined by HHS).
Correct Answer: True
Which of the following are breach prevention best practices? Correct Answer: All of this above
An incidental use or disclosure is not a violation of the HIPAA Privacy Rule if the covered entity
(CE) has: Correct Answer: All of the above
Under the Privacy Act, individuals have the right to request amendments of their records
contained in a system of records. Correct Answer: True