COG170 Security Questions With Complete Solutions
Before a user can access dashboards, SlicerDicer and reports, they need to be correct answer: assigned security to the proper functionality A user should only be granted access to the content correct answer: that your organization feels they should be using. The basis of all staff-related build are the ________ and __________records. Each staff member has a unique provider and/or user record. correct answer: provider (SER); user (EMP) The _______ master file can be thought of as a directory of clinicians who are affiliated with your organization. The ______ master file includes one record for every clinician who provides care to your patients. correct answer: Provider; Provider Remember that the term "provider" in Epic means both correct answer: clinicians and resources. The _________master file contains one record for every person who logs in to your instance of Epic. correct answer: User User templates are _______ that are used to configure groups of users. correct answer: EMP records ____________records are used in conjunction with user and provider records to give employees access to activities in the system. correct answer: Security and Role ____________ is used to give "access" or "permission" to activities and information within Epic correct answer: Security There are two key security concepts: correct answer: security points and security classes. Grants access to one feature within Epic. Think of these like a key that grants you access to one room. If a user has a security point, they have access to an activity. If they do NOT have the required security point, then the activity will not be available to them; they won't even see it. correct answer: Security Point Grouping of security points that grant access to related activities and functionality in an Epic application. Think of this as a ring of keys (security points). correct answer: Security Class The __________ defines the visual appearance or layout of Hyperspace. correct answer: User Role Three things a user role controls: correct answer: 1. What activities open upon logging in 2. What buttons you have across your top toolbar and under the Epic button 3. How long the system will stay idle before logging you o
Geschreven voor
- Instelling
-
Epic University
- Vak
-
COG170
Documentinformatie
- Geüpload op
- 20 september 2023
- Aantal pagina's
- 8
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
- cog170 security
- provider ser user emp
- remember that t
-
cog170 security questions with complete solutions
-
assigned security to the proper functionality
-
a user should only be granted access to the conten
Ook beschikbaar in voordeelbundel