NEWEST 2025-2026 COMPLETE QUESTIONS AND
CORRECT DETAILED ANSWERS (VERIFIED ANSWERS)
|ALREADY GRADED A+||BRAND NEW VERSION!!
Controls to protect data privacy and integrity are both logical and:
a. physical
b. analytical
c. theoretical
d. psychological - CORRECT ANSWER- b. analytical
Which of the following is not a mechanism for protecting the security of health
data:
a. Automatic sign-offs
b. A Strong Password
c. Having one password per nursing unit
d. Firewalls - CORRECT ANSWER- C. Having one password per nursing unit.
An audit trail is :
a. a log of which project meetings and events have been completed
,b. an electronic tool that can track system access by individual user who viewed a
specific client record.
c. a proactive tool to monitor who will be using a system and modifying data.
d. used primarily as a data integrity tool - CORRECT ANSWER- b. an electronic tool
that can track system access by individual user who viewed a specific client
record.
Data can be represented by all EXCEPT:
a. text
b. audio
c. transmission waves
d. video - CORRECT ANSWER- a. text
Things to consider related to disaster planning include:
a. should have only 1 database to make it easier to recover
b. all data should be stored onsite so it is accessible
c. must have a solid communication plan during disaster and recovery.
d. an association or group that shows uniformity - CORRECT ANSWER- C. Must have
a solid communication plan during disaster and recover.
HIPPA only applies to organizations that have electronic health records.
True
False - CORRECT ANSWER- False
,The Informatics nurse is involved with measure to protect the security and
confidentiality of patient data because:
a. it is a joint commission mandate
b. it is regulated by HIPPA legislation
c. the major cause of security breaches is human error
d. both B and C are correct - CORRECT ANSWER- d. It is regulated by HIPPA
Legislation and The Major cause of security breeches is human error.
Some examples of physical security for healthcare data are fences, walls, locks,
safes, vaults, armed guards, sensors, alarms.
True
False - CORRECT ANSWER- TRUE
One way to track the activity that is occurring in a system is:
a. a GANTT chart
b. an audit trail
c. a data backup
d. biometrics - CORRECT ANSWER- b. an audit trail
PHI stands for :
a. physician hospital interchange
b. password hint indicator
c. potential hardware incursion
, d. protected health information - CORRECT ANSWER- d. Protected Health
Information
If the informatics nurse is concerned that a computer system may not function
well during peak times of access the type of testing needed is:
a. Functional Testing
b. System Integrated testing
c. Black box testing
d. Load volume testing - CORRECT ANSWER- Load Volume Testing
What is Load Volume Testing? - CORRECT ANSWER- Load/volume testing is a non-
functional testing for reliability that assesses the ability of the system to function
under various loads, such as at peak times when multiple users in multiple
departments are accessing the system. The purpose of load/volume testing is to
determine the maximum load capacity and to identify the load at which problems
begin to occur. Testing is done at both the safe working load (SWL) and above the
SWL.
In preparation for the workflow redesign necessitated for implementation of an
EHR, the first step should be to
a. Assess the EHR requirments
b. Conduct surveys about the workflow
c. Assess compatibility with the EHR
d. Map the current workflow - CORRECT ANSWER- map the current workflow