100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C468 Information Management and Application of Technology Exam Questions With Correct Answers

Rating
-
Sold
-
Pages
70
Grade
A+
Uploaded on
05-10-2025
Written in
2025/2026

WGU C468 Information Management and Application of Technology Exam Questions With Correct Answers

Institution
WGU C468
Module
WGU C468











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C468
Module
WGU C468

Document information

Uploaded on
October 5, 2025
Number of pages
70
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C468 Information Management and
Application of Technology Exam Questions
With Correct Answers

System security involves protection against
| | | |


A) poor system design | |


B) noncompliant users |


C) deliberate attacks, errors, omissions, disasters, and viruses
| | | | | |


D) vendor breech of support contract | | | |


(ANS- C) deliberate attacks, errors, omissions, disasters, and viruses
| | | | | | | |




Which of the following is a mechanism that logs a user off the system after a specified
| | | | | | | | | | | | | | | |


period of inactivity on the terminal or computer?
| | | | | | | |


A) automatic sign-off |


B) remote access |


C) automatic access |


D) automaticpassword protection | |


(ANS- A) automatic sign-off
| | | |




The sharing of private information in a situation in which a relationship has been
| | | | | | | | | | | | |


established for the purpose of treatment, or delivery of services, with the
| | | | | | | | | | | |


understanding that this information will remain protected is
| | ? | | | | | | |


A) information privacy |


B) privacy
C) confidentiality
D) information system security | |


(ANS- C) confidentiality
| | |




is a combination of hardware and software that forms a barrier | | | | | | | | | |


between systems, or different parts of a single system to protect those systems
| | | | | | | | | | | | |


from unauthorized access.
| | |


A) Antivirus software |


B) Firewall
C) Physical security |


D) Application security |

,(ANS- B) Firewall | |




The ability to use a health enterprise's information system from outside locations
| | | | | | | | | | |


such as a physician's office is known as
| | | | . | | | | |


A) remote access |


B) automatic access |


C) system connectivity |


D) auto connectivity |


(ANS- A) remote access
| | | |




What are the driving forces behind the Health Information Exchange (HIE)
| | | | | | | | | |


movement?
|


A) provider demands for cost containment | | | |


B) international demands |


C) healthcare insurance reform | |


D) federal legislation, and demands for safer, more efficient healthcare
| | | | | | | |


(ANS- D) federal legislation, and demands for safer, more efficient healthcare
| | | | | | | | | |




How do Health Information Exchanges (HIEs) impact healthcare delivery?
| | | | | | | |


A) HIEs have the capacity to improve the quality of care delivered by decreasing
| | | | | | | | | | | |


access to records
| | |


B) HIEs have limited impact at this time
| | | | | |


C) HIEs increase the efficiency and potentially the quality of the healthcare
| | | | | | | | | |


delivery system
| |


D) HIEs have not been shown to impact the safety of care delivered
| | | | | | | | | | |


(ANS- C) HIEs increase the efficiency and potentially the quality of the healthcare
| | | | | | | | | | | |


delivery system
| |




Information and data privacy | | |


A) provide protection for healthcare information only | | | | |


B) includes the right to choose the conditions and extent to which information is
| | | | | | | | | | | |


shared
|


C) are best maintained through paper backups
| | | | |


D) only applies when a HIPAA release form is signed
| | | | | | | |

,(ANS- B) includes the right to choose the conditions and extent to which information
| | | | | | | | | | | | |


is shared
| |




The Health Information Technology for Economic and Clinical Health Act (HITECH)
| | | | | | | | | |


is known for all of the following except:
| | | | | | | |




A) Including a privacy rule establishing national standards for protecting health
| | | | | | | | |


information
|


B) Funded workforce training, and new technology research and development in
| | | | | | | | |


HIT
|


C) Ensured the collection of aggregate data that could be used to improve policy
| | | | | | | | | | | |


decisions relative to allocation of services and population health
| | | | | | | | |


D) Provided funds and incentives to increase the adoption of EHRs by providers
| | | | | | | | | | |


(ANS- A) Including a privacy rule establishing national standards for protecting
| | | | | | | | | | |


health information
| |




The SWOT analysis is conducted in what phase of information system life cycle?
| | | | | | | | | | | |


A) evaluation phase |


B) monitoring and control phase | | |


C) implementation phase |


D) strategic planning phase | |


(ANS- D) strategic planning phase
| | | |




Training documents are developed and user training occurs in which phase of the
| | | | | | | | | | | |


project management life cycle (PMLC)?
| | | | |


A) evaluation phase |


B) design/plan phase |


C) implementation phase |


D) monitoring and control phase | | |


(ANS- C) implementation phase
| | | |

, Maintenance of an information system includes all of the following except | | | | | | | | | |


.
A) problem solving and debugging | | |


B) training end users | |


C) performing file-backup procedures | |


D) updating security protections | |


(ANS- B) training end users
| | | | |




Who determines the project implementation strategy?
| | | | |


A) the system analyst | |


B) the vendor |


C) the implementation committee
| |


D) the board of directors and CEO
| | | | |


(ANS- C) the implementation committee
| | | |




The first task of the project implementation committee is to
| | | | | | | | | | .
A) gather data |


B) develop a timeline | |


C) recruit key stakeholders | |


D) establish subcommittees |


(ANS- B) develop a timeline
| | | | |




An advantage to using super users for system training is that
| . | | | | | | | | | |


A) super users leave after the initial training is complete
| | | | | | | |


B) super users have extensive preparation in learning theory
| | | | | | |


C) super users have a specialized knowledge of both the system and clinical areas
| | | | | | | | | | | |


D) super users have in-depth knowledge of system code
| | | | | | |


(ANS- C) super users have a specialized knowledge of both the system and clinical
| | | | | | | | | | | | |


areas
|




What is the most important factor in maintaining the proper use of an information
| | | | | | | | | | | | |


system?
|


A) revenue and resources | |


B) planning
C) education

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lectphilip West Virginia University
Follow You need to be logged in order to follow users or courses
Sold
165
Member since
1 year
Number of followers
6
Documents
17647
Last sold
1 day ago
WELCOME TO LECTPHILIP, A PLACE WHERE WE UNLOCK YOUR ACADEMIC OPPORTUNITIES

On this page, you find all documents, package deals and flashcards offered by seller lectphilip

4.4

23 reviews

5
14
4
5
3
3
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions