WGU C468 Information Management and
Application of Technology Exam Questions
With Correct Answers
System security involves protection against
| | | |
A) poor system design | |
B) noncompliant users |
C) deliberate attacks, errors, omissions, disasters, and viruses
| | | | | |
D) vendor breech of support contract | | | |
(ANS- C) deliberate attacks, errors, omissions, disasters, and viruses
| | | | | | | |
Which of the following is a mechanism that logs a user off the system after a specified
| | | | | | | | | | | | | | | |
period of inactivity on the terminal or computer?
| | | | | | | |
A) automatic sign-off |
B) remote access |
C) automatic access |
D) automaticpassword protection | |
(ANS- A) automatic sign-off
| | | |
The sharing of private information in a situation in which a relationship has been
| | | | | | | | | | | | |
established for the purpose of treatment, or delivery of services, with the
| | | | | | | | | | | |
understanding that this information will remain protected is
| | ? | | | | | | |
A) information privacy |
B) privacy
C) confidentiality
D) information system security | |
(ANS- C) confidentiality
| | |
is a combination of hardware and software that forms a barrier | | | | | | | | | |
between systems, or different parts of a single system to protect those systems
| | | | | | | | | | | | |
from unauthorized access.
| | |
A) Antivirus software |
B) Firewall
C) Physical security |
D) Application security |
,(ANS- B) Firewall | |
The ability to use a health enterprise's information system from outside locations
| | | | | | | | | | |
such as a physician's office is known as
| | | | . | | | | |
A) remote access |
B) automatic access |
C) system connectivity |
D) auto connectivity |
(ANS- A) remote access
| | | |
What are the driving forces behind the Health Information Exchange (HIE)
| | | | | | | | | |
movement?
|
A) provider demands for cost containment | | | |
B) international demands |
C) healthcare insurance reform | |
D) federal legislation, and demands for safer, more efficient healthcare
| | | | | | | |
(ANS- D) federal legislation, and demands for safer, more efficient healthcare
| | | | | | | | | |
How do Health Information Exchanges (HIEs) impact healthcare delivery?
| | | | | | | |
A) HIEs have the capacity to improve the quality of care delivered by decreasing
| | | | | | | | | | | |
access to records
| | |
B) HIEs have limited impact at this time
| | | | | |
C) HIEs increase the efficiency and potentially the quality of the healthcare
| | | | | | | | | |
delivery system
| |
D) HIEs have not been shown to impact the safety of care delivered
| | | | | | | | | | |
(ANS- C) HIEs increase the efficiency and potentially the quality of the healthcare
| | | | | | | | | | | |
delivery system
| |
Information and data privacy | | |
A) provide protection for healthcare information only | | | | |
B) includes the right to choose the conditions and extent to which information is
| | | | | | | | | | | |
shared
|
C) are best maintained through paper backups
| | | | |
D) only applies when a HIPAA release form is signed
| | | | | | | |
,(ANS- B) includes the right to choose the conditions and extent to which information
| | | | | | | | | | | | |
is shared
| |
The Health Information Technology for Economic and Clinical Health Act (HITECH)
| | | | | | | | | |
is known for all of the following except:
| | | | | | | |
A) Including a privacy rule establishing national standards for protecting health
| | | | | | | | |
information
|
B) Funded workforce training, and new technology research and development in
| | | | | | | | |
HIT
|
C) Ensured the collection of aggregate data that could be used to improve policy
| | | | | | | | | | | |
decisions relative to allocation of services and population health
| | | | | | | | |
D) Provided funds and incentives to increase the adoption of EHRs by providers
| | | | | | | | | | |
(ANS- A) Including a privacy rule establishing national standards for protecting
| | | | | | | | | | |
health information
| |
The SWOT analysis is conducted in what phase of information system life cycle?
| | | | | | | | | | | |
A) evaluation phase |
B) monitoring and control phase | | |
C) implementation phase |
D) strategic planning phase | |
(ANS- D) strategic planning phase
| | | |
Training documents are developed and user training occurs in which phase of the
| | | | | | | | | | | |
project management life cycle (PMLC)?
| | | | |
A) evaluation phase |
B) design/plan phase |
C) implementation phase |
D) monitoring and control phase | | |
(ANS- C) implementation phase
| | | |
, Maintenance of an information system includes all of the following except | | | | | | | | | |
.
A) problem solving and debugging | | |
B) training end users | |
C) performing file-backup procedures | |
D) updating security protections | |
(ANS- B) training end users
| | | | |
Who determines the project implementation strategy?
| | | | |
A) the system analyst | |
B) the vendor |
C) the implementation committee
| |
D) the board of directors and CEO
| | | | |
(ANS- C) the implementation committee
| | | |
The first task of the project implementation committee is to
| | | | | | | | | | .
A) gather data |
B) develop a timeline | |
C) recruit key stakeholders | |
D) establish subcommittees |
(ANS- B) develop a timeline
| | | | |
An advantage to using super users for system training is that
| . | | | | | | | | | |
A) super users leave after the initial training is complete
| | | | | | | |
B) super users have extensive preparation in learning theory
| | | | | | |
C) super users have a specialized knowledge of both the system and clinical areas
| | | | | | | | | | | |
D) super users have in-depth knowledge of system code
| | | | | | |
(ANS- C) super users have a specialized knowledge of both the system and clinical
| | | | | | | | | | | | |
areas
|
What is the most important factor in maintaining the proper use of an information
| | | | | | | | | | | | |
system?
|
A) revenue and resources | |
B) planning
C) education
Application of Technology Exam Questions
With Correct Answers
System security involves protection against
| | | |
A) poor system design | |
B) noncompliant users |
C) deliberate attacks, errors, omissions, disasters, and viruses
| | | | | |
D) vendor breech of support contract | | | |
(ANS- C) deliberate attacks, errors, omissions, disasters, and viruses
| | | | | | | |
Which of the following is a mechanism that logs a user off the system after a specified
| | | | | | | | | | | | | | | |
period of inactivity on the terminal or computer?
| | | | | | | |
A) automatic sign-off |
B) remote access |
C) automatic access |
D) automaticpassword protection | |
(ANS- A) automatic sign-off
| | | |
The sharing of private information in a situation in which a relationship has been
| | | | | | | | | | | | |
established for the purpose of treatment, or delivery of services, with the
| | | | | | | | | | | |
understanding that this information will remain protected is
| | ? | | | | | | |
A) information privacy |
B) privacy
C) confidentiality
D) information system security | |
(ANS- C) confidentiality
| | |
is a combination of hardware and software that forms a barrier | | | | | | | | | |
between systems, or different parts of a single system to protect those systems
| | | | | | | | | | | | |
from unauthorized access.
| | |
A) Antivirus software |
B) Firewall
C) Physical security |
D) Application security |
,(ANS- B) Firewall | |
The ability to use a health enterprise's information system from outside locations
| | | | | | | | | | |
such as a physician's office is known as
| | | | . | | | | |
A) remote access |
B) automatic access |
C) system connectivity |
D) auto connectivity |
(ANS- A) remote access
| | | |
What are the driving forces behind the Health Information Exchange (HIE)
| | | | | | | | | |
movement?
|
A) provider demands for cost containment | | | |
B) international demands |
C) healthcare insurance reform | |
D) federal legislation, and demands for safer, more efficient healthcare
| | | | | | | |
(ANS- D) federal legislation, and demands for safer, more efficient healthcare
| | | | | | | | | |
How do Health Information Exchanges (HIEs) impact healthcare delivery?
| | | | | | | |
A) HIEs have the capacity to improve the quality of care delivered by decreasing
| | | | | | | | | | | |
access to records
| | |
B) HIEs have limited impact at this time
| | | | | |
C) HIEs increase the efficiency and potentially the quality of the healthcare
| | | | | | | | | |
delivery system
| |
D) HIEs have not been shown to impact the safety of care delivered
| | | | | | | | | | |
(ANS- C) HIEs increase the efficiency and potentially the quality of the healthcare
| | | | | | | | | | | |
delivery system
| |
Information and data privacy | | |
A) provide protection for healthcare information only | | | | |
B) includes the right to choose the conditions and extent to which information is
| | | | | | | | | | | |
shared
|
C) are best maintained through paper backups
| | | | |
D) only applies when a HIPAA release form is signed
| | | | | | | |
,(ANS- B) includes the right to choose the conditions and extent to which information
| | | | | | | | | | | | |
is shared
| |
The Health Information Technology for Economic and Clinical Health Act (HITECH)
| | | | | | | | | |
is known for all of the following except:
| | | | | | | |
A) Including a privacy rule establishing national standards for protecting health
| | | | | | | | |
information
|
B) Funded workforce training, and new technology research and development in
| | | | | | | | |
HIT
|
C) Ensured the collection of aggregate data that could be used to improve policy
| | | | | | | | | | | |
decisions relative to allocation of services and population health
| | | | | | | | |
D) Provided funds and incentives to increase the adoption of EHRs by providers
| | | | | | | | | | |
(ANS- A) Including a privacy rule establishing national standards for protecting
| | | | | | | | | | |
health information
| |
The SWOT analysis is conducted in what phase of information system life cycle?
| | | | | | | | | | | |
A) evaluation phase |
B) monitoring and control phase | | |
C) implementation phase |
D) strategic planning phase | |
(ANS- D) strategic planning phase
| | | |
Training documents are developed and user training occurs in which phase of the
| | | | | | | | | | | |
project management life cycle (PMLC)?
| | | | |
A) evaluation phase |
B) design/plan phase |
C) implementation phase |
D) monitoring and control phase | | |
(ANS- C) implementation phase
| | | |
, Maintenance of an information system includes all of the following except | | | | | | | | | |
.
A) problem solving and debugging | | |
B) training end users | |
C) performing file-backup procedures | |
D) updating security protections | |
(ANS- B) training end users
| | | | |
Who determines the project implementation strategy?
| | | | |
A) the system analyst | |
B) the vendor |
C) the implementation committee
| |
D) the board of directors and CEO
| | | | |
(ANS- C) the implementation committee
| | | |
The first task of the project implementation committee is to
| | | | | | | | | | .
A) gather data |
B) develop a timeline | |
C) recruit key stakeholders | |
D) establish subcommittees |
(ANS- B) develop a timeline
| | | | |
An advantage to using super users for system training is that
| . | | | | | | | | | |
A) super users leave after the initial training is complete
| | | | | | | |
B) super users have extensive preparation in learning theory
| | | | | | |
C) super users have a specialized knowledge of both the system and clinical areas
| | | | | | | | | | | |
D) super users have in-depth knowledge of system code
| | | | | | |
(ANS- C) super users have a specialized knowledge of both the system and clinical
| | | | | | | | | | | | |
areas
|
What is the most important factor in maintaining the proper use of an information
| | | | | | | | | | | | |
system?
|
A) revenue and resources | |
B) planning
C) education