100% satisfaction guarantee Immediately available after payment Read online or as PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

HIPAA Final Exam with Complete Solutions

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
15-03-2026
Written in
2025/2026

HIPAA Final Exam with Complete Solutions

Institution
HIPAA
Course
HIPAA

Content preview

HIPAA Final Exam with Complete
Solutions

ability or means necessary to read, write, modify or communicate data - ANSWER-
access

actions, plus policies and procedures to manage the selection, development,
implementation and maintenance of security measures in relation to the protection of
information. - ANSWER-administrative safeguard

audit trail - ANSWER-- data collected during the use of electronic devices that include
the who, what, when and where.

authentication - ANSWER-confirmation that a person is the one claimed

contingency plan - ANSWER-policies and procedures for responding to an
emergency /occurrence that damages systems contain e-PHI.

e-PHI - ANSWER-electronic protected health information

encryption - ANSWER-transforming confidential plain text into cipher text to protect it.

a system that normally includes software, information, data, applications,
communications and people. - ANSWER-information system

infrastructure - ANSWER-- underlying foundation or basic framework that directs
information system commands and responses and transports and stores data.

integrity - ANSWER-- property of data/information of having not been altered or
destroyed in an unauthorized manner.

- method by which the sender of data is provided with proof of delivery and the recipient
is assured of the sender's identity so that neither can later deny having processed the
data. - ANSWER-nonrepudiation

password - ANSWER-confidential, character string used in conjunction with a user ID to
verify the identity of an individual attempting to gain access to a computer system.

physical safeguards - ANSWER-physical measures, policies and procedures to
electronic information system/related buildings/equipment from natural/environmental
hazards and unauthorized intrusion

,impact and likelihood of an adverse event - ANSWER-risk

process of balancing the cost of security control measures against the losses that would
be expected - ANSWER-risk analysis

risk management - ANSWER-ongoing process that asses the risk to electronic
information resources and the information itself to determine adequate security for a
system that will reduce the threat and vulnerability to protect health information.

security incident - ANSWER-attempted or successful unauthorized access, use,
disclosure, modification or destruction of information.

technical safeguards - ANSWER-technology and the policies and procedures for its use
that protect e-PHI and control access to it.

workstation - ANSWER-electronic computing device

Which workstation security safeguards are YOU responsible for using and/or protecting
- ANSWER-user ID,log-off programs, password

True/False-Under HCPCS, the DHHS sets the standard but does not specify how to
comply; the Security Rule mandates that each covered entity appoint someone to be
responsible for securing e-PHI. - ANSWER-False

True/ False--- Healthcare clearinghouses process a large portion of the total volume of
health claims; these clearinghouses must maintain security of all e-PHI processed just
as a healthcare provider does - ANSWER-False

Discuss password protection and the need for privacy of passwords. Remembering that
passwords is problematic for some people. Why is it essential? - ANSWER-Short
passwords or those that use parts of name or address of individual are easily guessed.
Passwords of four characters can be guess in minutes; passwords of seven missed
alphanumeric characters take about 2 weeks to crack.
It is best to plan NOT to be an easy target. Access protection should challenge potential
hackers. It is not realistic to have an impenetrable firewall, just a good one that is better
than most.


Using videoconferencing to conduct an office visit with a physician located at a distance
is a technology that is becoming increasing utilized; what is the name of this
technology? - ANSWER-telemedicine

Any security incident must be disclosed to the individuals involved. Consider the impact
on a healthcare facility when the access is to their database and perhaps thousands of
patient records have been exposed. How is the facility to manage this breach within

, HIPAA rules? - ANSWER-They have to write a report, then place the written information
in each medical record that is associated with the incident, then send a letter to each
patient letting each one know what happened and how they were affected

The security rule requires that all policies be accessible for review either in electronic
policy form or on paper in a location that is readily available to all employees. These
policies are to be reviewed on a regular basis to ensure compliance. How long are the
policies and procedures to be kept even if the wording has been changed or eliminated?
- ANSWER-6 years

It appears that most entities have taken the actions required for compliance. AHIMA
reported the most common problems were found as policies and procedures were
developed for HIPAA. List three of the problems: - ANSWER-accounting for release of
PHI;
obtaining PHI from other providers;
access AND releasee of information to relatives or spouses;
complying with BA provisions;
confusion by individuals regarding the Notice of Privacy Practices;
access AND release of information to law enforcement.

True/False--Healthcare plans do not need a unique identifier to go along with the
identifiers for each healthcare provider and employer that uses standardized
transactions. - ANSWER-False

Presently there are 5 situational uses of the standard unique employer identifier in
electronic transactions; name 3 uses: - ANSWER-healthcare eligibility benefit inquiry
and response;
healthcare claim status request/response;
benefit enrollment and maintenance in a health plan;
health plan premium payments;
healthcare claim (dental, professional or institutional.

Several organizations are developing plans to establish a unique identifier for patients
for possible future use. There are seven possible systems - list 3 different types: -
ANSWER-standard guide for properties of a universal health identifier UHID;
social security number SSN;
biometrics ID;
directory service;
personal immutable properties;
patient identification system based on existing MR number and practitioner prefix;
public key - private key cryptology method

Obtaining by theft or deception of personal medical information, such as one's address,
social security number or health insurance information for use in submitting false claims
or seeking medical care or goods is called: - ANSWER-medical identity theft

Written for

Institution
HIPAA
Course
HIPAA

Document information

Uploaded on
March 15, 2026
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ALVINK2022 University of Oxford
View profile
Follow You need to be logged in order to follow users or courses
Sold
252
Member since
3 year
Number of followers
157
Documents
10576
Last sold
6 days ago

4.3

87 reviews

5
54
4
17
3
7
2
3
1
6

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions