MHA 705 FINAL EXAM | QUESTIONS
AND CORRECT ANSWERS | RATED A+
| LATEST 2025/2026 GUIDE
A _______ and an ________ proceeding are functionally equivalent.
Both have the same remedies available in the event that the entity is
found guilty of noncompliance and issue binding decisions. Appeals are
only available for administrative proceeding decisions
- Correct Answer - Court and Administrative
_______ ________ governs physician self-referral for Medicare and
Medicaid patients, prohibits physicians from referring patients for certain
designated health services (DHS) to entities where the physician has a
financial relationship, and conflict of interest created when a referring
physician or his family can benefit from the referral
- Correct Answer - Stark Law
________ _____ ________ ________ is a criminal statute prohibiting
the exchange or offer to exchange anything of value in an effort to
induce referral of a federal healthcare program beneficiary and requires
a knowing and willful offer of payment, solicitation, or receipt of any
remuneration to induce someone to refer patients, or to purchase, order,
or recommend any item of service that may be paid for under a federal
healthcare program.
- Correct Answer - Federal Anti-Kickback Statute
,_______ _______ guard against criminal and civil prosecution for Stark
and anti kickback violations in certain situations. Must meet all
parameters of the _______ ______ rule
- Correct Answer - Safe Harbor
_______ _______ ______ imposes civil liability on a person who
submits a claim to the federal government that he or she knows or
should know to be false • Imposes certain monetary penalties for
violations of the act, ______ ______ _____ is an issue with EHRs
because each clinical encounter generates a bill. If the bill is not
accurate and is sent to a government payor for payment, it is considered
a false claim, Patient Protection and Affordable Care Act (PPACA)
expanded the scope of the FCA as well as Civil and criminal penalties
possible
- Correct Answer - False Claims Act (FCA)
_______/_______ _______: ________fraud includes healthcare fraud
that occurs through the use of the US mail system, FedEx, or UPS, Can
occur when paper claims with improper coding are sent to patients or
their insurers. ______ fraud involves interstate use of wire, radio, or TV
communication to commit fraud and encompasses computerized claim
submissions.
- Correct Answer - Wire/Mail Fraud
Mail
,Wire
Fraud and Abuse and the ______ ______ ____ this consists of
Inaccurate entries in the _____ _____ _____ may result in fraudulent
billing, healthcare fraud can include billing for services that were not
rendered or services that were unnecessary or unbundling services
generally billed as one Current Procedural Terminology code to increase
revenue, and Copy and paste functionality within _____ _____ ______
can result in an inaccurate record
- Correct Answer - Electronic Health Records (EHR)
CMS has designated The Joint Commission (TJC) and Det Norske
Veritas (DNV) as third party agencies able to establish ________ to
hospitals for participation in Medicare and Medicaid programs and each
has their own _______ program but only TJC provides a specific health
information management chapter
- Correct Answer - Accreditation
_________ ________ are regulated by the Food and Drug
Administration - Correct Answer - Medical Devices
mHealth ________ _______ and __________ regulators have taken a
hands off approach here but there are concerns of ownership of data
collected by mHealth. - Correct Answer - Wearable Devices and
Telemedicine
, _______ ______ and ________ challenge balancing rights of
employees and free speech against the privacy rights of patients. -
Correct Answer - Social Media and Informatics
Examples of De-identification data would be - Correct Answer - Safe
Harbor Method and Expert Determination Method
Information Security is important. _______ ______ increases with
adequate security measures and decreases with breaches of privacy
and security - Correct Answer - Public Trust
There are Increasing Security ________ to Healthcare Data. _______
are exposure of health information, identity theft, and fraud - Correct
Answer - Threats
With the increasing security threat to healthcare data there must be
_____ ___ __________ which means increased electronic access and
transmissions as a result of the use of mobile devices and expanded
data sharing within and across health organizations. - Correct Answer -
Changes in Practice
External events: Outside attempts to access an organization's network
(hacking), intrusions though a firewall, and installing malicious code or
sending malicious messages via e-mail • Internal events: Breaches by
AND CORRECT ANSWERS | RATED A+
| LATEST 2025/2026 GUIDE
A _______ and an ________ proceeding are functionally equivalent.
Both have the same remedies available in the event that the entity is
found guilty of noncompliance and issue binding decisions. Appeals are
only available for administrative proceeding decisions
- Correct Answer - Court and Administrative
_______ ________ governs physician self-referral for Medicare and
Medicaid patients, prohibits physicians from referring patients for certain
designated health services (DHS) to entities where the physician has a
financial relationship, and conflict of interest created when a referring
physician or his family can benefit from the referral
- Correct Answer - Stark Law
________ _____ ________ ________ is a criminal statute prohibiting
the exchange or offer to exchange anything of value in an effort to
induce referral of a federal healthcare program beneficiary and requires
a knowing and willful offer of payment, solicitation, or receipt of any
remuneration to induce someone to refer patients, or to purchase, order,
or recommend any item of service that may be paid for under a federal
healthcare program.
- Correct Answer - Federal Anti-Kickback Statute
,_______ _______ guard against criminal and civil prosecution for Stark
and anti kickback violations in certain situations. Must meet all
parameters of the _______ ______ rule
- Correct Answer - Safe Harbor
_______ _______ ______ imposes civil liability on a person who
submits a claim to the federal government that he or she knows or
should know to be false • Imposes certain monetary penalties for
violations of the act, ______ ______ _____ is an issue with EHRs
because each clinical encounter generates a bill. If the bill is not
accurate and is sent to a government payor for payment, it is considered
a false claim, Patient Protection and Affordable Care Act (PPACA)
expanded the scope of the FCA as well as Civil and criminal penalties
possible
- Correct Answer - False Claims Act (FCA)
_______/_______ _______: ________fraud includes healthcare fraud
that occurs through the use of the US mail system, FedEx, or UPS, Can
occur when paper claims with improper coding are sent to patients or
their insurers. ______ fraud involves interstate use of wire, radio, or TV
communication to commit fraud and encompasses computerized claim
submissions.
- Correct Answer - Wire/Mail Fraud
,Wire
Fraud and Abuse and the ______ ______ ____ this consists of
Inaccurate entries in the _____ _____ _____ may result in fraudulent
billing, healthcare fraud can include billing for services that were not
rendered or services that were unnecessary or unbundling services
generally billed as one Current Procedural Terminology code to increase
revenue, and Copy and paste functionality within _____ _____ ______
can result in an inaccurate record
- Correct Answer - Electronic Health Records (EHR)
CMS has designated The Joint Commission (TJC) and Det Norske
Veritas (DNV) as third party agencies able to establish ________ to
hospitals for participation in Medicare and Medicaid programs and each
has their own _______ program but only TJC provides a specific health
information management chapter
- Correct Answer - Accreditation
_________ ________ are regulated by the Food and Drug
Administration - Correct Answer - Medical Devices
mHealth ________ _______ and __________ regulators have taken a
hands off approach here but there are concerns of ownership of data
collected by mHealth. - Correct Answer - Wearable Devices and
Telemedicine
, _______ ______ and ________ challenge balancing rights of
employees and free speech against the privacy rights of patients. -
Correct Answer - Social Media and Informatics
Examples of De-identification data would be - Correct Answer - Safe
Harbor Method and Expert Determination Method
Information Security is important. _______ ______ increases with
adequate security measures and decreases with breaches of privacy
and security - Correct Answer - Public Trust
There are Increasing Security ________ to Healthcare Data. _______
are exposure of health information, identity theft, and fraud - Correct
Answer - Threats
With the increasing security threat to healthcare data there must be
_____ ___ __________ which means increased electronic access and
transmissions as a result of the use of mobile devices and expanded
data sharing within and across health organizations. - Correct Answer -
Changes in Practice
External events: Outside attempts to access an organization's network
(hacking), intrusions though a firewall, and installing malicious code or
sending malicious messages via e-mail • Internal events: Breaches by