Certification Revision
Questions And Correct
Answers 2025-2026
GRADED A+
HIPPA only applies to organizations that have electronic health records.
True
False - ANS-False
The Informatics nurse is involved with measure to protect the security and
confidentiality of patient data because:
a. it is a joint commission mandate
b. it is regulated by HIPPA legislation
c. the major cause of security breaches is human error
d. both B and C are correct - ANS-d. It is regulated by HIPPA Legislation and The
Major cause of security breeches is human error.
Controls to protect data privacy and integrity are both logical and:
a. physical
b. analytical
c. theoretical
d. psychological - ANS-b. analytical
Which of the following is not a mechanism for protecting the security of health
data:
a. Automatic sign-offs
b. A Strong Password
,c. Having one password per nursing unit
d. Firewalls - ANS-C. Having one password per nursing unit.
An audit trail is :
a. a log of which project meetings and events have been completed
b. an electronic tool that can track system access by individual user who viewed
a specific client record.
c. a proactive tool to monitor who will be using a system and modifying data.
d. used primarily as a data integrity tool - ANS-b. an electronic tool that can track
system access by individual user who viewed a specific client record.
Data can be represented by all EXCEPT:
a. text
b. audio
c. transmission waves
d. video - ANS-a. text
Things to consider related to disaster planning include:
a. should have only 1 database to make it easier to recover
b. all data should be stored onsite so it is accessible
c. must have a solid communication plan during disaster and recovery.
d. an association or group that shows uniformity - ANS-C. Must have a solid
communication plan during disaster and recover.
Some examples of physical security for healthcare data are fences, walls, locks,
safes, vaults, armed guards, sensors, alarms.
True
False - ANS-TRUE
One way to track the activity that is occurring in a system is:
a. a GANTT chart
b. an audit trail
c. a data backup
,d. biometrics - ANS-b. an audit trail
PHI stands for :
a. physician hospital interchange
b. password hint indicator
c. potential hardware incursion
d. protected health information - ANS-d. Protected Health Information
If the informatics nurse is concerned that a computer system may not function
well during peak times of access the type of testing needed is:
a. Functional Testing
b. System Integrated testing
c. Black box testing
d. Load volume testing - ANS-Load Volume Testing
What is Load Volume Testing? - ANS-Load/volume testing is a non-functional
testing for reliability that assesses the ability of the system to function under
various loads, such as at peak times when multiple users in multiple
departments are accessing the system. The purpose of load/volume testing is to
determine the maximum load capacity and to identify the load at which
problems begin to occur. Testing is done at both the safe working load (SWL) and
above the SWL.
In preparation for the workflow redesign necessitated for implementation of an
EHR, the first step should be to
a. Assess the EHR requirments
b. Conduct surveys about the workflow
c. Assess compatibility with the EHR
d. Map the current workflow - ANS-map the current workflow
Which resource for evidence-based research is provided by the National Library
of Medicine?
a. BMJ Publishing
b. CINAHL
c. PubMed
, d. World View on Evidence based- nursing - ANS-PubMed is a resource for
evidence-based research that is provided by the National Library of Medicine,
which was developed by the National Center for Biotechnology Information
(NCBI). PubMed provides access to numerous databases with 24 million citations
from MEDLINE (the National Library of Medicine's bibliographic database with
references to life sciences and biomedical sciences), life science journals, and
electronic books with links to full text when it is available.
When considering transitioning to cloud storage and assessing vendors, the most
critical assessment relates to:
a. regulatory compliance
b. monitoring mechanisms
c. cost analysis
d. interoperability - ANS-The most critical assessment relates to compliance with
regulatory requirements because if the vendor cannot verify that the company
meets HIPAA requirements and satisfies the Code of Federal Regulations Title 21,
Part 11 (which provides regulations regarding electronic records and electronic
signatures), then security of patient data may be inadequate. Other important
considerations include cost analysis (including cost of implementation and
ongoing costs), monitoring mechanisms, and interoperability.
When utilizing a prioritization matrix to prioritize activities as a project manager,
the informatics nurse must first establish:
a. rating scale and categories
b. criteria and timeframe
c. criteria and rating scale
d. rating scale and timeframe - ANS-the informatics nurse must first establish
criteria and a rating scale. The criteria includes those factors that are utilized to
determine how important each project is; for example, a project mandated by
regulations is more important than a project that may improve customer
satisfaction. A rating scale for each project should be established with numeric
values (such as 1 to 10) used to demonstrate how effective the project is in
meeting the criteria. A typical prioritization matrix may have up to a dozen
criteria.
An advantage of an identity and access management (IAM) system is that the
IAM system:
a. provides HIPAA-required encryption for PHI
b. satisfies the Code of Federal Regulations Title 21, Part 11
c. meets HIPAA's Security Rule requirements regarding access to PHI