100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

RHIA Domain 5 Study Questions and Answers | Latest Version | 2025/2026 | Correct & Verified

Rating
-
Sold
-
Pages
81
Grade
A+
Uploaded on
26-12-2025
Written in
2025/2026

RHIA Domain 5 Study Questions and Answers | Latest Version | 2025/2026 | Correct & Verified Which of the following is a potential consequence of failing to follow HIPAA security rules? A) Staff training B) Civil and criminal penalties, fines, and reputational harm C) More efficient EHR usage D) Increased patient engagement Which of the following is an example of safeguarding PHI in emails? A) Sending PHI unencrypted to colleagues B) Encrypting emails containing PHI C) Forwarding PHI to personal email D) Printing and leaving emails on desks Which of the following is part of risk management in HIM? A) Clinical care B) Identifying and mitigating threats to ePHI C) Billing workflow D) Appointment scheduling Which of the following describes a HIPAA-covered entity? 2 A) Any IT company B) Healthcare providers, health plans, and healthcare clearinghouses C) Schools D) Retail companies Which of the following is an example of improper access to PHI? A) Physician reviewing patient chart B) Administrative staff checking a neighbor’s medical record without authorization C) Nurse viewing assigned patient chart D) Auditor reviewing records with consent Which of the following is a required HIPAA security safeguard for electronic records? A) Paper shredding B) Access control and audit trails C) Posting patient info publicly D) Open workstation access Which of the following is part of business associate responsibilities? A) Approve medical treatment B) Protect PHI according to HIPAA rules C) Schedule patient appointments D) Provide clinical care 3 Which of the following is a common method of protecting portable storage devices containing PHI? A) Leaving them unlocked B) Sharing among colleagues C) Encrypting and securely storing when not in use D) Writing passwords on paper next to the device Which of the following demonstrates compliance with HIPAA’s minimum necessary standard? A) Sharing all patient records with the billing department B) Giving all staff full access to the EHR C) Only providing PHI needed to perform job duties D) Posting PHI on bulletin boards Which law mandates the protection of electronic protected health information (ePHI)? A) ADA B) HITECH C) HIPAA D) FERPA What is the purpose of access controls in an EHR system? A) Ensure backup is complete B) Increase system speed C) Limit access based on user roles 4 D) Notify patients automatically Which of the following is an example of a technical safeguard? A) Employee confidentiality agreement B) Privacy policy manual C) Encryption of health data D) HIPAA training session

Show more Read less
Institution
RHIA Domain 5 Study
Course
RHIA Domain 5 Study











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
RHIA Domain 5 Study
Course
RHIA Domain 5 Study

Document information

Uploaded on
December 26, 2025
Number of pages
81
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

RHIA Domain 5 Study Questions and
Answers | Latest Version | 2025/2026 |
Correct & Verified
Which of the following is a potential consequence of failing to follow HIPAA security rules?

A) Staff training

✔✔B) Civil and criminal penalties, fines, and reputational harm

C) More efficient EHR usage

D) Increased patient engagement



Which of the following is an example of safeguarding PHI in emails?

A) Sending PHI unencrypted to colleagues

✔✔B) Encrypting emails containing PHI

C) Forwarding PHI to personal email

D) Printing and leaving emails on desks



Which of the following is part of risk management in HIM?

A) Clinical care

✔✔B) Identifying and mitigating threats to ePHI

C) Billing workflow

D) Appointment scheduling



Which of the following describes a HIPAA-covered entity?


1

,A) Any IT company

✔✔B) Healthcare providers, health plans, and healthcare clearinghouses

C) Schools

D) Retail companies



Which of the following is an example of improper access to PHI?

A) Physician reviewing patient chart

✔✔B) Administrative staff checking a neighbor’s medical record without authorization

C) Nurse viewing assigned patient chart

D) Auditor reviewing records with consent



Which of the following is a required HIPAA security safeguard for electronic records?

A) Paper shredding

✔✔B) Access control and audit trails

C) Posting patient info publicly

D) Open workstation access



Which of the following is part of business associate responsibilities?

A) Approve medical treatment

✔✔B) Protect PHI according to HIPAA rules

C) Schedule patient appointments

D) Provide clinical care



2

,Which of the following is a common method of protecting portable storage devices containing

PHI?

A) Leaving them unlocked

B) Sharing among colleagues

✔✔C) Encrypting and securely storing when not in use

D) Writing passwords on paper next to the device



Which of the following demonstrates compliance with HIPAA’s minimum necessary standard?

A) Sharing all patient records with the billing department

B) Giving all staff full access to the EHR

✔✔C) Only providing PHI needed to perform job duties

D) Posting PHI on bulletin boards



Which law mandates the protection of electronic protected health information (ePHI)?

A) ADA

B) HITECH

✔✔C) HIPAA

D) FERPA



What is the purpose of access controls in an EHR system?

A) Ensure backup is complete

B) Increase system speed

✔✔C) Limit access based on user roles

3

, D) Notify patients automatically



Which of the following is an example of a technical safeguard?

A) Employee confidentiality agreement

B) Privacy policy manual

✔✔C) Encryption of health data

D) HIPAA training session



What does PHI stand for?

A) Patient Health Indicator

✔✔B) Protected Health Information

C) Personal Health Index

D) Public Health Initiative



Which action would be considered a breach of HIPAA privacy rules?

A) Sharing treatment information with the patient

✔✔B) Sending a patient’s record to a friend without authorization

C) Reviewing your own medical record

D) Discussing general statistics without identifiers



What is the purpose of audit trails in health information systems?

A) Measure patient satisfaction

✔✔B) Track access and activity of users

4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SterlingScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
410
Member since
1 year
Number of followers
41
Documents
12105
Last sold
2 days ago
Boost Your Brilliance: Document Spot

Welcome to my shop! My shop is your one-stop destination for unlocking your full potential. Inside, you\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'ll find a treasure collection of resources prepared to help you reach new heights. Whether you\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'re a student, professional, or lifelong learner, my collection of documents is designed to empower you on your academic journey. Each document is a key to unlocking your capabilities and achieving your goals. Step into my shop today and embark on the path to maximizing your potential!

Read more Read less
4.1

87 reviews

5
51
4
12
3
12
2
4
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions