100% de satisfacción garantizada Inmediatamente disponible después del pago Leer en línea o como PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

HIPAA Final Exam with Complete Solutions

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
15-03-2026
Escrito en
2025/2026

HIPAA Final Exam with Complete Solutions

Institución
HIPAA
Grado
HIPAA

Vista previa del contenido

HIPAA Final Exam with Complete
Solutions

ability or means necessary to read, write, modify or communicate data - ANSWER-
access

actions, plus policies and procedures to manage the selection, development,
implementation and maintenance of security measures in relation to the protection of
information. - ANSWER-administrative safeguard

audit trail - ANSWER-- data collected during the use of electronic devices that include
the who, what, when and where.

authentication - ANSWER-confirmation that a person is the one claimed

contingency plan - ANSWER-policies and procedures for responding to an
emergency /occurrence that damages systems contain e-PHI.

e-PHI - ANSWER-electronic protected health information

encryption - ANSWER-transforming confidential plain text into cipher text to protect it.

a system that normally includes software, information, data, applications,
communications and people. - ANSWER-information system

infrastructure - ANSWER-- underlying foundation or basic framework that directs
information system commands and responses and transports and stores data.

integrity - ANSWER-- property of data/information of having not been altered or
destroyed in an unauthorized manner.

- method by which the sender of data is provided with proof of delivery and the recipient
is assured of the sender's identity so that neither can later deny having processed the
data. - ANSWER-nonrepudiation

password - ANSWER-confidential, character string used in conjunction with a user ID to
verify the identity of an individual attempting to gain access to a computer system.

physical safeguards - ANSWER-physical measures, policies and procedures to
electronic information system/related buildings/equipment from natural/environmental
hazards and unauthorized intrusion

,impact and likelihood of an adverse event - ANSWER-risk

process of balancing the cost of security control measures against the losses that would
be expected - ANSWER-risk analysis

risk management - ANSWER-ongoing process that asses the risk to electronic
information resources and the information itself to determine adequate security for a
system that will reduce the threat and vulnerability to protect health information.

security incident - ANSWER-attempted or successful unauthorized access, use,
disclosure, modification or destruction of information.

technical safeguards - ANSWER-technology and the policies and procedures for its use
that protect e-PHI and control access to it.

workstation - ANSWER-electronic computing device

Which workstation security safeguards are YOU responsible for using and/or protecting
- ANSWER-user ID,log-off programs, password

True/False-Under HCPCS, the DHHS sets the standard but does not specify how to
comply; the Security Rule mandates that each covered entity appoint someone to be
responsible for securing e-PHI. - ANSWER-False

True/ False--- Healthcare clearinghouses process a large portion of the total volume of
health claims; these clearinghouses must maintain security of all e-PHI processed just
as a healthcare provider does - ANSWER-False

Discuss password protection and the need for privacy of passwords. Remembering that
passwords is problematic for some people. Why is it essential? - ANSWER-Short
passwords or those that use parts of name or address of individual are easily guessed.
Passwords of four characters can be guess in minutes; passwords of seven missed
alphanumeric characters take about 2 weeks to crack.
It is best to plan NOT to be an easy target. Access protection should challenge potential
hackers. It is not realistic to have an impenetrable firewall, just a good one that is better
than most.


Using videoconferencing to conduct an office visit with a physician located at a distance
is a technology that is becoming increasing utilized; what is the name of this
technology? - ANSWER-telemedicine

Any security incident must be disclosed to the individuals involved. Consider the impact
on a healthcare facility when the access is to their database and perhaps thousands of
patient records have been exposed. How is the facility to manage this breach within

, HIPAA rules? - ANSWER-They have to write a report, then place the written information
in each medical record that is associated with the incident, then send a letter to each
patient letting each one know what happened and how they were affected

The security rule requires that all policies be accessible for review either in electronic
policy form or on paper in a location that is readily available to all employees. These
policies are to be reviewed on a regular basis to ensure compliance. How long are the
policies and procedures to be kept even if the wording has been changed or eliminated?
- ANSWER-6 years

It appears that most entities have taken the actions required for compliance. AHIMA
reported the most common problems were found as policies and procedures were
developed for HIPAA. List three of the problems: - ANSWER-accounting for release of
PHI;
obtaining PHI from other providers;
access AND releasee of information to relatives or spouses;
complying with BA provisions;
confusion by individuals regarding the Notice of Privacy Practices;
access AND release of information to law enforcement.

True/False--Healthcare plans do not need a unique identifier to go along with the
identifiers for each healthcare provider and employer that uses standardized
transactions. - ANSWER-False

Presently there are 5 situational uses of the standard unique employer identifier in
electronic transactions; name 3 uses: - ANSWER-healthcare eligibility benefit inquiry
and response;
healthcare claim status request/response;
benefit enrollment and maintenance in a health plan;
health plan premium payments;
healthcare claim (dental, professional or institutional.

Several organizations are developing plans to establish a unique identifier for patients
for possible future use. There are seven possible systems - list 3 different types: -
ANSWER-standard guide for properties of a universal health identifier UHID;
social security number SSN;
biometrics ID;
directory service;
personal immutable properties;
patient identification system based on existing MR number and practitioner prefix;
public key - private key cryptology method

Obtaining by theft or deception of personal medical information, such as one's address,
social security number or health insurance information for use in submitting false claims
or seeking medical care or goods is called: - ANSWER-medical identity theft

Escuela, estudio y materia

Institución
HIPAA
Grado
HIPAA

Información del documento

Subido en
15 de marzo de 2026
Número de páginas
18
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$22.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Leer en línea o como PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
ALVINK2022 University of Oxford
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
252
Miembro desde
3 año
Número de seguidores
157
Documentos
10576
Última venta
6 días hace

4.3

87 reseñas

5
54
4
17
3
7
2
3
1
6

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes