Security
Which of the following serve as the foundation for the HIPAA Security Rule? (Select all that
apply) - ANSAdministrative Safeguards
Physical Safeguards
Technical Safeguards
SaaS and Cloud health IT solutions have which of the following features or attributes? (Select
all that apply) - ANSWeb-based solution used with browser
Reliability is dependent on Internet connection to provider
Requires little to no changes to infrastructure to support
Support dependent upon vendor and service level agreement
What are the three pillars of information security? - ANSconfidentiality, availability and integrity
The final Meaningful Use rule addresses security and privacy requirements for certified EHR
applications. - ANSTrue
The Google Health user agreement covers a user's financial loss in the event of identity theft
while using their service. - ANSFalse
Which one of the following organizations is required to follow HIPAA law when using personal
health data? - ANSHealth insurers
Which one of the following is false regarding patient rights and HIPAA law? - ANSHave
unwanted material removed from their health records
Which of the following access controls are used to prevent unauthorized access? (Select all that
apply) - ANSRole or rule-based privilege
Username and password
Voice recognition (biometric authentication)