___________ is a nursing terminology. Correct Answer The
Clinical Care Classification is a nursing terminology. The others
are classifications.
____________ provides information such as who accessed or
attempted to access a system and when. Correct Answer
Metadata
___________________________ are the information collected
within a healthcare organization during the normal day to day
operations that supports patient care and business operations?
Correct Answer Information assets
"Something you have" is demonstrated by: Correct Answer
Token
A ___________ is a set of terms representing the system of
concepts for the medical field. Correct Answer This is the
definition of a clinical terminology.
A classification provides clinical data to ______________.
Correct Answer Classifications aggregate clinical data for
healthcare statistics.
A coding professional needs to code an ambulatory record. What
would the coder use to code the procedure? Correct Answer
CPT
,A covered entity's workforce members include: (Check all that
apply) Correct Answer Student Interns
Employees
Volunteers
A health information manager took the three elements, blood
pressure, weight, and cholesterol to analyze for potential
indicators of a heart attack. The combined data is referred to as?
Correct Answer Information
A health information technician is responsible for designing a
data collection from to collect data on patient sin an acute-care
hospital. The first resource that she should use is: Correct
Answer UHDDS
A hospital is looking to use something to act as a buffer between
two networks. What should be recommended? Correct Answer
Firewall
A laboratory employee forgot his user ID badge at home and
uses another lab employee's badge to access the computer
system. What controls should have been in place to minimize
this security breach? Correct Answer Workforce security
awareness training
A list of recommended data elements with uniform definitions is
a _______. Correct Answer Data set
A nomenclature of codes and medical terms that provides
standard terminology for reporting physicians' services for third-
,party reimbursement is Correct Answer Current Procedural
Terminology (CPT).
A notice of privacy practices should include a statement
explaining that individuals may complain to the Secretary of the
Department of Health and Human Services if they believe that
their privacy rights have been violated. Correct Answer True
A patient has written to request a copy of his own record. When
the clerk checked the record, it was noted that the patient was
last admitted to the psychiatric unit of the facility. You advise
the clerk to Correct Answer contact the patient's attending
physician before complying.
A patient requests a copy of his health records. When the request
is received, the HIM clerk finds that the records are stored off-
site. Which is the longest timeframe the hospital can take to
remain in compliance with HIPAA regulations? Correct
Answer Provide copies of the records within 60 days
A patient signed an authorization to release information to a
physician but decided not to go see that physician. Can he stop
the release? Correct Answer Yes, as long has it has not been
released already.
A patient's birth date and gender documented in the health
record are examples of a data? Correct Answer Element
A physician has a patient with a cancer that is not responding to
treatment so he looks for research being conducted on the
cancer. Who developed a database that he can use to locate any
, existing clinical trial? Correct Answer National Library of
Medicine
A radiology information system is which of the following?
Correct Answer Source system
A risk analysis is useful to _________. Correct Answer
Identify security threats
A risk analysis is useful to: Correct Answer Identify security
threats
A sanction policy is an example of what type of safeguard in the
HIPAA Security Rule? Correct Answer Administrative
A single or individual fact that represents a patient in healthcare
is known as a/n ____________ Correct Answer Data element
A tool that identifies when a user logs in and out, what action
they take, and more is called a(n): Correct Answer Audit trail
A valid authorization requires which of the following? Correct
Answer An expiration date or event
A visitor to the hospital looks at the screen of the admitting
clerk's computer workstation when she leaves her desk to copy
some admitting documents. What security mechanism would
best have minimized this security breach? Correct Answer
Automatic logoff controls