WITH CORRECT ACTUAL QUESTIONS AND
CORRECTLY WELL DEFINED ANSWERS
LATEST ALREADY GRADED A+ 2025 – 2026
Shared security controls functions that are found in some or
all Epic products. For example, a user's ability to create
SmartText records or find providers. All users need access to
some of these tools.
Type of Security:
EpicCare - ANSWERS-ALL USERS OF CLINICAL TOOLS
EpicCare controls universal clinicals tools needed by
clinicians providing patient care. Only users who will use
clinical tools need access to these tools.
Type of Security:
,Inpatient - ANSWERS-ALL USERS OF CLINICAL TOOLS IN A
HOSPITAL SETTING
EpicCare inpatient controls clinical tools only needed for
working in an inpatient (or hospital) setting. Only those who
work at hospitals need access to these tools.
What are the 5 types of security: - ANSWERS-1. In Basket
2. Reporting Workbench
3. Shared
4. EpicCare
5. Inpatient
Categorization by security types makes sharing security
more feasible, decreasing the amount of build needed to
accommodate each user's unique combination of security
needs. - ANSWERS-Facilitate sharing
Ease of maintenance and troubleshooting: - ANSWERS-
When security-related issues arise, administrators can
pinpoint where to make changes based on the type of
access.
,Current and future security changes: - ANSWERS-With every
release, new security is added to grant access to new
functionality. It is easier to find the security that needs
updating based on their types or give a new type of security
to a user.
Think of _________________ as baskets that hold different
kinds of keys. - ANSWERS-Security Types
Think of _________________ as the keys - ANSWERS-
Security Points
Are discrete points of access to Epic functionality. Each
activity (like Chart Review) is associated with one or more
security points. - ANSWERS-Security Points
True/False
Administrators must not determine which security points
are appropriate for different groups of users at an
organization. - ANSWERS-False.
Administrators SHOULD determine which security points are
appropriate for different groups of users at an organization.
, Think of ____________________ as color-coded key rings. -
ANSWERS-Security Classes
Users will need ________________ based on the types of
security they need for their job. - ANSWERS-Security Classes
Users who have the same ______________________ needs
can share the same __________________ record. -
ANSWERS-Security Type, Security Class (ECL)
What record can be created to ease setup and maintenance
for groups of users with similar job roles and set up needs? -
ANSWERS-User Template (EMP)
What record controls the layout and ground rules of
Hyperspace? - ANSWERS-Role (E2R)
Which records control access to activities and functionality
in Epic? - ANSWERS-Security Class (ECL)
Which three types of security class should be assigned to
every user? - ANSWERS-In Basket