Health & SafetyAnswer Key

Unc Hipaa Training

25 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

If you find a USB drive, do not insert it into a University machine, even to identify the owner.

ANSWER

True

QUESTION 2

Once a person has died, how long does HIPAA protect the decedent's PHI?

ANSWER

50 years

QUESTION 3

The HIPAA Security Rule requires what type of safeguards for ePHI?

ANSWER

administrative, physical, and technical (all of the above)

QUESTION 4

A covered entity is required to enter into a business associate agreement with another health care provider before disclosing PHI for the treatment of an individual.

ANSWER

False

QUESTION 5

During a charity golf tournament, a University vice chancellor was injured and transported to a UNC clinic for treatment. The vice chancellor's medical record may be accessed or viewed only:

ANSWER

B and C

QUESTION 6

If you are at home or some other off-site location, any computers and mobile devices you use to connect to University networks or systems must meet the same minimum security standards that apply to your work computer.

ANSWER

True

QUESTION 7

Before treating a vice chancellor who was injured during a charity golf tournament, the UNC clinic providing treatment requested her complete medical records for review. The clinic's request must follow the Minimum Necessary standard for purposes of treating the vice chancellor

ANSWER

False

QUESTION 8

To use or disclose PHI for research purposes, you must have:

ANSWER

Appropriate HIPAA documentation, including an authorization or waiver of authorization

QUESTION 9

All University Units are covered by HIPAA.

ANSWER

False

QUESTION 10

Which of the following are examples of best practices for safeguarding the privacy and security of PHI?

ANSWER

All the above

QUESTION 11

Which of the following best describes the University "workforce" for HIPAA purposes:

ANSWER

Faculty, permanent and temporary staff, students, volunteers, interns and other persons whose conduct in the performance of work for a Covered Components is under the direct control of the covered component

QUESTION 12

The University may be subject to fines and penalties if a University Covered Component does not timely and fully respond to patient requests to view and copy their healthcare records

ANSWER

True

QUESTION 13

Which of the following are examples of appropriate safeguards for PHI

ANSWER

Both A & B

QUESTION 14

You want to send a get-well card to a colleague's home address. Since you have access to medical records for your job, it is permissible to get the address from the medical records.

ANSWER

False

QUESTION 15

If your University-issued laptop is stolen from your home, you must report the incident to the Department of Public Safety and the IT Response Center at 919-962-HELP.

ANSWER

True

QUESTION 16

Individuals who violate the University's Privacy and Security policies will be held personally responsible and may be subject to

ANSWER

All of the above

QUESTION 17

HIPAA provides that patients have a right to:

ANSWER

All of the above

QUESTION 18

Researcher Jack intended to send an email containing PHI to his colleague Researcher Bill, but inadvertently sent the email containing PHI to Researcher Jill. All three individuals are employed by UNC in a Covered Component. Jill had no legitimate work reason to receive the email. Upon receipt of the email, Jill notified Jack that she received the email in error, deleted the email from her inbox and from her "deleted items" folder. Jack resends the email to the intended recipient, Bill. Does Jack have to report the incident to the Institutional Privacy Office?

ANSWER

Yes, Jack must immediately report the incident to the Institutional Privacy Office because Jack sent an email containing PHI to an unintended recipient.

QUESTION 19

You are asked to prepare a presentation for a health care conference and you intend to use slides that show cells taken from patients' tissue cultures. These slides also contain the patients' medical record numbers, as well as the date the tissue cultures were obtained. What do you need to do?

ANSWER

Remove the patients' medical record numbers and the dates the tissues were taken from the slides

QUESTION 20

A researcher or healthcare provider is not entitled to use PHI in research without the appropriate documentation, including an individual patient authorization or an institutionally approved waiver of authorization.

ANSWER

True

QUESTION 21

To avoid becoming a victim of a phishing scam, which of the following are good practices?

ANSWER

Both A and B

QUESTION 22

A University Covered Component seeks to hire a vendor to perform a service on behalf of the University that involves access to, transmission of, or storage of PHI. What agreement is generally required by the HIPAA Rules to ensure that the vendor appropriately safeguards PHI?

ANSWER

Business Associate Agreement

QUESTION 23

Minimum Necessary means that you should only access, use, or disclose the amount of information that is truly needed to accomplish your intended purpose.

ANSWER

True

QUESTION 24

Certain identifiers indicate that PHI is present when associated with an individual's health care status. Which of the following are PHI identifiers?

ANSWER

Full face photographs or images

QUESTION 25

You receive an email that appears to be from UNC ITS and says "During our regular verification of user accounts, we couldn't verify you as a user in the UNC system. Please click here to update your information." You should:

ANSWER

All of the above

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials