Health & SafetyAnswer Key

Which Of The Following Is Required By Hipaa Standards

27 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

The primary reason that healthcare organizations develop business continuity plans is to minimize the effects of which of the following?

ANSWER

computer downtime

QUESTION 2

HIPAA represents an attempt to establish best practices and standards for health information security.

ANSWER

this is a true statement

QUESTION 3

A risk analysis is useful to _________.

ANSWER

Identify security threats

QUESTION 4

Which of the following is true regarding HIPAA security provisions?

ANSWER

covered entities must appoint two chief security officers who can share security responsibilities for 24 hour coverage

QUESTION 5

Which of the following is a technique that can be used to determine what information access privileges an employee should have?

ANSWER

context-based

QUESTION 6

The HIPAA data integrity standard requires that organizations do which of the following?

ANSWER

keep documented logs of system access and access attempts

QUESTION 7

Which of the following is required by HIPAA standards?

ANSWER

a written contingency plan

QUESTION 8

Security controls built into a computer software program to protect information security and integrity are which of the following?

ANSWER

application controls

QUESTION 9

This type of control is designed to prevent damage cause by computer hackers.

ANSWER

network control

QUESTION 10

Policies and procedures that address the management of computer resources and security are which of the following?

ANSWER

Administrative controls

QUESTION 11

privacy

ANSWER

safeguarding system access

QUESTION 12

integrity

ANSWER

safeguarding data accuracy

QUESTION 13

availability

ANSWER

ensuring system access when needed

QUESTION 14

Which of the following terms means that data should be complete, accurate, and consistent?

ANSWER

data integrity

QUESTION 15

What is the biggest threat to the security of healthcare data?

ANSWER

Employees

QUESTION 16

What does the term access control mean?

ANSWER

Identifying which data employees should have a right to use

QUESTION 17

Which of the following is a software program that tracks every access to data in the computer system?

ANSWER

Audit trail

QUESTION 18

Which of the following is an organization's planned response to protect its information in the case of a natural disaster?

ANSWER

Business continuity plan

QUESTION 19

Though the HIPAA Security Rule does not specify audit frequency, how often should an organization's security policies and procedures be reviewed?

ANSWER

Once a year

QUESTION 20

Which of the following provide the objective and scope for the HIPAA Security Rule as a whole?

ANSWER

General rules

QUESTION 21

Which of the following is an example of a physical safeguard that should be provided for in a data security program?

ANSWER

Locking computer rooms

QUESTION 22

Which of the following best describes information security?

ANSWER

The mechanisms for safeguarding information and information systems

QUESTION 23

A public key is part of what security measure?

ANSWER

Digital certificates

QUESTION 24

Which of the following is an example of technical security?

ANSWER

Integrity

QUESTION 25

Policies were recently rewritten. How long does the facility need to retain the obsolete policies?

ANSWER

Six years

QUESTION 26

An audit identified that an employee accessed a patient whose name is the same as the employee. This is known as a/an _________.

ANSWER

Trigger

QUESTION 27

In two computer systems the same data element is different. This is what type of issue?

ANSWER

Data consistency

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials