Which of the following is an active knowledge system that uses two or more items of patient data to generate case-specific advice?

a) medical knowledge data base

b) electronic health record system

c) patient data research system

d) clinical decision support system

Question 2 1 / 1 point

Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?

A) Authentication

B) User identification

C) Encryption

D) Authorization

Question 3 0 / 1 point

True or false: Procedure refreshers, training and reminders are a part of a clinical decision support system.

True

False

Question 4 1 / 1 point

Which of the following is one of the most common ways thieves steal corporate information?

A) stealing employee laptops while employees are traveling

B) breaking into the data center building

C) using employees’ computers while they are away from their desks

D) picking up transmissions in unsecured wireless hot spots

Question 5 0 / 1 point

True or false: There is sufficient case law to establish liability in issues dealing with clinical decision support systems.

True

False

Question 6 1 / 1 point

Which of the following make up the security triad?

A) Confidentiality, Integrity, Accuracy

B) Integrity, Privacy, Accuracy

C) Confidentiality, Integrity, Availability

D) Privacy, Confidentiality, Integrity

Question 7 0 / 1 point

True or false: Under the HIPAA Privacy Rule, patient authorization is required for release of information for treatment, payment and operations.

True

False

Question 8 1 / 1 point

Which of the following is not true about firewalls?

A) They can be a hardware device.

B) They can be software.

C) They filter data packets based on a set of rules.

D) They only filter data packets coming into the network or system.

Question 9 1 / 1 point

Certified EHR systems have technical safeguards built in and no further configuration is required.

True

False

Question 10 0 / 1 point

True or False: There are no legal or regulatory barriers that affect clinical decision support systems, as they have recently been overcome.

True

False

Question 11 1 / 1 point

True or false: An Intrusion Detection System (IDS) does not add any additional security.

True

False

Question 12 1 / 1 point

Which of the following are core principles of medical ethics? (select all that apply)

a) respect for autonomy

b) beneficence

c) non-maleficence

d) justice

Question 13 1 / 1 point

When looking to secure information resources, organizations must balance the need for security with which of the following?

the cost of replacing the data if it is stolen

the potential damage to the company’ reputation if the data is stolen

the users’ need to effectively access and use these resources

the customers’ expectation that their data will be protected

Question 14 1 / 1 point


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH NURSING HOMEWORK HELP TODAY AND GET AN AMAZING DISCOUNT


For orders inquiries       +1 (408) 800 3377

Open chat
1
You can now contact our live agent via Whatsapp! via +1 518 291-4128

Feel free to ask questions, clarifications or discounts available when placing your order.