Which of the following is an active knowledge system that uses two or more items of patient data to generate case-specific advice?
a) medical knowledge data base
b) electronic health record system
c) patient data research system
d) clinical decision support system
Question 2 1 / 1 point
Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?
A) Authentication
B) User identification
C) Encryption
D) Authorization
Question 3 0 / 1 point
True or false: Procedure refreshers, training and reminders are a part of a clinical decision support system.
True
False
Question 4 1 / 1 point
Which of the following is one of the most common ways thieves steal corporate information?
A) stealing employee laptops while employees are traveling
B) breaking into the data center building
C) using employees’ computers while they are away from their desks
D) picking up transmissions in unsecured wireless hot spots
Question 5 0 / 1 point
True or false: There is sufficient case law to establish liability in issues dealing with clinical decision support systems.
True
False
Question 6 1 / 1 point
Which of the following make up the security triad?
A) Confidentiality, Integrity, Accuracy
B) Integrity, Privacy, Accuracy
C) Confidentiality, Integrity, Availability
D) Privacy, Confidentiality, Integrity
Question 7 0 / 1 point
True or false: Under the HIPAA Privacy Rule, patient authorization is required for release of information for treatment, payment and operations.
True
False
Question 8 1 / 1 point
Which of the following is not true about firewalls?
A) They can be a hardware device.
B) They can be software.
C) They filter data packets based on a set of rules.
D) They only filter data packets coming into the network or system.
Question 9 1 / 1 point
Certified EHR systems have technical safeguards built in and no further configuration is required.
True
False
Question 10 0 / 1 point
True or False: There are no legal or regulatory barriers that affect clinical decision support systems, as they have recently been overcome.
True
False
Question 11 1 / 1 point
True or false: An Intrusion Detection System (IDS) does not add any additional security.
True
False
Question 12 1 / 1 point
Which of the following are core principles of medical ethics? (select all that apply)
a) respect for autonomy
b) beneficence
c) non-maleficence
d) justice
Question 13 1 / 1 point
When looking to secure information resources, organizations must balance the need for security with which of the following?
the cost of replacing the data if it is stolen
the potential damage to the company’ reputation if the data is stolen
the users’ need to effectively access and use these resources
the customers’ expectation that their data will be protected
Question 14 1 / 1 point
PLACE THIS ORDER OR A SIMILAR ORDER WITH NURSING HOMEWORK HELP TODAY AND GET AN AMAZING DISCOUNT