ifsm305 Quiz 6 - Chapters 27, 28 and 29 latest 2015

Question # 00130628 Posted By: spqr Updated on: 11/08/2015 10:03 AM Due on: 12/12/2015
Subject Business Topic General Business Tutorials:
Question
Dot Image

Question 1

Which of the following statements is NOT correct?

A) An HIE is a Health Insurance Exchange, where people sign up for insurance plans.

B) An HIE is a Health Information Exchange, which enables healthcare providers to –almost in real-time- access clinical information.

C) An HIE is a group of cooperating (and sometimes competing) organizations that must share information because of a common patient they are diagnosing or treating.

D) An HIE is usually defined by geographic boundaries.

View Feedback

Question 2

Which of the following is true about identity, access control, authorization, authentication, and role assignment?

A) They are collectively called provisioning.

B) They require level-2 identity proofing in healthcare systems as per the standard published by NIST Special Publications 800-63.

C) They are related in that user identity is fundamental to controlling access.

D) They are components of RBAC.

View Feedback

Question 3

Which of the following are rules of HIE access control? (select all that apply)

A) The data is always in the control of the source.

B) Once the data is sent, it is in the control of the recipient.

C) The holder of information can deny access to the information if it is not satisfied with access control.

D) The data is always in the control of the Data Services Hub.

View Feedback

Question 4 0 /

Which of the following is defined as the capability of the software product to maintain a specified level of performance when used under specified conditions?

A) Reliability

B) Availability

C) Maintainability

D) None of the above.

View Feedback

Question 5

True or False: System reliability focuses on the reliability of the software only.

True

False

View Feedback

Question 6 points

According to the textbook, data security breaches in healthcare systems fall under which of the following?

A) Reliability

B) Security

C) Performance

D) Privacy

E) None of the above.

F) All of the above.

View Feedback

Question 7 8.

Which of the following are the three main components (goals) of data security?

A) Privacy, Confidentiality, Authentication

B) Confidentiality, Integrity, and Availability

C) Confidentiality, Control, Privacy

D) None of the above.

View Feedback

Question 8

The proportion of time a system is functioning is known as which of the following?

A) Reliability

B) Availability

C) Sustainability

D) Accessiblity

E) None of the above

View Feedback

Question 9

Which of the following terms refers to the capability of the software product to be modified?

A) Reformability

B) Upgradability

C) Maintainability

D) Reliability

E) Scalability

F) Modifiability

View Feedback

Question 10

When a hospital or small clinic is considering a health IT system, it should also consider its ability to easily and quickly accommodate large numbers of additional users and/or large increases in storage requirements. Which of the following is the architectural safeguard that ensures this capability?

A) Upgradability

B) Scalability

C) Modifiability

D) Availability

E) Maintainability

View Feedback

Question 11

A healthcare provider or organization plans to use cloud computing. Which of the following must be done to be in compliance with HIPAA? (select all that apply)

A) The organization must add operational safeguards to its overall security program.

B) The cloud vendor must be in compliance with HIPAA.

C) As long as the cloud vendor is a U.S. vendor, the business associate agreement does not need to address whether the data is hosted in the U.S. or overseas.

D) The cloud vendor must sign the health organization’s business associate agreement.

View Feedback

Question 12

The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 was enacted in to promote which of the following? (select all that apply)

A) HIPAA

B) Operational Safeguards

C) Adoption of meaningful use in HIT

View Feedback

Dot Image
Tutorials for this Question
  1. Tutorial # 00125090 Posted By: spqr Posted on: 11/08/2015 10:21 AM
    Puchased By: 4
    Tutorial Preview
    The solution of umuc ifsm305 Quiz 6 - Chapters 27, 28 and 29 latest 2015...
    Attachments
    umuc_ifsm305_Quiz_6_-_Chapters_27,_28_and_29_latest_2015.docx (77.45 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    e...uli Rating Great and well-organized tutorials 12/26/2015
    ii...onye Rating Professional help is instantly available 12/24/2015

Great! We have found the solution of this question!

Whatsapp Lisa