Question

CHAPTER REVIEW (Continued) 4. HIPAA security standards whereby the CE can determine if the standard is reasonable and is known as a. Addressable b. Optional d. Voluntary Administrative safeguards include which of the following? a. Emergency access procedure b. Mechanism to authenticate ePHI c. Security awareness and training d. Audit controls 5. 6. Access controls are classified as something you know, something you have, and something you a. Are b. Choose c. Design d. Develop 7. A username and password is an example of a b. Two-factor authentication C. Call back d. Single sign-on 8. One of the nurses in the quality management department has decided to work a few shifts on the nursing units in order to earn some extra money. When she logs in with her normal sign-in, she has certain functionality; when she logs in differently to work on the nursing unit, she has different functionality. This is known as a. Role-based authentication b. User-based authentication c. Context-based authentication d. Emergency access procedure 9.Identify the true statement about audit logs. a. Audit logs should be stored on a different server than the ePHI. b. Audit logs only capture actions that are outside the norm. c. Audit logs monitor only user actions. d. Audit logs should be available to a wide range of employees to facilitate audits. 10. Firewalls are part of a. Physical security b. Network security c. Administrative safeguards d. Encryption
0 0
Add a comment Improve this question Transcribed image text
Answer #1

4a To be in compliance with the rule, the CE must implement the specification as written, implement an alternative or document that the risk does not exist in the organization or exists with little probability of occurrence.

5c

Administrative safeguard include

  • Security Management process.
  • Assigned security responsibility
  • Workforce security
  • Information Access Management
  • Security Awareness training
  • Security incident reporting
  • Contigency plan
  • Evaluation
  • Business Associate Contracts and other arrangements. 6

6a

3types of authentication factors are

Type1_something you know

Type 2 -something you have

Type 3-Something you are.

7b

Two factor authentication is a type of multi-factor authentication and is a method of confirming a users claimed identity by utilizing something they know which is the password and a second factor

Add a comment
Know the answer?
Add Answer to:
CHAPTER REVIEW (Continued) 4. HIPAA security standards whereby the CE can determine if the standard is...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Ellen 84 Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? a....

    Ellen 84 Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? a. An employee's laptop was stolen at the airport. The laptop contained personal in- formation about the company's customers that could potentially be used to commit identity theft. b. A salesperson successfully logged into the payroll system by guessing the payroll supervisor's password. c. A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At...

  • Fraud at Berry, CPA’s BERRY, CERTIFIED PUBLIC ACCOUNTANTS Brief History of the Firm In 1999, John...

    Fraud at Berry, CPA’s BERRY, CERTIFIED PUBLIC ACCOUNTANTS Brief History of the Firm In 1999, John Berry graduated from college with an accounting degree. After 10 years at an international accounting firm, John decided to start his firm, Berry, CPA’s. The firm, located in Oakwood, caters to local clients; specifically, John and his staff of four professionals specialize in non-public companies. The majority of the services provided by Berry, CPA’s are tax planning and preparation; however, the firm also performs...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT