Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

IFSM305/ IFSM305 week 4 quiz (2016)

Question

Question 1 1 / 1 point

Which of the following is an active knowledge system that uses two or more items of patient data to generate case-specific advice?

a) medical knowledge data base

b) electronic health record system

c) patient data research system

d) clinical decision support system

Question 2 1 / 1 point

Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?

A) Authentication

B) User identification

C) Encryption

D) Authorization

Question 3 0 / 1 point

True or false: Procedure refreshers, training and reminders are a part of a clinical decision support system.

True

False

Question 4 1 / 1 point

Which of the following is one of the most common ways thieves steal corporate information?

A) stealing employee laptops while employees are traveling

B) breaking into the data center building

C) using employees' computers while they are away from their desks

D) picking up transmissions in unsecured wireless hot spots

Question 5 0 / 1 point

True or false: There is sufficient case law to establish liability in issues dealing with clinical decision support systems.

True

False

Question 6 1 / 1 point

Which of the following make up the security triad?

A) Confidentiality, Integrity, Accuracy

B) Integrity, Privacy, Accuracy

C) Confidentiality, Integrity, Availability

D) Privacy, Confidentiality, Integrity

Question 7 0 / 1 point

True or false: Under the HIPAA Privacy Rule, patient authorization is required for release of information for treatment, payment and operations.

True

False

Question 8 1 / 1 point

Which of the following is not true about firewalls?

A) They can be a hardware device.

B) They can be software.

C) They filter data packets based on a set of rules.

D) They only filter data packets coming into the network or system.

Question 9 1 / 1 point

Certified EHR systems have technical safeguards built in and no further configuration is required.

True

False

Question 10 0 / 1 point

True or False: There are no legal or regulatory barriers that affect clinical decision support systems, as they have recently been overcome.

True

False

Question 11 1 / 1 point

True or false: An Intrusion Detection System (IDS) does not add any additional security.

True

False

Question 12 1 / 1 point

Which of the following are core principles of medical ethics? (select all that apply)

a) respect for autonomy

b) beneficence

c) non-maleficence

d) justice

Question 13 1 / 1 point

When looking to secure information resources, organizations must balance the need for security with which of the following?

the cost of replacing the data if it is stolen

the potential damage to the company' reputation if the data is stolen

the users’ need to effectively access and use these resources

the customers' expectation that their data will be protected

Question 14 1 / 1 point

Which of the following are supported by clinical decision support systems? (select all that apply)

a) clinical diagnosis and treatment plan processes

b) control of costs

c) clinical coding and documentation

d) assists with the details of managing clinical complexity

Question 15 1 / 1 point

Which of the following should be included in a good backup plan? (select all that apply)

A) a full inventory of all of the information that needs to be backed up

B) Regular backups of all data

C) Offsite storage of backup data sets

D) Test of data restoration

Question 16 0 / 1 point

Which of the following is the right to keep personal information secret?

a) confidentiality

b) privacy

c) security

d) protected health information

Question 17 1 / 1 point

Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?

A) Public key infrastructure

B) Encryption

C) Secret code

D) None of the above

Question 18 1 / 1 point

True or False: Paper medical records are much more secure than electronic records.

True

False

Question 19 1 / 1 point

Which of the following is described as the assurance that the information being accessed has not been altered and truly represents

what is intended?

Correctness

Completeness

Integrity

Assurance

Question 20 0.75 / 1 point

Which of the following are requirements for a clinical decision support system? (select all that apply)

a) knowledge base

b) program for combining the knowledge with patient-specific information

c) a communication mechanism

d) a super computer capable of combining all the possible outcomes

Show more
  • @
  • 177 orders completed
ANSWER

Tutor has posted answer for $15.00. See answer's preview

$15.00

*********

Question * * * * point

Which ** *** ********* is ** ****** ********* ****** **** **** two ** more ***** of ******* **** ** generate ************* advice?

** medical ********* **** base

b) ********** ****** ****** *******

** patient **** ******** *******

** clinical ******** ******* system

******** * 1 * * point

Which ** *** following ** used ** ****** **** the person ********* * ****** is ****** who **** present ********** to be?

** ***************

** User identification

** ***********

D) **************

Question 3 * * ******

**** ** ****** Procedure ********** ******** *** ********* *** * part of * ******** ******** support *******

*****

******

******** * * / * point

***** ** *** ********* is *** of *** most ****** ways ******* ***** ********* *************

** ******** ******** ******* ***** employees *** traveling

B) ******** **** *** **** ****** building

** using ************** ********* while they *** away from their desks

** ******* ** ************* ** ********* ******** *** ******

******** * * * ******

**** ** false: There ** ********** **** *** ** establish ********* ** ****** dealing **** ******** ******** ******* ********

*****

False

******** * * * 1 ******

Which ** *** following **** ** *** ******** *******

** *************** ********* *********

** Integrity Privacy Accuracy

** *************** ********* *************

** Privacy *************** **********

******** * * * ******

**** ** ****** Under *** ***** ******* **** ******* ************* ** ******** for ******* of *********** *** ********* ******* *** operations

*****

******

******** * * * * ******

***** ** *** ********* ** not **** about ***********

A) **** *** be a ******** device

B) They can be *********

** **** filter **** ******* ***** ** a *** of ******

** **** **** filter data packets ****** into *** network or *******

******** * 1 / 1 ******

Certified *** systems **** ********* safeguards built ** *** ** ******* configuration ** *********

*****

******

******** ** / * ******

True or ****** ***** *** ** ***** or ********** ******** **** ****** clinical decision ******* systems ** **** **** ******** **** *********

True

False

******** ** 1 * * ******

**** ** ****** ** ********* ********* System (IDS) **** not *** *** additional *********

*****

False

******** ** 1 * * point

***** ** the ********* *** **** ********** ** ******* ******* ******* *** that *******

** ******* for autonomy

** beneficence

c) ****************

d) ********

******** 13 * / 1 ******

When ******* ** ****** *********** ********* organizations **** balance *** need *** security **** ***** of the ***********

*** **** of ********* *** **** ** it is stolen

*** ********* ****** ** the company' ********** ** *** data ** stolen

*** users’ need to *********** ****** *** use these **********

the ************** *********** **** ***** **** **** ** protected

Question 14 * * * ******

***** ** *** ********* *** ********* ** ******** ******** ******* ******** ******* all **** *******

** clinical ********* *** ********* plan **********

** ******* of ******

** ******** ****** *** documentation

** assists with *** ******* of ******** clinical ***********

******** 15 * * 1 ******

***** of *** following ****** ** ******** in * **** backup plan? ******* *** **** *******

A) * **** inventory ** *** ** the *********** **** ***** ** be backed ***

** ******* ******* ** *** *****

** ******* ******* ** ****** data *****

** **** ** **** ************

******** 16 / 1 ******

***** ** *** ********* is *** ***** ** keep ******** information secret?

** ****************

** privacy

** *********

** protected ****** ************

******** 17 1 * * ******

***** ** the ********* ** the process of ******** **** upon *** transmission or ******* so that **** ********** individuals *** **** it?

** Public key ***************

** Encryption

** Secret *****

** None of *** ******

******** 18 * / 1 ******

**** or ****** ***** ******* records *** **** more ****** than ********** ********

*****

******

Question ** 1 * 1 point

***** ** *** ********* is ********* as *** ********* **** *** information being ******** *** *** **** ******* *** ***** represents

**** ** **********

************

Completeness

**********

**********

******** ** 075 * * ******

***** of *** ********* *** ************ *** * ******** ******** ******* ******* ******* all **** apply)

** ********* base

** program *** ********* *** knowledge **** **************** ************

c) * ************* **********

** * ***** ******** ******* ** ********* all *** possible ********

Click here to download attached files: ifsm305 week 4 quiz latest 2016.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question