from improper alteration or destruction J J Security HIM 170 Chapter 13 1 The

From improper alteration or destruction j j security

This preview shows page 4 - 5 out of 5 pages.

from improper alteration or destruction JJ. Security HIM 170 Chapter 131. The HIPAA Security Rule requires that selected security safeguards are implemented to protect electronic protected health information2. A crime where an individual's personal information is stolen, often from obtaining data in an electronic environmentIdentity theft3. External environmental threats include all of the following except A. Flooding B. FireC. Lightning D. Tornadoes4. A deliberate and often systematic attempt to gain unauthorized access to a device or networkis known as cyber attack5. A sequence of characters used to verify that a computer user requesting access to a system is that particular user password (access control domain)6. Employee nondisclosure agreements are particularly important of employee who work in remote locations or telecommuteTRUEFALSE7. The purpose of entity authentication is to determine if the user is who he or she claims to be.
Background image
8. Which of the following would be considered a two-factor authentication system? 9. An audit trail is a good tool for which of the following? 10. Key components to a contingency or disaster plan, mandated by the HIPAA Security Rule include __________. A. Data back-up, data recovery and emergency mode of operations B. Data back-up and data recoveryC. Data recovery and emergency mode of operations D. Data back-up, data recovery, emergency mode of operations and data encryption
Background image

You've reached the end of your free preview.

Want to read all 5 pages?

  • Spring '17
  • Julie Wulf-Plimpton
  • Health Insurance Portability and Accountability Act

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture