Page 1 out of 12. Viewing questions 1-15 out of 180
Question 1
This final security rule standard addresses encryption of data,
A.
Security Management Process
B.
Device and Media Controls
C.
Information Access Management
D.
Audit Controls
E.
Transmission Security
Answer:
E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 2
The transaction number assigned to the Health Care Claim Payment/Advice transaction is:
A.
270 B, 276
C.
834
D.
835
E.
837
Answer:
D
User Votes:
A
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 3
Select the correct statement regarding the 834 - Benefit Enrollment and Maintenance transaction.
A.
It can not be used to transfer enrollment information from a plan sponsor to a health care insurance company or other benefit provider.
B.
It can be used by a health insurance company to notify a plan sponsor that it has dropped one of its members.
C.
It can not be used to enroll, update, or dis-enroll employees and dependents in a health plan.
D.
A sponsor can be an employer, insurance agency, association or government agency but unions are excluded from being plan sponsors
E.
It can be used in either update or full replacement mode.
Answer:
E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 4
Implementation features of the Security Management Process include which one of the following?
A.
Power Backup plan
B.
Data Backup Plan
C.
Security Testing
D.
Risk Analysis
F.
Authorization and/or Supervision
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
F
50%
Discussions
0/ 1000
Question 5
The Privacy Rule gives patients the following right
A.
Access to the psychotherapy notes.
B.
Request an amendment to their medical record.
C.
Receive a digital certificate.
D.
See an accounting of disclosures for which authorization was given.
F.
The use of a smart card for accessing their records.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
F
50%
Discussions
0/ 1000
Question 6
This transaction type may be used in three ways: 1. Reply to a Health Care Claim Status Request. 2. Unsolicited notification of a health care claim status. 3. Request for additional information about a health care claim.
A.
837.
B.
820.
C.
277.
D.
835.
E.
278.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 7
The scope of the Privacy Rule includes:
A.
All Employers.
B.
The Washington Publishing Company
C.
Disclosure of non-identifiable demographics.
D.
Oral disclosure of PHI.
E.
The prevention of use of de-identified information.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 8
The Privacy Rule has broad administrative requirements. Which one of the following requirements is defined under the Privacy Rule?
A.
Designate a security officer.
B.
Document termination procedures.
C.
Use biometrics to authenticate transactions.
D.
Deploy tokens and smart cards to all medical personnel.
E.
Verify that business associates treat patient information respectfully.
Answer:
E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 9
The Privacy Rule interacts with Federal and State laws by:
A.
Establishing an orderly hierarchy where HIPAA applies, then other Federal law, then State law.
B.
Defining privacy to be a national interest that is best protected by Federal law.
C.
Allowing State privacy laws to provide a cumulative effect lower than HIPA4.
D.
Mandating that Federal laws preempt State laws regarding privacy.
E.
Establishing a ‘floor” for privacy protection.
Answer:
E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 10
The code set that must be used to describe or identify inpatient hospital services and surgical procedures is:
A.
ICD-9-CM, Volumes 1 and 2
B.
CPT-4
C.
CDT
D.
ICD-9-CM, Volume 3
E.
HCPCS
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 11
The Privacy Rule’s penalties for unauthorized disclosure:
A.
Imposes fines and imprisonment as civil penalties for violations.
B.
Limits penalties to covered entities and their business associates.
C.
Imposes criminal penalties for noncompliance with standards.
D.
Limits imprisonment to a maximum often years.
E.
Is $1000 per event of disclosure.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 12
ABC Hospital implements policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information. These policies and procedures satisfy which HIPAA security standard?
A.
Security Management Process
B.
Facility Access Control
C.
Security Awareness and Training
D.
Workforce Security
E.
B Security Management Process
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 13
Performing a periodic review in response to environmental or operational changes affecting the security of electronic protected health information is called:
A.
Transmission Security
B.
Evaluation
C.
Audit Control
D.
Integrity
E.
Security Management Process
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 14
Which transaction covers information specific to accidents?
A.
Accident Report.
B.
First Report of Injury.
C.
Health Care Claim.
D.
Health Care Claim Payment/Advice.
E.
Premium Payment.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 15
An Electronic Medical Record (EMR):
A.
Is another name for the Security Ruling
B.
Requires the use of biometrics for access to records.
C.
Is electronically stored information about an individual’s health status and health care.
D.
Identifies all hospitals and health care organizations.
E.
Requires a P1<1 for the provider and the patient.