This is a self-contained program that uses security flaws such as buffer overflow to remotely
compromise a system and then replicate itself to that system. Identify this program (threat):
E
The objective of this implementation specification is to conduct an accurate and thorough
assessment of the potential vulnerabilities to the confidentiality, integrity and availability of
electronic protected health information held by the covered entity.
A
The Contingency Plan standard includes this addressable implementation specification:
B
This is a documented and routinely updated plan to create and maintain, for a specific period of
time, retrievable copies of information:
B
The objective of this standard is to perform a periodic review in response to environmental or
operational changes affecting the security of electronic protected health information.
D
The HIPAA security standards are designed to be comprehensive, technology neutral and:
D
Risk Management is a required implementation specification of this standard:
C
The Security Incident Procedures standard includes this implementation specification:
E
This standard requires that the entity establishes agreements with each organization with which it
exchanges data electronically, protecting the security of all such data.
A
The Security Management Process standard includes this implementation specification:
C
This addressable implementation specification is about procedures for “overseeing” workforce
members that work with electronic protected health information or in locations where it might be
accessed.
C
“Evaluation” is a standard within:
A
This is a program that is a type of malicious code. It is unauthorized code that is contained within a
legitimate program and performs functions unknown to the user.
A
Documented instructions for responding to and reporting security violations are referred to as:
B
A required implementation specification of the contingency plan standard is:
D