LCHI 474 FINAL | QUESTIONS AND ANSWERS | 2026 UPDATE | ALREADY PASSED!!
Which of the following is a right of an individual to be left alone? - (ANSWER)Privacy
data integrity controls reduce the risk of data ...? - (ANSWER)Reduces data alteration
When protected health information is shared between two nurses in a hospital, the HIPPA Privacy Rule
considers sharing to be - (ANSWER)Use
Breaches of protected health information by business associates - (ANSWER)Has to be reported to HHS
If data are de-identified according to the requirements of the HIPPAPrivacy rule, - (ANSWER)Breech
reporting is not required for wrongful disclosure
When health data from a provider are integrated with health data compiled by a patient in a personal
health record, the integrity of the data can be assured through - (ANSWER)Data provenance
Which of the following represents one of the most common complaints levied with the office of civil
rights? - (ANSWER)Right of access violation
A security threat - (ANSWER)Can exploit vulnerability causing a breech
What is the situation in which a user or system denies having performed some action on data? -
(ANSWER)Repudiation
HIPPA refers to data backup, disaster recovery, and emergency mode operations as -
(ANSWER)Contingency planning
Which form of authentication is the strongest? - (ANSWER)Biometrics and passwords
What mechanism enables use of a digital signature? - (ANSWER)Public key infrastructure
, LCHI 474 FINAL | QUESTIONS AND ANSWERS | 2026 UPDATE | ALREADY PASSED!!
Access controls should be established to conform to - (ANSWER)Minimum necessary requirements
Which statement about encryption is true? - (ANSWER)Poorly implemented is worse than no encryption
at all
Which of the following is a purpose of mobile device managemnt? - (ANSWER)Establish policies about
use of personal devices
Breaches of health information from personal health records are - (ANSWER)Covered by regulations
from federal trade commission
Notifications of large breaches is required within - (ANSWER)60 days
Which of the following is false about identity theft? - (ANSWER)Easiest crime against protected health
information to identify
Which of the following has been found to be the most common HIPPA security rule that is lacking in a
provider setting? - (ANSWER)Incomplete/ nonupdated risk analysis and non-existent policies and
procedures
Who is responsible for carrying out security? - (ANSWER)Everyone
Achieving interoperability as might be expected from using the internet has been a hallenge for
healthcare because - (ANSWER)Existing systems are based on client server technology
Interoperability to assure common meaning in data exchange is - (ANSWER)Semantic interoperability
What is the most common way data are exchanged between systems in a hospital today? -
(ANSWER)Interfaces
One way hospitals today are ensuring more integrated data is to use a - (ANSWER)Data repository
Which of the following is a right of an individual to be left alone? - (ANSWER)Privacy
data integrity controls reduce the risk of data ...? - (ANSWER)Reduces data alteration
When protected health information is shared between two nurses in a hospital, the HIPPA Privacy Rule
considers sharing to be - (ANSWER)Use
Breaches of protected health information by business associates - (ANSWER)Has to be reported to HHS
If data are de-identified according to the requirements of the HIPPAPrivacy rule, - (ANSWER)Breech
reporting is not required for wrongful disclosure
When health data from a provider are integrated with health data compiled by a patient in a personal
health record, the integrity of the data can be assured through - (ANSWER)Data provenance
Which of the following represents one of the most common complaints levied with the office of civil
rights? - (ANSWER)Right of access violation
A security threat - (ANSWER)Can exploit vulnerability causing a breech
What is the situation in which a user or system denies having performed some action on data? -
(ANSWER)Repudiation
HIPPA refers to data backup, disaster recovery, and emergency mode operations as -
(ANSWER)Contingency planning
Which form of authentication is the strongest? - (ANSWER)Biometrics and passwords
What mechanism enables use of a digital signature? - (ANSWER)Public key infrastructure
, LCHI 474 FINAL | QUESTIONS AND ANSWERS | 2026 UPDATE | ALREADY PASSED!!
Access controls should be established to conform to - (ANSWER)Minimum necessary requirements
Which statement about encryption is true? - (ANSWER)Poorly implemented is worse than no encryption
at all
Which of the following is a purpose of mobile device managemnt? - (ANSWER)Establish policies about
use of personal devices
Breaches of health information from personal health records are - (ANSWER)Covered by regulations
from federal trade commission
Notifications of large breaches is required within - (ANSWER)60 days
Which of the following is false about identity theft? - (ANSWER)Easiest crime against protected health
information to identify
Which of the following has been found to be the most common HIPPA security rule that is lacking in a
provider setting? - (ANSWER)Incomplete/ nonupdated risk analysis and non-existent policies and
procedures
Who is responsible for carrying out security? - (ANSWER)Everyone
Achieving interoperability as might be expected from using the internet has been a hallenge for
healthcare because - (ANSWER)Existing systems are based on client server technology
Interoperability to assure common meaning in data exchange is - (ANSWER)Semantic interoperability
What is the most common way data are exchanged between systems in a hospital today? -
(ANSWER)Interfaces
One way hospitals today are ensuring more integrated data is to use a - (ANSWER)Data repository