Week 6 Quiz
Health Informatics
Question 1
A hardware security tool that helps protect an organization against security breaches by
issuing masks to protect the identity of a corporation's employees who are accessing
the World Wide Web is a:
Proxy server
Firewall
Anti-virus program
Masking program
Question 2
A criminal attack on a network using software designed to guess passwords is known
as:
Zero day attack
Brute force attack
Both zero day attack and brute force attack
None of these are correct.
Question 3
Which security tool do networks employ to examine incoming Internet traffic?
Mask
Firewall
Proxy server
Code trackers
Question 4
Assess the strength of the password: *tomatoSoup7.
Strong password
Weak password
Question 51 pts
_______________________ error causes the highest percentage of security breaches.
Human
Technical
Hardware
Authentication
, Week 6 Quiz
Health Informatics
Question 6
Assigning passwords to employees so that they can access the secure network is
known as:
Biometrics
Authentication
Integrity
Fair use
Question 7
Safely using portable devices off-site can be accomplished by:
A virtual private network (VPN) to encrypt data
Limiting the information carried outside the secure network
Installing software to perform a remote data wipe
All of these are correct.
Question 8
An ethics approach applied to relatively homogenous societies, where beliefs are similar
and most societal members shared common values, is known as:
The Hippocratic tradition
A casuist approach
Principlism
Antiprinciplism
Question 9
What helps to ethically delineate healthcare practice from healthcare information
obtained from the Internet?
Specific type of diseases reviewed
Direct provider patient communication
Indirect provider communication
Knowledge of violated privacy law
Question 101 pts
In ethics theory, nonmaleficence means:
The obligation not to inflict harm intentionally
Health Informatics
Question 1
A hardware security tool that helps protect an organization against security breaches by
issuing masks to protect the identity of a corporation's employees who are accessing
the World Wide Web is a:
Proxy server
Firewall
Anti-virus program
Masking program
Question 2
A criminal attack on a network using software designed to guess passwords is known
as:
Zero day attack
Brute force attack
Both zero day attack and brute force attack
None of these are correct.
Question 3
Which security tool do networks employ to examine incoming Internet traffic?
Mask
Firewall
Proxy server
Code trackers
Question 4
Assess the strength of the password: *tomatoSoup7.
Strong password
Weak password
Question 51 pts
_______________________ error causes the highest percentage of security breaches.
Human
Technical
Hardware
Authentication
, Week 6 Quiz
Health Informatics
Question 6
Assigning passwords to employees so that they can access the secure network is
known as:
Biometrics
Authentication
Integrity
Fair use
Question 7
Safely using portable devices off-site can be accomplished by:
A virtual private network (VPN) to encrypt data
Limiting the information carried outside the secure network
Installing software to perform a remote data wipe
All of these are correct.
Question 8
An ethics approach applied to relatively homogenous societies, where beliefs are similar
and most societal members shared common values, is known as:
The Hippocratic tradition
A casuist approach
Principlism
Antiprinciplism
Question 9
What helps to ethically delineate healthcare practice from healthcare information
obtained from the Internet?
Specific type of diseases reviewed
Direct provider patient communication
Indirect provider communication
Knowledge of violated privacy law
Question 101 pts
In ethics theory, nonmaleficence means:
The obligation not to inflict harm intentionally