HIPPA FINAL EXAM |COMPLETE QUESTIONS &
CORRECT DETAILED ANSWERS (100%
CORRECT) 2026
Save
Terms in this set (193)
ability or means necessary to read, access
write, modify or communicate data
actions, plus policies and administrative safeguard
procedures to manage the
selection, development,
implementation and maintenance of
security measures in relation to the
protection of information.
audit trail - data collected during the use of electronic
devices that include the who, what, when and
where.
authentication confirmation that a person is the one claimed
contingency plan policies and procedures for responding to an
emergency /occurrence that damages systems
contain e-PHI.
,e-PHI electronic protected health information
encryption transforming confidential plain text into cipher
text to protect it.
a system that normally includes information system
software, information, data,
applications, communications and
people.
infrastructure - underlying foundation or basic framework that
directs information system commands and
responses and transports and stores data.
integrity - property of data/information of having not
been altered or destroyed in an unauthorized
manner.
- method by which the sender of nonrepudiation
data is provided with proof of
delivery and the recipient is assured
of the sender's identity so that
neither can later deny having
processed the data.
password confidential, character string used in conjunction
with a user ID to verify the identity of an
individual attempting to gain access to a
computer system.
, physical safeguards physical measures, policies and procedures to
electronic information system/related
buildings/equipment from natural/environmental
hazards and unauthorized intrusion
impact and likelihood of an adverse risk
event
process of balancing the cost of risk analysis
security control measures against
the losses that would be expected
risk management ongoing process that asses the risk to electronic
information resources and the information itself
to determine adequate security for a system that
will reduce the threat and vulnerability to protect
health information.
security incident attempted or successful unauthorized access,
use, disclosure, modification or destruction of
information.
technical safeguards technology and the policies and procedures for
its use that protect e-PHI and control access to it.
workstation electronic computing device
Which workstation security user ID,log-off programs, password
safeguards are YOU responsible for
using and/or protecting
CORRECT DETAILED ANSWERS (100%
CORRECT) 2026
Save
Terms in this set (193)
ability or means necessary to read, access
write, modify or communicate data
actions, plus policies and administrative safeguard
procedures to manage the
selection, development,
implementation and maintenance of
security measures in relation to the
protection of information.
audit trail - data collected during the use of electronic
devices that include the who, what, when and
where.
authentication confirmation that a person is the one claimed
contingency plan policies and procedures for responding to an
emergency /occurrence that damages systems
contain e-PHI.
,e-PHI electronic protected health information
encryption transforming confidential plain text into cipher
text to protect it.
a system that normally includes information system
software, information, data,
applications, communications and
people.
infrastructure - underlying foundation or basic framework that
directs information system commands and
responses and transports and stores data.
integrity - property of data/information of having not
been altered or destroyed in an unauthorized
manner.
- method by which the sender of nonrepudiation
data is provided with proof of
delivery and the recipient is assured
of the sender's identity so that
neither can later deny having
processed the data.
password confidential, character string used in conjunction
with a user ID to verify the identity of an
individual attempting to gain access to a
computer system.
, physical safeguards physical measures, policies and procedures to
electronic information system/related
buildings/equipment from natural/environmental
hazards and unauthorized intrusion
impact and likelihood of an adverse risk
event
process of balancing the cost of risk analysis
security control measures against
the losses that would be expected
risk management ongoing process that asses the risk to electronic
information resources and the information itself
to determine adequate security for a system that
will reduce the threat and vulnerability to protect
health information.
security incident attempted or successful unauthorized access,
use, disclosure, modification or destruction of
information.
technical safeguards technology and the policies and procedures for
its use that protect e-PHI and control access to it.
workstation electronic computing device
Which workstation security user ID,log-off programs, password
safeguards are YOU responsible for
using and/or protecting