QUESTIONS AND
CORRECT ANSWERS
GRADED A+ 2025-2026
Types of Hospitals - ANS-Government
Nonprofit
For-profit
Has the most impact of safety and security in healthcare - ANS-Joint Commission
The format of the Joint Commission standards in broken down into two categories -
ANS-Design
Implementation
The Joint Commission is made up of three basic components - ANS-Buildings
Equipment
People
The Joint Commission monitors 7 programs - ANS-Emergency Management
Fire Safety
Hazardous Materials
Medical Equipment
Safety
Security
Utility Systems
,4 Primary Goals for Joint Commission - ANS-Positive Impact of Patient Care
Understanding of underlying cause
Increase general knowledge
Maintain confidence of public
Two basic types of Sentinel Events - ANS-Reviewable
Internal
Reviewable events are - ANS-Unanticipated death or major loss of function
Specified event (infant abduction, rape, etc..)
Is designed to prevent patient injury and prevent or limit financial loss to the HCF -
ANS-Risk Management
Internal forces of the healthcare organization are made up of four elements - ANS-
Organization culture
Leadership
Funding
Cooperate Policy
External Entities that influence Healthcare Security Program - ANS-Joint Commission
OSHA
Center for Medicaid and Medicare Services (CMS)
IHASS
ASIS
NFPA
Act, procedure, or operational activity that tends to validate its worth with
demonstrated repetition - ANS-Best Practices
, Comparison of statics which produce interesting data but does not correlate to a best
practice - ANS-Benchmarking
Voluntarily or legally mandated guidelines and nest practices that improve the quality
and consistency of goods and services. - ANS-Standard
Level of protection in place in terms of being reasonable and prudent in view of all
circumstances - ANS-Standard of Care
Threats, Risk, and vulnerabilities are measured in terms - ANS-terms of degree of
probability and the degree of impact on the organization
Terms used in Healthcare Security that are often interchangeably - ANS-Threat
Risk
Vulnerability
Hazard Vulnerability defines - ANS-Preparedness and Mitigation activities used to
manage essential resources
Once risk are identified, they are evaluated in terms of - ANS-Probability of their
OCCURENCE and DEGREE of DAMAGE
3 stages of identity theft - ANS-ACQUISTION of IDENTITY
USE of INFORMATION
DISCOVERY of LOSS
Security Risk should include - ANS-Review physical facility
Major Functions
High Risk processes
Security is refereed to as - ANS-LAYERS of PROTECTION