HIPAA Quiz Solutions | Health Insurance Portability and Accountability Act

▸ HIPAA Quiz Solutions | Health Insurance Portability and Accountability Act Quiz

HIPAA Quiz Solutions | Health Insurance Portability and Accountability Act


Click Here to check out all Python Tutorials by APDaga.


Recommended Python Courses:
1. Udemy: Top Python Courses
2. Udemy: 2021 Complete Python Bootcamp From Zero to Hero in Python
3. Udemy: Learn Python Programming Masterclass
4. Coursera: Python for Everybody
5. LinkedIn: Become a Python Developer
6. edX: Programming for Everybody (Getting Started with Python)
7. edureka: Python Programming Certification Training
8. Eduonix: Mighty Python Bundle


  1. Which of these are not one of the 3 Key HIPAA Safeguards?

    • Physical Safeguards
    • Technical Safeguards
    • Office Safeguards
    • Administrative Safeguards


  1. Which one of the following is the best summary of HIPAA’s primary purposes?

    • Creating jobs in the healthcare industry.
    • Preventing identity theft.
    • Standardizing healthcare data.


  1. Under HIPAA, it is permitted to access patient health files out of curiosity:

    • If you keep it to yourself
    • Under no circumstances – it is a HIPAA breach that could get you fired
    • If you know the patient very well
    • If the patient’s family was asking about it




  1. When must a covered entity provide a Notice of Privacy Practices (NPP)?

    • At least every five years.
    • Whenever someone requests a copy of the NPP.
    • Only when there is a privacy breach.


  1. Which situation may we not use or disclose an individual’s PHI without written authorization?

    • To communicate directly with the patient.
    • To discuss the patient’s condition with family members.
    • To address issues with payment for medical services.


  1. Which of the following situations present(s) potential violations of HIPAA?

    • The sale of a list of patient names and phone numbers to a marketing company.
    • The theft of a laptop containing unencrypted PHI.
    • A nurse sharing PHI with her husband to assist him in a lawsuit against a patient.
    • All the above.




  1. Ben just started a new job at a company that handles PHI. In exporting the layout of the office, Ben entered a room that houses hard copies of files that are being converted into an electronic format. Curious, Ben reviewed certain files, many of which contained PHI. What HIPAA security measure could have prevented Ben’s unauthorized access to PHI?

    • Workstation security
    • Facility access controls
    • Transmission security


  1. Because HIPAA is a federal law, do we need to be concerned with any state laws that conflict with HIPAA?

    • Yes, because state laws would “preempt” federal law.
    • Maybe, if the state law is stricter.
    • No, because any state laws would be “preempted” by federal law.


  1. A covered entity may disclose protected health information (PHI) without a patient’s written permission for:

    • Treatment purposes
    • Health care operations activities
    • Payment
    • All of the above


  1. Which of the following statements is most accurate?

    • “Business associates” have greater responsibilities under HIPAA’s security rules than “covered entities”.
    • Both “Business associates” and “Covered entities” are subject to the same security rules under HIPAA.
    • “Covered entities” have greater responsibilities under HIPAA’s security rules than “Business associates”.




  1. Which of the following is not a resonable privacy safeguard required by HIPAA?

    • Reminding employees to keep PHI secure at their workstations and in public spaces
    • Moving filing cabinets containing PHI to public spaces so everyone can keep an eye on them
    • Using password-protected screen-savers on computers


  1. Which of the following statements is the most accurate summary of the possible penalties for a HIPAA violation?

    • Civil fines of up to $1.8 million annually
    • Criminal fines of up to $250,000.
    • Imprisonment for up to 10 years
    • All the above


  1. Which of the following guidelines should you follow when handling PHI?

    • Never access PHI outside of the office.
    • Destroy PHI once it is no longer needed in accordance with the company’s record management policies
    • Only transmit PHI by email if it is absolutely needed


CREDITS: (Source)


Click here to see solutions for all HackerRank SQL practice questions.
&
Click here to see solutions for all Machine Learning Coursera Assignments.
&
Click here to see more codes for Raspberry Pi 3 and similar Family.
&
Click here to see more codes for NodeMCU ESP8266 and similar Family.
&
Click here to see more codes for Arduino Mega (ATMega 2560) and similar Family.

Feel free to ask doubts in the comment section. I will try my best to answer it.
If you find this helpful by any mean like, comment and share the post.
This is the simplest way to encourage me to keep doing such work.

Thanks & Regards,
- APDaga DumpBox
إرسال تعليق (0)
أحدث أقدم