Copyright

Best Practices in Information Technology Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Fire is an example of a _____ information security threat.

Question 2 2. Information security threats can be _____.

Question 3 3. Information security must _____, and protect against, all threats.

Question 4 4. _____ is anything that can negatively affect information.

Question 5 5. The Healthcare Information Management Systems Society can provide the healthcare information technology professional with which of the following on their website?

Page 2

Question 6 6. Healthcare information technology (HIT) professionals can find which of the following organizations helpful for the education and training in that field?

Question 7 7. Healthcare information technology is a combination of which of the following?

Question 8 8. Patients use _____ to access and monitor their own healthcare information right from their own homes or devices.

Question 9 9. 'Computer security' focuses on hardware and software, while 'Internet security' focuses on _____.

Question 10 10. The internet security threat where zombie computers are used to saturate a server with unsolicited requests is referred to as _____.

Page 3

Question 11 11. In the world of internet security, the act of online monitoring for the purpose of intercepting and exploiting information is referred to as _____.

Question 12 12. In the digital world, precautionary steps taken to protect computing resources against cybercrime is called _____.

Question 13 13. Each of the following is elements of the ITIL Service Lifecycle, EXCEPT:

Question 14 14. The continuous service improvement element of the ITIL lifecycle focuses primarily upon:

Question 15 15. The service transition element of the ITIL lifecycle focuses primarily upon:

Page 4

Question 16 16. ITIL is an acronym for:

Question 17 17. The process of identifying assets and threats in an organization is known as _____.

Question 18 18. What components of a web application would not be part of a threat model?

Question 19 19. What would not be a threat to a website?

Question 20 20. What components would not factor into a threat model for a web server?

Page 5

Question 21 21. Which of the following is NOT an administrative requirement of HIPAA?

Question 22 22. Which section of HIPAA clarifies the requirements of COBRA?

Question 23 23. Which section of HIPAA provides for deductions for medical insurance?

Question 24 24. Which section of HIPAA places limits on exclusions for pre-existing medical conditions?

Question 25 25. Which encryption method is best used for data in transit?

Page 6

Question 26 26. What are the three common types of encryption used in HIPAA compliant solutions for data at rest?

Question 27 27. HIPAA was enacted in which year?

Question 28 28. In relation to security and in regards to handling ePHI, what does CIA stand for?

Question 29 29. A _____ is anything that can negatively alter, disrupt, hide, or erase an object or objects of interest.

Question 30 30. The Healthcare Information and Management Systems Society has workgroups addressing which of the following initiatives for improving healthcare?

Best Practices in Information Technology Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Health 309: Healthcare Informatics  /  Science Courses
Support