2-2 Quiz_Modules One and Two (HIM_422)

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

422

Subject

Law

Date

Apr 3, 2024

Type

docx

Pages

5

Uploaded by mrsjdsmith15

Report
2-2 Quiz: Modules One and Two - Results Attempt 1 of 2 Written Mar 17, 2024 5:05 PM - Mar 17, 2024 5:25 PM Attempt Score 18 / 18 - A Overall Grade (Highest Attempt) 18 / 18 - A Question 1 1.2 / 1.2 points The process that allows evidence to be used in a court of law and considered by a jury is________. Question options: Which of the following is not a mechanism to control access to PHI? Question options: Anti-virus software Role-based access User-based access Context-based access Questio n 3 1.2 / 1.2 points If a lawsuit with the same fact pattern as a previous case is brought to the same court, the legal principle most likely to be followed in determining this case is __________. Question options: Stare decisis Remand Proximate cause Rebuttal assumption Service Litigation Discoverability Admissibility Questio n 2 1.2 / 1.2 points
Questio n 4 1.2 / 1.2 points Based on the “Red Flags Rule,” entities are considered creditors if they __________. Question options: Furnish information to consumer reporting agencies Use consumer reports in connection with credit transactions Extend credit All of the above Questio n 5 1.2 / 1.2 points Uniform access to patient information for all nursing staff best describes __________. Question options: Data warehouse Group-based access Passwords Role-based access Questio n 6 1.2 / 1.2 points Which of the following would be the best tool to determine whether or not access to ePHI was appropriate? Question options: Access termination Access control Audit trail Automatic log-off Questio n 7 1.2 / 1.2 points A valid subpoena duces tecum seeking health records does not have to________. Question options: Be accompanied by authorization from the patient whose records are sought Be signed by the plaintiff and defendant Include the case docket number
Include the date, time, and place of the requested appearance Questio n 8 1.2 / 1.2 points A subpoena duces tecum compels the recipient to________. Question options: Serve on a jury Bring records to a legal proceeding Testify at trial Answer a complaint Questio n 9 1.2 / 1.2 points Which of the following is most likely to result in a security breach? Question options: Transporting records to a satellite clinic Failing to deactivate user access at termination Leaving voice-mail patient appointment reminders Calling patient names in the waiting room Question 10 1.2 / 1.2 points A plaintiff’s attorney has filed a state-law complaint in federal court. This is an error of what nature? Question options: Procedural law Discovery Federal Rules of Criminal Procedure Joinder Question 11 1.2 / 1.2 points The most common place to find a firewall is between __________. Question options: The remote server and the PC. The internal network and the intranet. A PC and the internet.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help