2-2 Quiz_Modules One and Two (HIM_422)
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
422
Subject
Law
Date
Apr 3, 2024
Type
docx
Pages
5
Uploaded by mrsjdsmith15
2-2 Quiz: Modules One and Two - Results
Attempt 1 of 2
Written Mar 17, 2024 5:05 PM - Mar 17, 2024 5:25 PM
Attempt Score
18 / 18 - A
Overall Grade (Highest Attempt)
18 / 18 - A
Question 1
1.2 / 1.2 points
The process that allows evidence to be used in a court of law and considered by a jury is________.
Question options:
Which of the following is not a mechanism to control access to PHI?
Question options:
Anti-virus software
Role-based access
User-based access
Context-based access
Questio
n 3
1.2 / 1.2 points
If a lawsuit with the same fact pattern as a previous case is brought to the same court, the legal principle most likely to be followed in determining this case is __________.
Question options:
Stare decisis
Remand
Proximate cause
Rebuttal assumption
Service
Litigation
Discoverability
Admissibility
Questio
n 2
1.2 / 1.2 points
Questio
n 4
1.2 / 1.2 points
Based on the “Red Flags Rule,” entities are considered creditors if they __________.
Question options:
Furnish information to consumer reporting agencies
Use consumer reports in connection with credit transactions
Extend credit
All of the above
Questio
n 5
1.2 / 1.2 points
Uniform access to patient information for all nursing staff best describes __________.
Question options:
Data warehouse
Group-based access
Passwords
Role-based access
Questio
n 6
1.2 / 1.2 points
Which of the following would be the best tool to determine whether or not access to ePHI was appropriate?
Question options:
Access termination
Access control
Audit trail
Automatic log-off
Questio
n 7
1.2 / 1.2 points
A valid subpoena duces tecum seeking health records does not have to________.
Question options:
Be accompanied by authorization from the patient whose records are sought
Be signed by the plaintiff and defendant
Include the case docket number
Include the date, time, and place of the requested appearance
Questio
n 8
1.2 / 1.2 points
A subpoena duces tecum compels the recipient to________.
Question options:
Serve on a jury
Bring records to a legal proceeding
Testify at trial
Answer a complaint
Questio
n 9
1.2 / 1.2 points
Which of the following is most likely to result in a security breach?
Question options:
Transporting records to a satellite clinic
Failing to deactivate user access at termination
Leaving voice-mail patient appointment reminders
Calling patient names in the waiting room
Question
10
1.2 / 1.2 points
A plaintiff’s attorney has filed a state-law complaint in federal court. This is an error of what nature?
Question options:
Procedural law
Discovery
Federal Rules of Criminal Procedure
Joinder
Question
11
1.2 / 1.2 points
The most common place to find a firewall is between __________.
Question options:
The remote server and the PC.
The internal network and the intranet.
A PC and the internet.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help