#1
What does PHI stand for in the context of healthcare information?
Protected Health Information
ExplanationPHI refers to sensitive patient data protected by privacy laws.
#2
Which of the following is NOT a common threat to healthcare information security?
Physical Security Measures
ExplanationPhysical security measures are protective, not threats.
#3
What is the purpose of a firewall in healthcare information security?
To detect and prevent unauthorized access to the network
ExplanationFirewalls act as barriers against unauthorized network traffic.
#4
Which of the following is an example of a technical safeguard for protecting healthcare information?
Secure messaging systems
ExplanationThey encrypt messages to ensure confidentiality.
#5
What is the purpose of access controls in healthcare information security?
To regulate access to electronic health records and systems
ExplanationAccess controls limit data access to authorized personnel.
#6
What does HIPAA stand for?
Health Insurance Portability and Accountability Act
ExplanationHIPAA regulates the protection of health information.
#7
Which encryption algorithm is commonly used to secure healthcare data?
AES
ExplanationAES (Advanced Encryption Standard) is widely adopted for its robust security.
#8
What is the primary purpose of a risk assessment in healthcare information security?
To identify potential vulnerabilities and threats
ExplanationIt helps prioritize security measures based on risks.
#9
Which regulatory body oversees healthcare information security compliance in the United States?
Office for Civil Rights (OCR)
ExplanationOCR enforces HIPAA compliance.
#10
What is the purpose of encryption in healthcare information security?
To secure data during transmission and storage
ExplanationEncryption protects data from unauthorized access.
#11
What is the principle of least privilege in the context of healthcare information security?
Giving users only the permissions necessary to perform their job functions
ExplanationIt limits user access to only essential resources, reducing potential risks.
#12
What is the role of a Chief Information Security Officer (CISO) in healthcare organizations?
To manage the organization's overall cybersecurity strategy
ExplanationCISOs oversee and implement security policies.
#13
Which of the following is an example of a security incident in healthcare information management?
An unauthorized individual accessing patient records
ExplanationUnauthorized access violates patient privacy and security.
#14
What is the role of a Business Associate Agreement (BAA) in healthcare information security?
To ensure compliance with HIPAA regulations
ExplanationBAAs establish security obligations for business partners handling PHI.
#15
What is the purpose of penetration testing in healthcare information security?
To assess the effectiveness of security controls by simulating real-world attacks
ExplanationPenetration testing evaluates system vulnerabilities and strengths through simulated attacks.