#1
1. What does HIPAA stand for in the context of healthcare privacy?
Health Insurance Portability and Accountability Act
ExplanationHIPAA ensures the security and privacy of patient information in the healthcare sector.
#2
2. Which of the following is an example of sensitive healthcare information?
Patient's date of birth
ExplanationPersonal details like date of birth are considered sensitive health information.
#3
10. In healthcare, what does 'PHI' stand for?
Protected Health Information
ExplanationPHI includes identifiable health information protected under privacy laws.
#4
15. What is the purpose of 'audit trails' in healthcare information systems?
To record and track user activities for security monitoring
ExplanationAudit trails provide a record of user actions for security analysis and monitoring.
#5
20. Which organization is responsible for developing and maintaining standards for the electronic exchange of healthcare information?
ONC - Office of the National Coordinator for Health Information Technology
ExplanationONC sets standards to facilitate the secure exchange of electronic health information.
#6
25. Which of the following is an example of a 'man-in-the-middle' attack in healthcare data transmission?
Intercepting and altering data during transmission
ExplanationA 'man-in-the-middle' attack involves unauthorized interception and alteration of data during transmission.
#7
3. What is the primary goal of encryption in healthcare data security?
To secure data during transmission or storage
ExplanationEncryption safeguards health data by making it unreadable without the proper decryption key.
#8
4. Which government agency in the United States is responsible for enforcing HIPAA regulations?
OCR - Office for Civil Rights
ExplanationOCR ensures compliance with HIPAA regulations and investigates breaches.
#9
6. What is the purpose of a 'firewall' in the context of healthcare IT security?
To filter and monitor network traffic for security purposes
ExplanationA firewall controls incoming and outgoing network traffic to prevent unauthorized access.
#10
7. Which of the following is an example of a 'social engineering' attack in healthcare?
Malware infection through a phishing email
ExplanationSocial engineering uses deception to manipulate individuals into divulging confidential information.
#11
11. What is the role of a 'Security Risk Assessment' in healthcare organizations?
To identify potential risks and vulnerabilities in the security infrastructure
ExplanationRisk assessments help healthcare organizations proactively address security vulnerabilities.
#12
12. What is the significance of 'data minimization' in healthcare data management?
Limiting the collection and storage of unnecessary patient data
ExplanationData minimization reduces the amount of collected patient data to only what is essential for healthcare purposes.
#13
5. In the context of healthcare cybersecurity, what is a 'zero-day' vulnerability?
A newly discovered and unpatched security flaw
ExplanationA 'zero-day' vulnerability is a security flaw unknown to the software vendor or the public.
#14
8. What role does a 'Data Loss Prevention (DLP)' system play in healthcare data security?
Monitoring and controlling the transfer of sensitive data
ExplanationDLP systems prevent unauthorized access and transmission of sensitive healthcare data.
#15
9. What is 'two-factor authentication' in the context of healthcare access control?
Verifying identity with two separate authentication methods
ExplanationTwo-factor authentication adds an extra layer of security by requiring two forms of identification.
#16
13. Which of the following is an example of a 'biometric' authentication method in healthcare?
Retina scan
ExplanationBiometric authentication uses unique physical or behavioral traits, like a retina scan, for identity verification.
#17
14. How does 'role-based access control' contribute to healthcare information security?
By limiting access based on the user's role in the organization
ExplanationRole-based access control restricts system access based on user roles to minimize potential breaches.
#18
18. What is the purpose of a 'Business Associate Agreement' in healthcare privacy?
To define the relationship between covered entities and their business associates
ExplanationBusiness Associate Agreements establish terms for handling PHI between covered entities and their partners.