Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

All assessment domains are updated with additional requirements when the AI Security factor is selected.

A.

True

B.

False

The scoring of Requirement Statements is used to calculate the overall Domain score.

A.

True

B.

False

Pre-populated default maturity level scores cannot be changed across an assessment object.

A.

True

B.

False

For an r2 assessment, what is the minimum number of days an organization should wait before a new or updated Policy and/or Procedure can be reconsidered for testing?

A.

Immediately

B.

30 Days

C.

60 Days

D.

90 Days

On an r2 assessment, HITRUST requires evidence to be linked to all maturity levels that score above 25% for Policy and Procedure, and over 0% for Implementation, Measured, and Managed.

A.

True

B.

False

An organization has identified a number of components needed for an assessment. These components cover systems/applications for customers in the states of Massachusetts and Nevada. Assuming management wants corresponding regulatory factors to be included in their assessment, which regulatory factors would apply?

(Select all that apply)

A.

State of Massachusetts Data Protection Act

B.

CMS Minimum Security Requirements (High)

C.

State of Nevada Security of Personal Information Requirements

D.

Texas Health and Safety Code

E.

Subject to De-ID Requirements

When testing, can you sample across a population of ungrouped primary components within an assessment's scope?

A.

Yes, across most of the components within scope

B.

No, you must test all components within scope

C.

Yes, across some of the components within scope

D.

Yes, a primary component sample can be produced using guidance from the scoring rubric

Which of the following does HITRUST certify?

A.

Products

B.

People

C.

Implemented Systems

D.

Facilities

E.

All of the above

Which AI models can be evaluated using the A1 Security Assessment?

A.

Hodgkin-Huxley

B.

Predictive

C.

Back Propagation

D.

Generative

E.

Rule-Based

Organizations that process sensitive data face multiple challenges relating to information security and privacy.

A.

True

B.

False