Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A gap analysis for the Transactions set does not refer to

A.

the practice of identifying the data content you currently have available through your medical software

B.

the practice of and comparing that content to what is required by HIPPA, and ensuring there is a match.

C.

and requires that you study the specific format of a regulated transaction to ensure that the order of the information when sent electronically matches the order that is mandated in the Implementation Guides.

D.

but does not require that you study the specific format of a regulated transaction to ensure that the order of information when sent electronically matches the order that is mandated in the Implementation Guides.

HIPAA requires a response and reporting of security incidents. What is required when an organization has an attempted unauthorized access of protected health information?

A.

HIPAA must be notified

B.

Nothing is required of an attempted unauthorized access

C.

The organization must respond and notify the appropriate parties

D.

Federal authorities must be notified

Which of the following BEST describes the purpose of performing security certification?

A.

To identify system threats, vulnerabilities, and acceptable level of risk

B.

To formalize the confirmation of compliance to security policies and standards

C.

To formalize the confirmation of completed risk mitigation and risk analysis

D.

To verify that system architecture and interconnections with other systems are effectively implemented

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

A.

Development, testing, and deployment

B.

Prevention, detection, and remediation

C.

People, technology, and operations

D.

Certification, accreditation, and monitoring

Which of the following is a potential risk when a program runs in privileged mode?

A.

It may serve to create unnecessary code complexity

B.

It may not enforce job separation duties

C.

It may create unnecessary application hardening

D.

It may allow malicious code to be inserted

A risk assessment report recommends upgrading all perimeter firewalls to mitigate a particular finding. Which of the following BEST supports this recommendation?

A.

The inherent risk is greater than the residual risk.

B.

The Annualized Loss Expectancy (ALE) approaches zero.

C.

The expected loss from the risk exceeds mitigation costs.

D.

The infrastructure budget can easily cover the upgrade costs.

Which racial/ethnic group is most likely to drink alcohol?

A.

White

B.

Black or African American

C.

Asian or Pacific Islander

D.

Hispanic

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

A.

Walkthrough

B.

Simulation

C.

Parallel

D.

White box

Courtesy allows doctors to admit an occasional patient to the hospital.

A.

True

B.

False

Which of the following disaster recovery test plans will be MOST effective while providing minimal risk?

A.

Read-through

B.

Parallel

C.

Full interruption

D.

Simulation