Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

HIO-201 Questions and Answers

Question # 6

Select the FALSE statement regarding the administrative requirements of the HIPAA privacy rule.

A.

A coveted entity must mitigate, to the extent practicable, any harmful effect that it becomes aware of from the use or disclosure of PHI in violation of its policies and procedures or HIPAA regulations.

B.

A covered must not in any way intimidate, retaliate, or discriminate against any individual or other entity, which files a compliant.

C.

A covered entity may not require individuals to waive their rights as a condition for treatment, payment, enrollment in a health plan, or eligibility for benefits

D.

A covered entity must retain the documents required by the regulations for a period of six years.

E.

A covered entity must change its policies andprocedures to comply with HIPAAregulations no later than three years after the change in law.

Full Access
Question # 7

Maintenance personnel that normally have no access to PHI are called in to investigate water that is leaking from the ceiling of the room where a large amount of PHI is stored. The room is normally secured but the file cabinets have no doors or locks. Situations this are addressed by which Workforce Security implementation specification?

A.

Risk Management

B.

Written Contract or Other Arrangement

C.

Accountability

D.

Authorization and/or Supervision

E.

Integrity Controls

Full Access
Question # 8

A valid Notice of Privacy Practices must:

A.

Detail specifically all activities that are considered a use or disclosure.

B.

Describe in plain language what is meant by treatment, payment, and health care operations (TPO)

C.

Inform the individual that protected health information (PHI) may only be used for valid medical research.

D.

Inform the individual that this version of the Notice will always cover them, regardless of subsequent changes.

E.

State the expiration date of the Notice.

Full Access
Question # 9

When PHI is sent or received over an electronic network there must be measures to guard against unauthorized access. This is covered under which security rule standard?

A.

Device and Media Controls

B.

Access Controls

C.

Transmission Security

D.

Integrity

E.

Audit Controls

Full Access
Question # 10

Title 1 of the HIPAA legislation in the United States is about:

A.

PKI requirements for hospitals and health care providers.

B.

Encryption algorithms that must be supported by hospitals and health care providers.

C.

Fraud and abuse in the health care system and ways to eliminate the same.

D.

Guaranteed health insurance coverage to workers and their families when they change employers.

E.

The use of strong authentication technology that must be supported by hospitals and health care providers.

Full Access
Question # 11

The code set that must be used to describe or identify inpatient hospital services and surgical procedures is:

A.

ICD-9-CM, Volumes land 2

B.

CPT-4

C.

CDT

D.

ICD-9-CM, Volume 3

E.

HCPCS

Full Access
Question # 12

The Privacy Rule gives patients the following right:

A.

Access to the psychotherapy notes.

B.

Request an amendment to their medical record.

C.

Receive a digital certificate.

D.

See an accounting of disclosures for which authorization was given.

E.

The use of a smart card for accessing their records.

Full Access
Question # 13

This transaction, which is not a HIPAA standard, may be used as the first response when receiving a Health Care Claim (837):

A.

Eligibility (270/271).

B.

Premium Payment (820).

C.

Unsolicited Claim Status (277).

D.

Remittance Advice (835).

E.

Functional Acknowledgment (997).

Full Access
Question # 14

Which of the following is example of "Payment" as defined in the HIPAA regulations?

A.

Annual Audits

B.

Claims Management

C.

Salary disbursement to the workforce having direct treatment relationships.

D.

Life Insurance underwriting

E.

Cash given to the pharmacist for the purchase of an over-the-counter drug medicine

Full Access
Question # 15

The Privacy Rule has broad administrative requirements. Which one of the following requirements is defined under the Privacy Rule?

A.

Designate a security officer.

B.

Document termination procedures.

C.

Use biometrics to authenticate transactions.

D.

Deploy tokens and smart cards to all medical personnel.

E.

Verify that business associates treat patient information respectfully.

Full Access
Question # 16

Select the correct statement regarding the administrative requirements of the HIPAA privacy rule.

A.

A covered entity must designate, and document, a privacy official, security officer and a HIPAAcompliance officer

B.

A covered entity must designate, and document, the same person to be both privacyofficial and as the contact person responsible for receiving complaints and providing further information about the notice required by the regulations.

C.

A covered entity must implement and maintain written or electronic policies and procedures with respect to PHI that are designed to comply with HIPM standards, implementation specifications and other requirements.

D.

A covered entity must train, and document the training of, at least one member of its workforce on the policies and procedures with regard to PHI as necessary and appropriate for them to carry out their function within the covered entity no later than the privacy rule compliance date

E.

A covered entity must retain the document required by the regulations for a period often years from the time of it's creation or the time it was last in effect, which ever is later.

Full Access
Question # 17

This rule covers the policies and procedures that must be in place to ensure that the patients' health information is respected and their rights upheld:

A.

Security rule.

B.

Privacy rule.

C.

Covered entity rule.

D.

Electronic Transactions and Code Sets rule.

E.

Electronic Signature Rule.

Full Access
Question # 18

This transaction is typically used in two modes: update and full replacement:

A.

Premium Payment.

B.

Health Care Claim.

C.

First Report of Injury.

D.

Health Plan Enrollment and Dis-enrollment.

E.

Coordination of Benefits.

Full Access
Question # 19

This security rule standard requires policies and procedures for authorizing access to electronic protected health information that are consistent with its required implementation specifications- which are Isolating Health Care Clearinghouse Function, Access Authorization, and Access Establishment and Modification:

A.

Access Control

B.

Security Incident Procedures

C.

Information Access Management

D.

Workforce Security

E.

Security Management Process

Full Access
Question # 20

The Security Rule requires that the covered entity identifies a security official who is responsible for the development and implementation of the policies and procedures. This is addressed under which security standard?:

A.

Security Incident Procedures

B.

Response and Reporting

C.

Assigned Security Responsibility

D.

Termination Procedures

E.

Facility Access Controls

Full Access
Question # 21

This HIPAA security area addresses the use of locks, keys and procedures used to control access to computer systems:

A.

Administrative Safeguards

B.

Physical Safeguards

C.

Technical Safeguards

D.

Audit Controls

E.

Information Access Management

Full Access
Question # 22

The transaction number assigned to the Health Care Eligibility Request transaction is:

A.

270

B.

276

C.

278

D.

271

E.

834

Full Access
Question # 23

Some of the information that an authorization must include is:

A.

The date on which any automatic extension occurs.

B.

Covered entity's signature.

C.

A statement that federal privacy laws still protect the information after it is disclosed.

D.

A statement that the individual has no right to revoke the authorization.

E.

The date signed.

Full Access
Question # 24

Select the FALSE statement regarding the X12N Implementation Guides.

A.

The Washington Publishing Company has the exclusive rights to publish the X12N Implementation Guides.

B.

HHS has adopted the Implementation Guides as standards for HIPAA transactions.

C.

The guides are intended to be instructive and need not be followed strictly.

D.

The guides may be downloaded free from WPC's Website.

E.

The guides explain the usage of the transaction set segments and data elements.

Full Access