Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

HCISPP Questions and Answers

Question # 6

Which of the following is the BEST reason for the use of security metrics?

A.

They ensure that the organization meets its security objectives.

B.

They provide an appropriate framework for Information Technology (IT) governance.

C.

They speed up the process of quantitative risk assessment.

D.

They quantify the effectiveness of security processes.

Full Access
Question # 7

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

A.

Only when assets are clearly defined

B.

Only when standards are defined

C.

Only when controls are put in place

D.

Only procedures are defined

Full Access
Question # 8

Are employers required to submit enrollments by the standard transactions?

A.

Though Employers are not CEs and they have to send enrollment using HIPPA standard transactions. However, the employer health plan IS a CE and must be able to conduct applicable transactions using the HIPPA standards

B.

Employers are not CEs and do not have to send enrollment using HIPPA standard transactions. However, the employer health plan IS a CE and must be able to conduct applicable transactions using the HIPPA standards.

C.

Employers are CEs and have to send enrollment using HIPPA standard transactions. However, the employer health plan IS a CE and must be able to conduct applicable transactions using the HIPPA standards.

D.

Employers are CEs and do not have to send enrollment using HIPPA standard transactions. Further, the employer health plan IS also a CE and must be able to conduct applicable transactions using the HIPPA standards.

Full Access
Question # 9

He discovered X-Rays.

A.

Lister

B.

Flemming

C.

Koch

D.

Roentgen

Full Access
Question # 10

You are approached by an individual who tells you that he is here to work on the computers and wants you to open a door for him or point the way to a workstation. How do you respond to this request?

A.

Provide him with the information or access he needs.

B.

Ask him who at the facility has hired him and refer him to that person for assistance.

C.

Call the police.

Full Access
Question # 11

Which of the following represents the GREATEST risk to data confidentiality?

A.

Network redundancies are not implemented

B.

Security awareness training is not completed

C.

Backup tapes are generated unencrypted

D.

Users have administrative privileges

Full Access
Question # 12

When controlling the type of supply, increasing the amount of generalists could contain costs because.

A.

Generalists earn lower incomes than specialists

B.

Generalists practice resource-intensive medicine and generate lower overall health care expenditures

C.

Generalists use less hospital and laboratory services

D.

All of the above

Full Access
Question # 13

Compared to other industrialized countries, the United States' health care system is.

A.

The most costly

B.

The least universal

C.

Both a and b

D.

Neither a or b

Full Access
Question # 14

They examine cost of claims to determine whether it is a reasonable or necessary, according to diagnosis.

A.

Coders

B.

Billers

C.

Health Insurance Specialist

Full Access
Question # 15

The malpractice liability system negatively impacts quality of care because.

A.

The fear and stress of malpractice litigation creates an "I didn't do it" response from the physician, rather than working on improvement

B.

The system is economically wasteful and takes dollars away from improving care

C.

It wreaks unnecessary stress on often innocent and talented physicians

D.

All of the above

Full Access
Question # 16

Was an early expression of medical ethics and reflected high ideals.

A.

Cannon of Medicine

B.

Hippocratic Oath

Full Access
Question # 17

The Hippocratic Oath was in the Medieval time period.

A.

True

B.

False

Full Access
Question # 18

______________- medicine believed gods and evil spirits caused disease.

A.

Ancient

B.

Prehistoric

C.

Modern

Full Access
Question # 19

The CQI approach of producing health care "report cards," specifically HEDIS is a tool to encourage health care consumers to choose high-quality caregivers, but often.

A.

these report cards are inaccurate

B.

cost, not quality is the driving motivator for employers to choose health care plans for their employees

C.

HEDIS includes only a limited number of quality performance indicators

D.

None of the above

Full Access
Question # 20

It is NOT important to read and understand your agency's Notice of Privacy Practices.

A.

True

B.

False

Full Access
Question # 21

A gap analysis for the Transactions set refer to the practice of identifying the data content you currently have available

A.

through your medical software

B.

through your accounting software

C.

through competing unit medical software

D.

based on the statutory authorities report

Full Access
Question # 22

If a person has the ability to access facility of company systems or applications, they have a right to view any information contained in that system or application.

A.

True

B.

False

Full Access
Question # 23

A gap analysis for the Transactions set does not refer to

A.

the practice of identifying the data content you currently have available through your medical software

B.

the practice of and comparing that content to what is required by HIPPA, and ensuring there is a match.

C.

and requires that you study the specific format of a regulated transaction to ensure that the order of the information when sent electronically matches the order that is mandated in the Implementation Guides.

D.

but does not require that you study the specific format of a regulated transaction to ensure that the order of information when sent electronically matches the order that is mandated in the Implementation Guides.

Full Access
Question # 24

In its historical context, which of the following has played a major role in revolutionizing health care delivery?

A.

Beliefs and values

B.

Science and technology

C.

Medical education

D.

Economic growth

Full Access
Question # 25

Who was the first to identity syphilis?

A.

Flemming

B.

Koch

C.

Fracastoro

D.

Bill

Full Access
Question # 26

What does "MUA" stand for?

A.

Metropolitan Utilization Area

B.

Medically Underserved Area

C.

Metropolitan Underserved Area

D.

Medical Utilization Area

Full Access
Question # 27

Each healthcare provider MUST have a document that describes how information about the client is used by the agency and when the agency will disclose/release it without the client's authorization.

A.

True

B.

False

Full Access
Question # 28

If a state or federal law or regulation grants the client greater access to their PHI, then it will preempt HIPAA.

A.

True

B.

False

Full Access
Question # 29

Which of the following embodies all the detailed actions that personnel are required to follow?

A.

Standards

B.

Guidelines

C.

Procedures

D.

Baselines

Full Access
Question # 30

What is the standard for accessing patient information?

A.

A need to know for the performance of your job.

B.

If a physician asks you the diagnosis of a patient.

C.

Just because you are curious.

D.

You are a relative of the patient.

Full Access
Question # 31

According to private sector data classification levels, how would salary levels and medical information be classified?

A.

Public

B.

Sensitive

C.

Private

D.

Confidential

Full Access
Question # 32

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

A.

Document the system as high risk

B.

Perform a vulnerability assessment

C.

Perform a quantitative threat assessment

D.

Notate the information and move on

Full Access
Question # 33

Community rating is able to redistribute funds from the healthy to the sick by.

A.

Providing benefits in excess of premiums to those who become ill.

B.

Setting premiums based on community experience, rather than that of subgroups.

C.

Charging the same premium for high-risk and low-risk populations.

D.

All of the above

Full Access
Question # 34

Access to health care is measured by.

A.

The type of insurance a person has.

B.

The number of times a person uses health care services.

C.

The quality of health care services a person has.

D.

The number of physicians available to a person.

Full Access
Question # 35

___________ includes highly qualified pracitioners availble as consultants when needed.

A.

Active

B.

Honorary

C.

Consulting

Full Access
Question # 36

Which racial/ethnic group has the highest rate of uninsurance?

A.

White

B.

Hispanic

C.

Asian or pacific islander

D.

Black or African American

Full Access
Question # 37

What grants a "deemed status", has conditions of participation and makes sure hospitals meet certain requirements to get reimburse for medicare/medicaid?

A.

HIPPA

B.

JCAH

C.

Food and Drug Act

Full Access
Question # 38

Record Circulation is a retrieval of the patients record?

A.

True

B.

False

Full Access
Question # 39

Which of the following is a characteristic of a socialized health insurance system?

A.

Health care is financed through government-mandated contributions by employers and employees

B.

Health care is delivered by government-employed providers

C.

Both a and b

D.

Neither a nor b

Full Access
Question # 40

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

Below are the common phases to creating a Business Continuity/Disaster Recovery (BC/DR) plan. Drag the remaining BC\DR phases to the appropriate corresponding location.

Full Access
Question # 41

Which of the following disaster recovery test plans will be MOST effective while providing minimal risk?

A.

Read-through

B.

Parallel

C.

Full interruption

D.

Simulation

Full Access
Question # 42

Who is not affected by HIPPA?

A.

clearing houses

B.

banks

C.

universities

D.

billing agencies

Full Access
Question # 43

Which of the following trust services principles refers to the accessibility of information used by the systems, products, or services offered to a third-party provider’s customers?

A.

Security

B.

Privacy

C.

Access

D.

Availability

Full Access
Question # 44

The form of payment that is based specifically on the individual components of health care is.

A.

Fee-for-service reimbursement.

B.

Per Diem payment.

C.

Reimbursement by episode of illness.

D.

Capitation payment.

Full Access
Question # 45

Believed that germs caused death and founded aseptic surgery.

A.

Lister

B.

Koch

C.

Flemming

Full Access