0 Comments

Question 1

What must a facility do to comply with the category of using
health information through the Joint Commission information management
accreditation standards?

Ensure that knowledge-based information resources are
available

Maintain accurate health information

Create a plan for managing information

Protect the privacy of health information

Unsaved change Moving to the next question prevents changes
to this answer.

Question 2

Which type of assessment is required by both the HIPAA
security rule and meaningful use to identify gaps and weaknesses that could
lead to security breaches?

Technical

Risk

Threat

Vulnerability

Question 3

Which function is included in mHealth applications?

Connect to a physician for treatment

Send prescriptions to the patient’s pharmacy

Transfer entire records to other providers

Request a change in provider

Question 4

Which action to avoid fraud and abuse is recommended by the
Centers for Medicare and Medicaid Services toolkit?

Purchasing a system that incorporates anti-fraud features

Showing what and when something in an EHR is modified, not
the person when doing audits

Running audit logs during high traffic times

Training only key informatics personnel regarding risks
associated with EHRs

Question 5

An important aspect of the HITECH act is the inclusion of:

Requirements for privacy breaches

Guidelines for social media

Handling of lab and diagnostic testing

Provisions for financial security

Order Solution Now

Categories: