Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

To comply with the Privacy Rule, a valid Notice of Privacy Practices:

A.

Is required for all Chain of Trust Agreements.

B.

Must allow for the patient's written acknowledgement of receipt.

C.

Must always be signed by the patient.

D.

Must be signed in order for the patient's name to be sold to a mailing list organization

E.

Is not required if an authorization is being developed

Full Access
Question # 5

The Security Incident Procedures standard requires just one implementation specification. That implementation specification is:

A.

Termination Procedures

B.

Automatic Logoff

C.

Emergency Access Procedure

D.

Contingency Operations

E.

Response and Reporting

Full Access
Question # 6

Which of the following is not one of the HIPAA Titles?:

A.

Title IX: Employer sponsored group health plans.

B.

Title III: Tax-related Health Provisions.

C.

Title II: Administrative Simplification.

D.

Title I: Health Care Insurance Access, Portability, and Renewability.

E.

Title V: Revenue Offsets.

Full Access
Question # 7

Policies requiring workforce members to constantly run an updated anti-virus program on their workstation might satisfy which implementation specification?

A.

Risk Management

B.

Protection from Malicious Software

C.

Facility Security Plan

D.

Response and Reporting

E.

Emergency Access Procedure

Full Access
Question # 8

Which one of the following is a required implementation specification of the Security Management Process?

A.

Risk Analysis

B.

Access Control and Validation Procedures

C.

Integrity Controls

D.

Access Authorization

E.

Termination Procedures

Full Access
Question # 9

The Data Backup Plan is part of which Security Standard?

A.

Contingency Plan

B.

Evaluation

C.

Security Management Procedures

D.

Facility Access Control

E.

Security Incident Procedures

Full Access
Question # 10

Which of the following was not established under the Administrative Simplification title?

A.

National PKI Identifier.

B.

National Standard Health Care Provider Identifier.

C.

National Standard Employer Identifier.

D.

Standards for Electronic Transactions and Code Sets.

E.

Security Rule.

Full Access
Question # 11

Select the best statement regarding the definition of the term "use" as used by the HIPAA regulations.

A.

"Use" refers to the release, transfer, or divulging of IIHI between various covered entities

B.

"Use" refers to adding, modifying and deleting the PHI by other covered entities.

C.

"Use" refers to utilizing, examining, or analyzing IIHI within the covered entity

D.

"Use" refers to the movement of de-identified information within an organization.

E.

"Use" refers to the movement of information outside the entity holding the information

Full Access
Question # 12

The code set that must be used to describe or identify outpatient physician services and procedures is:

A.

ICD-9-CM, Volumes 1 and 2

B.

CPT-4

C.

CDT

D.

ICD-9-CM, Volume 3

E.

NDC

Full Access
Question # 13

Select the phrase that makes the following statement FALSE. The 270 Health Care Eligibility Request can be used to inquire about:

A.

Eligibility status

B.

Benefit maximums

C.

Participating providers

D.

Deductibles & exclusions

E.

Co-pay amounts

Full Access
Question # 14

HL7 is particularly involved with:

A.

NCPDP-based pharmacy standards

B.

The standard for pharmacy-health plan communication.

C.

Administering Medicare and Medicaid programs.

D.

Claims attachments.

E.

Publishing HIPAA Transactions-related Implementation Guides.

Full Access
Question # 15

When submitting a Health Care Claim Status Request, it is important to provide the proper tracking information to exactly identify the previously submitted claim. Select the information that would be most important to the claim inquiry process.

A.

Authorization Number

B.

Provider's National Provider Identifier (NPI)

C.

Claim Submitter home phone number

D.

Patient's lab report

E.

Provider's security PIN code

Full Access
Question # 16

The version of the ANSI ASC X12N standard required by HIPAA regulations is:

A.

3070

B.

3050

C.

3045

D.

4010

E.

4020

Full Access
Question # 17

This is a documented and routinely updated plan to create and maintain, for a specific period of time, retrievable copies of information:

A.

Disaster Recovery Plan

B.

Data Backup Plan

C.

Facility Access Controls

D.

Security Incident Procedures

E.

Emergency Mode Operations Plan

Full Access
Question # 18

This implementation specification might include actions such as revoking passwords, and collecting keys

A.

Sanction Policy

B.

access Authorization

C.

Facility Security Plan

D.

Termination Procedures

E.

Unique User Identification

Full Access
Question # 19

Which of the following is a required implementation specification associated with the Contingency Plan Standard?

A.

Integrity Controls

B.

Access Control and Validation Procedures

C.

Emergency Mode Operation

D.

Plan Response and Reporting

E.

Risk Analysis

Full Access
Question # 20

A covered entity must adopt policies and procedures governing disclosures of PHI that identify

A.

The types of financial information to be disclosed.

B.

The specific individuals or entities to which disclosure would be made.

C.

The types of persons who would receive PHI.

D.

The conditions that would not apply to disclosure of PHI

E.

The criteria for reviewing requests for routine disclosure of PHI.

Full Access
Question # 21

This transaction, which is not a HIPAA standard, may be used as the first response when receiving a Health Care Claim (837):

A.

Eligibility (270/271).

B.

Premium Payment (820).

C.

Unsolicited Claim Status (277).

D.

Remittance Advice (835).

E.

Functional Acknowledgment (997).

Full Access
Question # 22

Workstation Use falls under which Security Rule area?

A.

Person or Entity Authentication

B.

Technical Safeguards

C.

Administrative Safeguards

D.

Physical Safeguards

E.

Transmission Security

Full Access
Question # 23

The Health Care Claim Status Response (277) can be used in a number of ways. Select the correct usage.

A.

As a response to a health care claim status request

B.

As a health care claim payment advice

C.

Electronic funds transfer

D.

As a request for health care claims status

E.

Request for the psychotherapy notes of a patient

Full Access
Question # 24

An Electronic Medical Record (EMR):

A.

Is another name for the Security Ruling.

B.

Requires the use of biometrics for access to records.

C.

Is electronically stored information about an individual's health status and health care.

D.

Identifies all hospitals and health care organizations.

E.

Requires a PKI for the provider and the patient.

Full Access