uestion 1
A hardware security tool that helps protect an organization against security breaches by
issuing masks to protect the identity of a corporation's employees who are accessing
the World Wide Web is a:
Proxy server
Firewall
Anti-virus program
Masking program
Question 2
A criminal attack on a network using software designed to guess passwords is known
as:
Zero day attack
Brute force attack
Both zero day attack and brute force attack
None of these are correct.
Question 3
Which security tool do networks employ to examine incoming Internet traffic?
Mask
Firewall
Proxy server
Code trackers
Question 4
Assess the strength of the password: *tomatoSoup7.
Strong password
Weak password
Question 51 pts
Week 6 Quiz
Health Informatics
error causes the highest percentage of security breaches.
Human
Technical
Week 6 Quiz
Health Informatics
Hardware
Authentication
Question 6
Assigning passwords to employees so that they can access the secure network is
known as:
Biometrics
Authentication
Integrity
Fair use
Question 7
Safely using portable devices off-site can be accomplished by:
A virtual private network (VPN) to encrypt data
Limiting the information carried outside the secure network
Installing software to perform a remote data wipe
All of these are correct.
Question 8
An ethics approach applied to relatively homogenous societies, where beliefs are similar
and most societal members shared common values, is known as:
The Hippocratic tradition
A casuist approach
Principlism
Antiprinciplism
Question 9
What helps to ethically delineate healthcare practice from healthcare information
obtained from the Internet?
Specific type of diseases reviewed
Direct provider patient communication
Indirect provider communication
Knowledge of violated privacy law
Week 6 Quiz
Health Informatics
Question 101 pts
In ethics theory, nonmaleficence means:
The obligation not to inflict harm intentionally
Poor productivity or inefficiency
Embracing cultural diversity
None of these are correct.
Question 11
Which situation presents a bioethical dilemma?
Not a cheater, but cheats on a quiz
The ability to check information available on the Internet in order to protect citizens
NOT CORRECT
Use of stem cell technology in research
Computer programmers developing healthcare software
Question 12
Social media is an acceptable form of communication but has the potential for ethical
and legal complications.
True
False
Question 13
The presence of a moral dilemma creates:
A peaceful temperament
A specific action
An anticipated behavior
Uncertainty
Question 14
Monetary incentives are available to those who implement EHR systems that meet
specified standards, such as:
Administrators and boards of directors
Clinicians and facilities
Patients
Week 6 Quiz
Health Informatics
All of these are correct.
Question 151 pts
New technologies in digital communications, electronic health records, and telehealth
raise issues related to:
Comprehensiveness of care
The digital divide
Justice and fidelity
Privacy and confidentiality
Question 11 pts
Assess the strength of the password: $ your last name.
Strong password
Weak password
Question 2
Which security tool do networks employ to examine incoming Internet traffic?
Mask
Firewall
Proxy server
Code trackers
Question 31 pts
Assess the strength of the password, !E1E2E30.
Strong
Weak
Question 4
What is not a main issue in securing network information?
Availability
Confidentiality
Integrity
Week 6 Quiz
Health Informatics
Reciprocity
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |