Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

HIO-201 Exam Dumps - Certified HIPAA Professional

Question # 4

The implementation specifications for this HIPAA security standard (within Technical Safeguards) must support emergency access and unique user identification:

A.

Audit Control

B.

Integrity

C.

Access Control

D.

Person or Entity Authentication

E.

Transmission Security

Full Access
Question # 5

Which one of the following security standards is part of Technical Safeguards?

A.

Access Control

B.

Security Management Process

C.

Facility Access Controls

D.

Workstation Use

E.

Device and Media Controls

Full Access
Question # 6

A business associate must agree to:

A.

Report to the covered entity any security incident of which it becomes aware

B.

Ensure the complete safety of all electronic protected health information

C.

Compensate the covered entity for penalties incurred because of the business associate's security incidents.

D.

Register as a business associate with HHS

E.

Submit to periodic audits by HHS of critical systems containing electronic protected health information

Full Access
Question # 7

Which of the following is primarily concerned with implementing security measures that are sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.

A.

Access Establishment and Modification

B.

Isolating Health care Clearinghouse Functions

C.

Information System Activity Review

D.

Risk Management

E.

Risk Analysis

Full Access
Question # 8

The Final Privacy Rule requires a covered entity to obtain an individual's prior written authorization to use his or her PHI for marketing purposes except for:

A.

Situations where the marketing is for a drug or treatment could improve the health of that individual.

B.

Situations where the patient has already signed the covered entity's Notice of Privacy Practices.

C.

A face-to-face encounter with the sales person of a company that provides drug samples

D.

A communication involving a promotional gift of nominal value.

E.

The situation where the patient has signed the Notice of Privacy Practices of the marketer.

Full Access
Question # 9

Which of the following is a required implementation specification associated with the Contingency Plan Standard?

A.

Integrity Controls

B.

Access Control and Validation Procedures

C.

Emergency Mode Operation

D.

Plan Response and Reporting

E.

Risk Analysis

Full Access
Question # 10

The code set that must be used to describe or identify inpatient hospital services and surgical procedures is:

A.

ICD-9-CM, Volumes land 2

B.

CPT-4

C.

CDT

D.

ICD-9-CM, Volume 3

E.

HCPCS

Full Access
Question # 11

A grouping of functional groups, delimited by' a header/trailer pair, is called a:

A.

Data element

B.

Data segment

C.

Transaction set

D.

Functional envelope

E.

Interchange envelope

Full Access
Question # 12

Information in this transaction is generated by the payer's adjudication system:

A.

Eligibility (270/271)

B.

Premium Payment (820)

C.

Unsolicited Claim Status (277)

D.

Remittance Advice (835)

E.

Functional Acknowledgment (997)

Full Access
Question # 13

This transaction is used to transmit referral transactions between UMOs and other parties:

A.

Referral Premium Payment

B.

Health Care Referral Certification and Authorization.

C.

First Report of Injury.

D.

Health Plan Referral Enrollment and Dis-enrollment.

E.

Coordination of Referral Benefits.

Full Access
Question # 14

Ensuring that physical access to electronic information systems and the facilities in which they are housed is limited, is addressed under which security rule standard?

A.

Security Management Process

B.

Transmission Security

C.

Person or Entity Authentication

D.

Facility Access Controls

E.

Information Access Management

Full Access
Question # 15

Select the correct statement regarding code sets and identifiers.

A.

The social security number has been selected as the National Health Identifier for individuals.

B.

The COT code set is maintained by the American Medical Association.

C.

Preferred Provider Organizations (PPO) are not covered by the definition of "health plan" for purposes of the National Health Plan Identifier

D.

HIPAA requires health plans to accept every valid code contained in the approved code sets

E.

An important objective of the Transaction Rule is to reduce the risk of security breaches through identifiers.

Full Access
Question # 16

The Security Rule requires that the covered entity identifies a security official who is responsible for the development and implementation of the policies and procedures. This is addressed under which security standard?:

A.

Security Incident Procedures

B.

Response and Reporting

C.

Assigned Security Responsibility

D.

Termination Procedures

E.

Facility Access Controls

Full Access
Question # 17

Select the phrase that makes the following statement FALSE. The 270 Health Care Eligibility Request can be used to inquire about:

A.

Eligibility status

B.

Benefit maximums

C.

Participating providers

D.

Deductibles & exclusions

E.

Co-pay amounts

Full Access
Question # 18

HIPAA establishes a civil monetary penalty for violation of the Administrative Simplification provisions. The penalty may not be more than:

A.

$1,000,000 per person per violation of a single standard for a calendar year.

B.

$10 per person per violation of a single standard for a calendar year.

C.

$25,000 per person per violation of a single standard for a calendar year.

D.

$2,500 per person per violation of a single standard for a calendar year.

E.

$1000 per person per violation of a single standard for a calendar year.

Full Access
Question # 19

This transaction is typically used in two modes: update and full replacement:

A.

Premium Payment.

B.

Health Care Claim.

C.

First Report of Injury.

D.

Health Plan Enrollment and Dis-enrollment.

E.

Coordination of Benefits.

Full Access
Question # 20

Title 1 of the HIPAA legislation in the United States is about:

A.

PKI requirements for hospitals and health care providers.

B.

Encryption algorithms that must be supported by hospitals and health care providers.

C.

Fraud and abuse in the health care system and ways to eliminate the same.

D.

Guaranteed health insurance coverage to workers and their families when they change employers.

E.

The use of strong authentication technology that must be supported by hospitals and health care providers.

Full Access
Question # 21

To comply with the Final Privacy Rule, a valid Notice of Privacy Practices:

A.

Is required for all Business Associate Contracts.

B.

Must always be associated with a valid authorization.

C.

Must be signed before providing treatment to a patient.

D.

Must be associated with a valid Business Associate Contract.

E.

Must describe the individual's rights under the Privacy Rule.

Full Access
Question # 22

Implementing policies and procedures to prevent, detect, contain, and correct security violations is required by which security standard1?

A.

Security Incident Procedures

B.

Assigned Security Responsibility

C.

Access Control

D.

Facility Access Controls

E.

Security Management Process

Full Access
Question # 23

Which of the following is not one of the HIPAA Titles?:

A.

Title IX: Employer sponsored group health plans.

B.

Title III: Tax-related Health Provisions.

C.

Title II: Administrative Simplification.

D.

Title I: Health Care Insurance Access, Portability, and Renewability.

E.

Title V: Revenue Offsets.

Full Access
Question # 24

HIPAA transaction standards apply to:

A.

Employee drug tests.

B.

Health component of auto insurance.

C.

Stored health information data.

D.

Eligibility inquiries.

E.

Non-reimbursed employee medical expenses.

Full Access