Health & SafetyAnswer Key

Citi Hipaa Training

73 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

In the US, privacy protections for health information come from:

ANSWER

Privacy protections come from all of these sources - both federal and state law, as well as the requirements of private certification organizations.

QUESTION 2

Privacy, in the health information context discussed here, refers to:

ANSWER

The rules about who can access health information, and under what circumstances.

QUESTION 3

Under the federal HIPAA regulations, state health privacy laws:

ANSWER

Remain in effect if more stringent than what HIPAA provides.

QUESTION 4

What kinds of persons and organizations are affected by HIPAA's requirements?

ANSWER

Health care providers, health plans, and health information clearinghouses, their business associates, and the workers for those organizations.

QUESTION 5

HIPAA privacy protections cover identifiable personal information about the "past, present or future physical or mental health condition." What does that include?

ANSWER

Health information in any form or medium, as long as it is identified (or identifiable) as a particular person's information.

QUESTION 6

When patients receive a copy of an organization's Privacy Notice, they are asked to sign an acknowledgment. Why?

ANSWER

It shows they received it.

QUESTION 7

Organizations covered by the federal HIPAA privacy law are expected to

ANSWER

Protect the health information under their control, train their workers in how to protect information, and help patients exercise their rights under the law.

QUESTION 8

Which of these is not a right under HIPAA?

ANSWER

To control all disclosures of information in the health record.

QUESTION 9

What does HIPAA's "minimum necessary" standard require of health care workers?

ANSWER

Use or disclose only the minimum necessary amount of health information to accomplish a task.

QUESTION 10

HIPAA's "incidental uses and disclosures" provision excuses deviations from the minimum necessary standard. What is excused?

ANSWER

Truly accidental "excess" uses and disclosures, where reasonable caution was otherwise used and there was no negligence.

QUESTION 11

When a privacy problem is discovered, which of the following is/are true?

ANSWER

All of the above

QUESTION 12

HIPAA allows health care organizations to control many information decisions. But where the patient retains control, which of the following is/are true?

ANSWER

If a person has a right to make a health care decision, then he/she has a right to control information associated with that decision.

QUESTION 13

With respect to permissions for uses and disclosures, HIPAA divides up health information into three categories. Into which category does information related to" treatment, payment and health care operations" go?

ANSWER

Uses or disclosures that generally require oral agreement only.

QUESTION 14

With respect to permissions for uses and disclosures, HIPAA divides up health information into three categories. Into which category do discussions with family members go?

ANSWER

Uses or disclosures that require generally oral agreement only.

QUESTION 15

With respect to permissions for uses and disclosures, HIPAA divides up health information into three categories. Into which category does information related to research, marketing and fundraising go?

ANSWER

Uses or disclosures that generally require specific written authorization.

QUESTION 16

Which of the following are organizations required to do under HIPAA?

ANSWER

Appoint a Privacy Officer to administer HIPAA rules.

QUESTION 17

HIPAA allows healthcare organizations to control many information decisions. However, where the patient retains control, which of the following is true?

ANSWER

If a person has a right to make a healthcare decision, then generally that person has a right to control information associated with the decision.

QUESTION 18

Which of these is not generally a good practice for telephone use?

ANSWER

Using voicemail systems and answering machines that do not require a password or PIN for access.

QUESTION 19

Which of these is not generally a good practice for fax machine use?

ANSWER

Sensitive faxes -- inbound or outbound -- are left sitting in or around the machine.

QUESTION 20

Which of these is not a good practice for physical security?

ANSWER

To preserve good customer relations, visitors are generally allowed access to all areas of a facility unless it appears they are doing something suspicious.

QUESTION 21

Which of these is generally not a good practice with respect to oral communications (that is, talking) in organizations like healthcare facilities?

ANSWER

Use of full names in public areas or on intercom/paging systems, because there is no security issue with identifying persons in public areas and using full names helps avoid misidentification.

QUESTION 22

Information security's goals are sometimes described by the letters "CIA." Which of the following is correct definition of C, I, or A?

ANSWER

All the above

QUESTION 23

Which of the following is true?

ANSWER

The "minimum necessary" standard applies to treatment-related uses, but not treatment-related disclosures, so as to avoid any interference with information exchanges among practitioners.

QUESTION 24

When a patient enters a clinical facility, they must inevitably surrender control of their information for a broad range of uses and disclosures. In the circumstances where the patient retains control of information, which of the following is true?

ANSWER

If the person controls a decision about treatment, he/she controls information about the information associated with it.

QUESTION 25

Patients must be provided with federally-mandated Privacy Notices when they first encounter direct treatment providers. Which of the following is an implication of that for clinicians?

ANSWER

The provision of the notice just before receiving treatment means clinicians will receive some questions about privacy issues. There is an obligation to know the answers, or to be able to direct the patient to someone who does.

QUESTION 26

Which category of health information does HIPAA extend "extra" protections, with a requirement for separate authorization?

ANSWER

Psychotherapy notes

QUESTION 27

Which best describes the role of the clinician in managing privacy matters?

ANSWER

How clinicians handle information inevitably sets the tone for everyone else, so the example they set is critical.

QUESTION 28

When required, the information provided to the data subject in a HIPAA disclosure accounting ...

ANSWER

must be more detailed for disclosures that involve fewer than 50 subject records.

QUESTION 29

The HIPAA "minimum necessary" standard applies...

ANSWER

To all human subjects research that uses PHI without an authorization from the data subject.

QUESTION 30

HIPAA protects a category of information known as protected health information (PHI). PHI covered under HIPAA includes:

ANSWER

Identifiable health information that is created or held by covered entities and their business associates.

QUESTION 31

A covered entity may use or disclose PHI without an authorization, or documentation of a waiver or an alteration of authorization, for all of the following EXCEPT:

ANSWER

Data that does not cross state lines when disclosed by the covered entity.

QUESTION 32

If you're unsure about the particulars of HIPAA research requirements at your organization or have questions, you can usually consult with:

ANSWER

An organizational IRB or Privacy Board, privacy official ("Privacy Officer"), or security official ("Security Officer"), depending on the issue.

QUESTION 33

HIPAA includes in its definition of "research," activities related to:

ANSWER

Development of generalizable knowledge.

QUESTION 34

A HIPAA authorization has which of the following characteristics:

ANSWER

Uses "plain language" that the data subject can understand, similar to the requirement for an informed consent document.

QUESTION 35

HIPAA's protections for health information used for research purposes...

ANSWER

Supplement those of the Common Rule and FDA.

QUESTION 36

How are the ethical standards for student uses and disclosures of patients' health information different from those for regular members of the healthcare workforce?

ANSWER

Some would say it is higher, because patients do not always benefit from students' access to their data.

QUESTION 37

For health information privacy and security, are the legal and regulatory requirements for students different from those for regular members of the healthcare workforce?

ANSWER

No, students must meet the same standards as a regular member of the workforce performing the same tasks.

QUESTION 38

Use of social media tools and other new technologies to facilitate training-related communications is:

ANSWER

Depends on the organization's policies, so you should check with your organization's officials about what is allowed or prohibited.

QUESTION 39

In regard to reporting privacy or security problems, are the requirements for students the same as for regular workers?

ANSWER

Yes. Like any other member of the workforce, students are obligated to report problems they are not in a position to correct.

QUESTION 40

Patients have to provide an additional, specific authorization for training uses and disclosures of their information.

ANSWER

False

QUESTION 41

Which of the following is a good practice if one wishes to avoid "social engineering" attacks?

ANSWER

All of the above

QUESTION 42

Which of these is not a good practice for controlling computer access?

ANSWER

Logging into systems with a shared user-ID or password

QUESTION 43

Which of these is not a good practice for protecting computing devices?

ANSWER

Login and screen-saver passwords, or token or biometric mechanisms, are disabled to make it easier to use the device quickly.

QUESTION 44

Which of the following are important for protecting computing devices and systems?

ANSWER

All of the above

QUESTION 45

Which of these is not a good security practice for web browsing?

ANSWER

Browsing to sites using links sent in emails without taking steps to assure the destination is safe.

QUESTION 46

Desktop computers are often provided in the workplace by organizations, and laptops may be as well. However, portable devices (such as tablets and smartphones) may more commonly be allowed on a BYOD basis. For a BYOD (personally-owned) device:

ANSWER

Organizations may have requirements about how BYOD devices may be configured or used, as a condition of accessing the organization's information resources.

QUESTION 47

Secure disposal of a desktop or laptop computer at the end of its service life is:

ANSWER

Generally considered essential for all computing and storage devices. One should not assume there is no sensitive personal or organizational data on a device or accessible by it.

QUESTION 48

Supplemental security software (such as anti-virus [anti-malware]) is:

ANSWER

Increasingly common for smartphones and tablets, and can include protections like remote-locate, remote-disable, and remote-data-wipe.

QUESTION 49

Secure communications, like those provided by "encrypted" web connections using https or a virtual private network (VPN), are:

ANSWER

Generally considered essential.

QUESTION 50

When choosing the security measures needed for a desktop or laptop computer:

ANSWER

The more security measures applied, the more secure a computer will be. However, it is impossible to have a uniform set of rules for all circumstances.

QUESTION 51

Ensuring data backups for data stored on a portable device is generally considered:

ANSWER

Necessary when the device would otherwise be the only source of hard-to-replace data, but the backup mechanism must also be secure

QUESTION 52

External labeling with a physical label, or configuring a device to display the owner's name and contact information on a login screen, is:

ANSWER

Generally considered a good idea, because it allows the device to be returned to its owner when found. However, always check organizational policies about the practice.

QUESTION 53

Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered:

ANSWER

Generally considered essential for any portable device.

QUESTION 54

Compared to fixed location (desktop) computers, physical security for portable devices is:

ANSWER

Generally more necessary, because portable devices tend to be used in physical environments that are inherently less secure.

QUESTION 55

Which of these is a greater risk "off site" than when a computer is used in a protected office environment?

ANSWER

All the above

QUESTION 56

What "administrative" measures do you usually need to take?

ANSWER

All the above

QUESTION 57

What "technical measures" do you usually need to take with an off-site computer?

ANSWER

All the above

QUESTION 58

What "physical" security measures do you usually need to take for an off-site computer?

ANSWER

All the above

QUESTION 59

Under HIPAA, an organization is required to do which of the following?

ANSWER

Appoint a Privacy Officer to administer HIPAA rules.

QUESTION 60

Recruiting into research ...

ANSWER

Can qualify as an activity "preparatory to research," at least for the initial contact, but data should not leave the covered entity.

QUESTION 61

Fines and jail time (occasionally) for information security failures are:

ANSWER

Generally, only applied for serious, deliberate misuse, where someone intentionally accesses data in order to do harm or for personal gain.

QUESTION 62

Which of these is not a good security practice for portable devices?

ANSWER

Disabling any remote-locate, remote-shutdown, and remote-erase capabilities because these can accidentally erase data.

QUESTION 63

Which of the following is generally allowed in most organizations?

ANSWER

Social networking if done for approved business-related purposes.

QUESTION 64

Enabling encryption of all data on a desktop or laptop computer is generally considered:

ANSWER

Essential for any computer. Only data on computers that are guaranteed to contain no sensitive information, or where the physical and technical security of the device is assured, can safely be left unencrypted.

QUESTION 65

Software on a desktop or laptop computer should be:

ANSWER

Installed or updated only from trusted sources to be certain that it is a legitimate version.

QUESTION 66

Devices used purely for storage, like USB flash ("thumb") drives and external hard drives:

ANSWER

May expose large amounts of data if compromised, so should also use protections like access passwords or PINs and whole-device data encryption.

QUESTION 67

Secure disposal of a portable device at the end of its service life is:

ANSWER

Generally considered essential for all devices. One should not assume there is no sensitive personal or organizational data on a device or accessible by it.

QUESTION 68

Secure communications, like that provided by "encrypted" web connections using https or a Virtual Private Network (VPN), are:

ANSWER

Generally considered essential for smartphones and tablets, because time sensitive information is being accessed, received, or transmitted.

QUESTION 69

Under HIPAA, "retrospective research" (a.k.a., data mining) on collections of PHI generally ...

ANSWER

Is research, and so requires either an authorization or meeting one of the criteria for a waiver of authorization.

QUESTION 70

Which of the following is a correct statement about the balance among prevention, detection, and response (PDR)?

ANSWER

The greater the sensitivity and quantity of the data at issue, the more carefully the balance among these three must be evaluated.

QUESTION 71

Which of these is not a good security practice for email?

ANSWER

Sending sensitive information in email messages or in attachments to such messages, as long as a legally-binding confidentiality notice is included.

QUESTION 72

Physical security for fixed location (desktop) computers is:

ANSWER

Necessary to consider, because physical security is always something that must be evaluated. Very few locations are guaranteed to be secure.

QUESTION 73

Enabling encryption of all data on a portable device is generally considered:

ANSWER

Essential for any portable device.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials