Health & SafetyAnswer Key

Hipaa Regulations Override Any State Laws

30 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

In a hospital, the obligation to maintain confidentiality applies to _____.

ANSWER

All medical and personal information

QUESTION 2

HIPAA regulations override any state laws which demand stricter privacy.

ANSWER

False

QUESTION 3

In a conversation, enough information to identify patients may be revealed, even if patient names are not used.

ANSWER

True

QUESTION 4

Among the permitted disclosures that do not require patient permission are reporting:

ANSWER

All of the above

QUESTION 5

Which of the following are types of data security safeguards?

ANSWER

All of the above

QUESTION 6

Of the following types of conversations about patients, the one(s) that constitute(s) a violation of patient privacy is:

ANSWER

All of the above

QUESTION 7

The _______________ is responsible to see that all healthcare workers are familiar with HIPAA and its privacy rule, and familiar with all the policies and procedures used to guard protected health information in the facility.

ANSWER

Privacy officer

QUESTION 8

The coming of computers in medicine has ______.

ANSWER

Created new dangers for breach of confidentiality

QUESTION 9

The issue of "healthcare portability" focused on protecting healthcare coverage for employees who change jobs and allowing them to carry their existing plans with them.

ANSWER

True

QUESTION 10

Title I of HIPAA covers:

ANSWER

All of the above

QUESTION 11

The Privacy rule states that protected health information can be data that is written, spoken, or in electronic form.

ANSWER

True

QUESTION 12

At the extreme, anyone caught selling private health care information can be fined up to:

ANSWER

$250,000 and 10 years in prison

QUESTION 13

In an open computer network such as the internet, HIPAA requires the use of _____. In a closed system such as a local area network, HIPAA allows _____ as controls.

ANSWER

Data encryption; Sign-on codes and passwords

QUESTION 14

One exception to confidentiality is ____.

ANSWER

A gunshot wound

QUESTION 15

The term "ICD-10-CM" refers to 10th Independent Categorization of disease factors.

ANSWER

False

QUESTION 16

The Department of Health and Human Services considers the HIPAA security standards to be a maximum standard

ANSWER

False

QUESTION 17

The goal of your organization's information security program is to protect the confidentiality, integrity, and availability of each patient's health information.

ANSWER

True

QUESTION 18

The ____(Fill in the blank) ____ is a unique ten-digit alphanumeric.

ANSWER

National provider identifier NPI

QUESTION 19

The standardization of all codes has begun to make the electronic transfer of healthcare data:

ANSWER

Smoother and more accurate

QUESTION 20

One of the requirements of the Security Rule is to:

ANSWER

Protect against all reasonably anticipated threats or hazards to the security of electronic protected health information

QUESTION 21

The most common privacy violations were impermissible disclosures to unauthorized persons, often in casual conversation.

ANSWER

True

QUESTION 22

One good rule to prevent unauthorized access to computer data is to ____.

ANSWER

Blank the screen or turn off the computer when you leave it

QUESTION 23

The security rule deals specifically with protecting ___(fill in the blank)__ data.

ANSWER

Electronic

QUESTION 24

The Administrative Safeguards are largely handled by a facility's __________.

ANSWER

Administrators and privacy officer

QUESTION 25

As the first incremental step in healthcare reform, Congress passed the HIPAA act in:

ANSWER

1996

QUESTION 26

In general, information about a patient can be shared _____ .

ANSWER

When it is directly related to treatment

QUESTION 27

In general, a written HIPAA privacy notice contains:

ANSWER

All of the above

QUESTION 28

Title I promotes renewability of coverage by prohibiting employee health plans from denying coverage to new employees based on all but which of the following?

ANSWER

Medical inaccuracies

QUESTION 29

The privacy and data security portions of the Health Insurance Portability and Accountability Act (HIPAA) was passed _____.

ANSWER

In 1996

QUESTION 30

Technical Safeguards are used to protect information through the use of which of the following?

ANSWER

Encryption and Authentication programs.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials