Search Header Logo

HIPAA Security Rule Quiz

Authored by Kenneth Virata

Other

9th - 12th Grade

HIPAA Security Rule Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When was the HIPAA security rule passed into law?

1996

2015

2000

2010

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two main objectives of the HIPAA security rule?

Health insurance and job mobility

Patient control and healthcare providers

Digital technology and healthcare institutions

Portability and privacy over protected health information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does PHI stand for in relation to HIPAA?

Protected Health Information

Private Health Institution

Personal Health Insurance

Patient Health Information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who has to abide by HIPAA legislation?

US Department of Health and Human Services

Healthcare providers and health plan providers

Covered entities and business associates

Healthcare institutions and professionals

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three safeguard standards outlined in the security rule for protecting ePHI?

Physical safeguards, technical safeguards, and administrative safeguards

Network security, employee policies, and media destruction

Cyber security, perimeter firewalls, and network controls

Employee access levels, technical aspects, and real-life controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do the physical safeguards of the security rule refer to?

Employee access levels and third-party subcontractors

Real-life physical controls on digital devices

Technical aspects of network computers and devices

Enhanced network security and perimeter firewalls

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do the technical safeguards of the security rule include?

Enhanced network security, perimeter firewalls, and cyber security protections

Real-life physical controls and employee access levels

Employee policies and procedures, network controls, and media destruction

Old or faulty equipment replacement and ePHI media destruction

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?