Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HIPAA HIO-301 Exam -

Free HIO-301 Sample Questions:

Q: 1
This is a self-contained program that uses security flaws such as buffer overflow to remotely compromise a system and then replicate itself to that system. Identify this program (threat):
A. Trojan horse
B. Trapdoor
C. Master book sector virus
D. Cracker
E. Worm
Answer: E

Q: 2
The objective of this implementation specification is to conduct an accurate and thorough assessment of the potential vulnerabilities to the confidentiality, integrity and availability of electronic protected health information held by the covered entity.
A. Risk Analysis
B. Network Management Policy
C. Security Policy
D. Access Controls
E. Audit Controls
Answer: A

Q: 3
The Contingency Plan standard includes this addressable implementation specification:
A. Access Authorization Procedure
B. Testing and Revision Procedures
C. Virus Protection Plan Procedure
D. Sanctions Policy and Procedure
E. Authentication Procedures
Answer: B

Q: 4
This is a documented and routinely updated plan to create and maintain, for a specific period of time, retrievable copies of information:
A. Disaster Recovery Plan
B. Data Backup Plan
C. Facility Backup Plan
D. Security Plan
Answer: B

Q: 5
The objective of this standard is to perform a periodic review in response to environmental or operational changes affecting the security of electronic protected health information.
A. Security Management Process
B. Integrity
C. Audit Controls
D. Evaluation
E. Transmission Security
Answer: D

Q: 6
The HIPAA security standards are designed to be comprehensive, technology neutral and:
A. Based on NIST specifications
B. Based on ISO specifications
C. Reasonable
D. Scalable
E. Implementable
Answer: D

Q: 7
Risk Management is a required implementation specification of this standard:
A. Security Incident Procedures
B. Technical Safeguards
C. Security Management Process
D. Information Access Management
E. Security Configuration Management
Answer: C

Q: 8
The Security Incident Procedures standard includes this implementation specification:
A. Prevention Procedures
B. Alarm Device
C. Threat Analysis Procedures
D. Detection Procedures
E. Response and Reporting
Answer: E

Q: 9
This standard requires that the entity establishes agreements with each organization with which it exchanges data electronically, protecting the security of all such data.
A. Business Associate Contracts and Other Arrangements
B. Security Incident Procedures
C. Chain of Trust Contract
D. Trading Partner Agreement
E. Assigned security responsibility
Answer: A

Q: 10
The Security Management Process standard includes this implementation specification:
A. Risk Reduction Policy
B. Audit Control
C. Risk Management
D. Detection Procedures
E. Training
Answer: C

© 2014, All Rights Reserved