Pass the HIPAA CHP HIO-201 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

This transaction, which is not a HIPAA standard, may be used as the first response when receiving a Health Care Claim (837):

Options:

A.

Eligibility (270/271).


B.

Premium Payment (820).


C.

Unsolicited Claim Status (277).


D.

Remittance Advice (835).


E.

Functional Acknowledgment (997).


Questions # 22:

A covered entity must adopt policies and procedures governing disclosures of PHI that identify

Options:

A.

The types of financial information to be disclosed.


B.

The specific individuals or entities to which disclosure would be made.


C.

The types of persons who would receive PHI.


D.

The conditions that would not apply to disclosure of PHI


E.

The criteria for reviewing requests for routine disclosure of PHI.


Questions # 23:

Which of the following is NOT a HIPAA national health care identifier?

Options:

A.

National Provider Identifier (NPI)


B.

Social Security Number (SSN)


C.

National Health Plan Identifier (PlanID)


D.

National Employer Identifier for Health Care (EIN)


E.

National Health Identifier for Individuals (NHII)


Questions # 24:

When submitting a Health Care Claim Status Request, it is important to provide the proper tracking information to exactly identify the previously submitted claim. Select the information that would be most important to the claim inquiry process.

Options:

A.

Authorization Number


B.

Provider's National Provider Identifier (NPI)


C.

Claim Submitter home phone number


D.

Patient's lab report


E.

Provider's security PIN code


Questions # 25:

HIPAA Security standards are designed to be:

Options:

A.

Technology specific


B.

State of the art


C.

Non-Comprehensive


D.

Revolutionary


E.

Scalable


Questions # 26:

ABC Hospital implements policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information. These policies and procedures satisfy which HIPAA security standard?

Options:

A.

Security Management Process


B.

Facility Access Control


C.

Security Awareness and Training


D.

Workforce Security


E.

Security Management Process


Questions # 27:

A doctor is sending a patient's lab work to a lab that is an external business partner. The lab and the doctor's staff are all trained on the doctor's Privacy Practices. The doctor has a signed Notice from the patient. In order to use or disclose PHI, the lab MUST:

Options:

A.

Request that the patient sign the lab's Notice of Privacy Practices.


B.

Do nothing more - the activity is covered by the doctor's Notice of Privacy Practices.


C.

Obtain a specific authorization from the patient


D.

Obtain a specific authorization from the doctor.


E.

Verify that the doctor's Notice of Privacy Practices has not expired.


Questions # 28:

A business associate must agree to:

Options:

A.

Report to the covered entity any security incident of which it becomes aware


B.

Ensure the complete safety of all electronic protected health information


C.

Compensate the covered entity for penalties incurred because of the business associate's security incidents.


D.

Register as a business associate with HHS


E.

Submit to periodic audits by HHS of critical systems containing electronic protected health information


Questions # 29:

The Privacy Rule has broad administrative requirements. Which one of the following requirements is defined under the Privacy Rule?

Options:

A.

Designate a security officer.


B.

Document termination procedures.


C.

Use biometrics to authenticate transactions.


D.

Deploy tokens and smart cards to all medical personnel.


E.

Verify that business associates treat patient information respectfully.


Questions # 30:

This HIPAA security area addresses the use of locks, keys and procedures used to control access to computer systems:

Options:

A.

Administrative Safeguards


B.

Physical Safeguards


C.

Technical Safeguards


D.

Audit Controls


E.

Information Access Management


Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions