Latest HIO-201 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : HIO-201
Exam Name : Certified HIPAA Professional
Vendor Name : "HIPAA"







HIO-201 Dumps

HIO-201 Braindumps HIO-201 Real Questions HIO-201 Practice Test

HIO-201 Actual Questions


killexams.com


HIPAA


HIO-201


Certified HIPAA Professional


https://killexams.com/pass4sure/exam-detail/HIO-201



Question: 169

Periodic testing and revision of contingency plans is addressed by:


  1. Testing and Revision Procedures

  2. Information System Activity Review

  3. Response and Reporting

  4. Data Backup Plan

  5. Emergency Access Procedure




Answer: A



Question: 170

Select the FALSE statement regarding the administrative requirements of the HIPAA privacy rule.


  1. A covered entity must mitigate, to the extent practicable, any harmful effect that it becomes aware of from the use or disclosure of PHI in violation of its policies and procedures or HIPAA regulations.

  2. A covered must not in any way intimidate, retaliate, or discriminate against any individual or other entity, which files a complaint.

  3. A covered entity may not require individuals to waive their rights as a condition for treatment, payment, enrollment in a health plan, or eligibility for benefits.

  4. A covered entity must retain the documents required by the regulations for a period of six years.

  5. A covered entity must change its policies and procedures to comply with HIPAA regulations no later than three years after the change in law.




Answer: E



Question: 171

One implementation specification of a contingency plan is:


  1. Risk analysis

  2. Applications and Data Criticality Analysis

  3. Risk Management

  4. integrity Controls


  5. Encryption




Answer: B



Question: 172

One implementation specification of the Security Management Process is:


  1. Risk Analysis

  2. Authorization and/or Supervision

  3. Termination Procedures

  4. Contingency Operations

  5. Encryption and Decryption




Answer: A



Question: 173

Maintenance personnel that normally have no access to PHI are called in to investigate water that is leaking from the ceiling of the room where a large amount of PHI is stored. The room is normally secured but the file cabinets have no doors or locks. Situations like this are addressed by which Workforce Security implementation specification?


  1. Risk Management

  2. Written Contract or Other Arrangement

  3. Accountability

  4. Authorization and/or Supervision

  5. integrity Controls




Answer: D



Question: 174

Which transaction covers information specific to accidents?


  1. Accident Report.

  2. First Report of Injury.

  3. Health Care Claim.

  4. Health Care Claim Payment/Advice.


  5. Premium Payment.




Answer: B



Question: 175

The Health Care Claim Status Response (277) can be used in a number of ways. Select the correct usage.


  1. As a response to a health care claim status request

  2. As a health care claim payment advice

  3. Electronic funds transfer

  4. As a request for health care claims status

  5. Request for the psychotherapy notes of a patient




Answer: A



Question: 176

Select the best example of a business associate (if they had access to PHI).


  1. Accountants

  2. Hospital employees

  3. A covered entity’s internal IT department

  4. CEO of the covered entity

  5. The covered entity’s billing service department




Answer: A



Question: 177

The objective of this document is to safeguard the premises and building from unauthorized physical access and to safeguard the equipment therein from unauthorized physical access, tampering and theft


  1. Contingency Plan

  2. Facility Security Plan

  3. Emergency Mode Operation Plan

  4. Accountability

  5. Device and Media Controls




Answer: B



Question: 178

The Integrity security standard has one addressable implementation standard which is:


  1. Encryption

  2. Authorization and/or Supervision

  3. Mechanism to Authenticate Electronic PHI

  4. Applications and Data Criticality Analysis

  5. Isolating Health care Clearing House Functions




Answer: C



Question: 179

This HIPAA security area addresses the use of locks, keys and procedures used to control access to computer systems:


  1. Administrative Safeguards

  2. Physical Safeguards

  3. Technical Safeguards

  4. Audit Controls

  5. Information Access Management




Answer: B



Question: 180

The transaction number assigned to the Health Care Eligibility Request transaction is:


  1. 270

  2. 276

  3. 278

  4. 271

  5. 834




Answer: A