image


HIO-301 Dumps

HIO-301 Braindumps HIO-301 Real Questions HIO-301 Practice Test

HIO-301 Actual Questions


HIPAA


HIO-301


Certified HIPAA Security


https://killexams.com/pass4sure/exam-detail/HIO-301


QUESTION: 108

This field in an X.509 digital certificate identifies that each certificate issued by a particular Certificate Authority is unique:


  1. Kerberos ticket ID

  2. PA ID number

  3. CA ID number

  4. Sender ID

  5. Serial number


Answer: E


QUESTION: 109

Which the most widely accepted format for digital certificates is:


A. BOOTP B. X.599

  1. Phage.963

  2. Vapor.741

  3. ASCX12


Answer: B


QUESTION: 110

An example of a major VPN tunneling protocol is:


  1. Vapor.741

  2. L2TP

  3. MD5

  4. TCP/IP

  5. PKI


Answer: E


QUESTION: 111

A hospital is setting up a wireless network using “Wi-Ei” technology to enable nurses to feed information through it onto the corporate server instead of using traditional


paper forms. As a HIPAA security specialist, what would you do as the first step towards, protecting the wireless communication?


  1. Set up a message digest infrastructure to enable secure communication.

  2. Configure intrusion detection software on the firewall system.

  3. Protect the wireless network through installation of a firewall.

  4. Enable use of WEP keys that are generated dynamically upon user authentication.

  5. Configure TCP/IP, with a static IP address for all the clients having gateway address of the server..


Answer: A


QUESTION: 112

Dr. Alice needs to send patient Bob a prescription electronically. Dr. Alice wants to send the message such that Bob can be sure that the sender of the prescription was in fact Dr. Alice. Dr. Alice decides to encrypt the message as well as include her digital signature. What key will Bob use to be able to decrypt the session key used by Dr. Alice?


  1. Dr. Alice’s private key

  2. Dr. Alice’s public key

  3. Bob’s public key

  4. Bob’s private key

  5. Dr. Alice’s session key


Answer: D


QUESTION: 113

Statement 1: A firewall is one or more systems, that may be a combination of hardware and software that serves as a security mechanism to prevent unauthorized access between trusted and un-trusted networks. Statement 2: A firewall refers to a gateway that restricts the flow of information between the external Internet and the internal network. Statement 3: Firewall systems can protect against attacks that do not pass through its’ network interlaces.


  1. Statement 1 is TRUE, Statement 2 is TRUE and Statement 3 is TRUE

  2. Statement 1 is TRUE, Statement 2 is TRUE and Statement 3 is FALSE

  3. Statement 1 is TRUE, Statement 2 is FALSE and Statement 3 is TRUE

  4. Statement 1 is FALSE, Statement 2 is TRUE and Statement 3 is TRUE

  5. Statement I is FALSE, Statement 2 is FALSE and Statement 3 is TRUE


Answer: B


QUESTION: 114

During your discussions with one of the clients, you need to explain the meaning of a Virtual Private Network. Select the best definition:


  1. A VPN enables a group of two or more computer systems or networks, such as between a hospital and a clinic, to communicate securely over a public network, such as the Internet.

  2. A VPN is used within the organization only and a firewall is needed to communicate with the external network.

  3. A VPN requires a private dedicated communication between the two end points.

  4. A VPN may exist between an individual machine and a private network but, never between a machine on a private network and a remote network.

  5. A VPN is a “real” private network as opposed to a “virtual” network.


Answer: A


QUESTION: 115

This is one of the areas defined in the ISO 17799 Security Standard.


  1. Operational policy

  2. Risk analysis

  3. Computer and network management

  4. Application management

  5. Security procedures


Answer: C


QUESTION: 116

A hospital has contracted with Lorna’s firm for the processing of statement generation and payment activities of its patients. At the end of the day, the hospital sends three different files to Lorna, one having new charges, the second one having updated addresses of the patients and third one having information related to payments received. The hospital wants to implement a secured method of transmission of these files to Lorna’s firm. What would be the best option for the hospital?


  1. Implement a Virtual Private Network (VPN) between the hospital and Lorna’s firm and support it with strong authentication.


  2. Audit Lorna’s firm every quarter and check all log files.

  3. Deploy intrusion detection software on Lorna’s network.

  4. Encrypt the files and then send it in a CD

  5. Send the source data files in a CD via courier in the evening.


Answer: A


QUESTION: 117 CORRECT TEXT

Statement 1: The IEEE 802.1 lb standards for wireless network define two types of authentication methods, Open and Shared key. Statement 2: The range of “Wi-Fi” products is within 30 feet of the router. Statement 3: A VPN can be setup over a wireless network


  1. Statement 1 is TRUE, Statement 2 is TRUE and Statement 3 is TRUE

  2. Statement 1 is TRUE, Statement 2 is TRUE and Statement 3 is FALSE

  3. Statement 1 is TRUE, Statement 2 is FALSE and Statement 3 is TRUE

  4. Statement I is FALSE, Statement 2 is TRUE and Statement 3 is FALSE

  5. Configure Statement 1 is TRUE, Statement 2 is FALSE and Statement 3 is FALSE


Answer: C


QUESTION: 118

The CTQ of a clearinghouse wants to implement a security mechanism that can alert the systems administrator about any hacker attempting to break into the electronic PHI processing server system. As a security advisor to the OTO, what mechanism would you recommend? Select the best answer.


  1. Deploying a VPN.

  2. Deploy SSL for all connections to the server.

  3. Installing an IDS solution on the server.

  4. Deploying a PRI solution.

  5. Installing a firewall to allow pass through traffic only to the allowed network address.


Answer: C


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG