A required implementation specification of the contingency plan standard is:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 12
During your discussions with one of the clients, you need to explain the meaning of a Virtual Private
Network. Select the best definition:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 13
“Evaluation” is a standard within:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 14
The CTQ of a clearinghouse wants to implement a security mechanism that can alert the systems administrator about any hacker attempting to break into the electronic PHI processing server system. As a security advisor to the OTO, what mechanism would you recommend? Select the best answer.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
ANSWER: C
Q: 15
An addressable Implementation Specification of Facility Access Controls is:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 16
Which of the following is an example of an asymmetric key algorithm?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Q: 17
This is one of the areas defined in the ISO 17799 Security Standard.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 18
The objective of this implementation specification is to conduct an accurate and thorough
assessment of the potential vulnerabilities to the confidentiality, integrity and availability of
electronic protected health information held by the covered entity.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Q: 19
The Security Management Process standard includes this implementation specification:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Q: 20
This form of security control addresses factors such as time of day or location of the user: