Free HIO-301 Exam Braindumps (page: 5)

Page 4 of 31

This is a program that is a type of malicious code. It is unauthorized code that is contained within a legitimate program and performs functions unknown to the user.

  1. Trojan horse
  2. Distributed Denial of Service
  3. Stealth virus
  4. Polymorphic virus
  5. Denial of Service

Answer(s): A



Documented instructions for responding to and reporting security violations are referred to as:

  1. Business Associate agreement
  2. Security Incident Procedures
  3. Non-repudiation
  4. Sanction Policy
  5. Risk Management

Answer(s): B



A required implementation specification of the contingency plan standard is:

  1. Chain of Trust Agreement
  2. Applications and Data Criticality Analysis
  3. Security Training
  4. Disaster Recovery Plan
  5. Internal Audit

Answer(s): D



This standard addresses restricting physical access to electronic PHI data through interface devices to authorized users:

  1. Facility Security Plan
  2. Person or Entity Authentication
  3. Workstation Security
  4. Contingency Plan
  5. Access Control

Answer(s): C






Post your Comments and Discuss HIPAA HIO-301 exam with other Community members:

HIO-301 Discussions & Posts