Free HCISPP Exam Braindumps (page: 2)

Page 1 of 77

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.
What is the best approach for the CISO?

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.
What is the best approach for the CISO?

  1. Document the system as high risk
  2. Perform a vulnerability assessment
  3. Perform a quantitative threat assessment
  4. Notate the information and move on

Answer(s): B



DRAG DROP (Drag & Drop is not supported)
During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.
What is the best approach for the CISO?

Below are the common phases to creating a Business Continuity/Disaster Recovery (BC/DR) plan. Drag the remaining BC\DR phases to the appropriate corresponding location.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



A health care provider is considering Internet access for their employees and patients. Which of the following is the organization's MOST secure solution for protection of data?

  1. Public Key Infrastructure (PKI) and digital signatures
  2. Trusted server certificates and passphrases
  3. User ID and password
  4. Asymmetric encryption and UserID

Answer(s): A



Which of the BEST internationally recognized standard for evaluating security products and systems?

  1. Payment Card Industry Data Security Standards (PCI-DSS)
  2. Common Criteria (CC)
  3. Health Insurance Portability and Accountability Act (HIPAA)
  4. Sarbanes-Oxley (SOX)

Answer(s): B






Post your Comments and Discuss ISC2 HCISPP exam with other Community members:

HCISPP Discussions & Posts