Question: The Morris worm is well known in the information security literature for
Answer Options:
Falsification of financial records at publicly traded companies
Intruding into a number of high profile computer installations
Causing one of the most significant Internet outages ever
Stealing commercial information by exploiting weakness in wireless networks
Answer: Causing one of the most significant Internet outages ever
Question: Medical technicians calculate the amount of time it took for clinicians to produce their reports. This is an example of which part of the DMAIC process?
Answer Options:
a. Define
b. Measure
c. Analyze
d. Improve
e. Control
Answer: b. Measure
Question: The term ‘effectiveness’ of clinical care can be addressed with which of the following questions?
Answer Options:
a. Are things done?
b. Are the right things done?
c. What are the right things to do?
d. Was the clinical procedure done correctly?
e. None of these are correct.
Answer: b. Are the right things done?
Question: Windows 95 is important to information security for
Answer Options:
Stealing commercial information by exploiting weakness in wireless networks
Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant Internet outages ever
Answer: Popularizing computers among the masses
Question: Which of the following laws have had a major impact on social insurance in the U.S.?
Answer Options:
a. Social Security Act of 1935
b. Patient Protection and Affordable Care Act
c. Medicare Prescription Drug, Improvement, and Modernization Act
d. All of these are correct
e. None of these are correct.
Answer: d. All of these are correct
Question: Information security is defined as
Answer Options:
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide incentives, confidence and avoidance
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide intelligence, control and evidence
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide insights, competence and advantage
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability
Answer: Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability
Question: Many of those who are uninsured:
Answer Options:
a. Are workers who are employed in industries that do not provide health insurance
b. Do not have access to routine health care
c. Are American citizens
d. All of these are correct.
Answer: d. All of these are correct.
Question: The team tests the proposed solution, documents the amount time their solution has saved, and makes sure the solution is sustainable. This is an example of which part of the DMAIC process?
Answer Options:
a. Define
b. Measure
c. Analyze
d. Improve
e. Control
Answer: e. Control
Question: Thinking (T) People (MBTI):
Answer Options:
a. Like working in harmonious needs
b. Value fairness and like clear objectives
c. Are detail-oriented and trust facts
d. Find energy in things and people
e. All of the above
Answer: b. Value fairness and like clear objectives
Question: Medicaid is a program that is:
Answer Options:
a. A partnership between the federal government and the states
b. The same in each state
c. Covers adults over 65
d. Provides coverage to all children adults under the Federal Poverty Line
Answer: a. A partnership between the federal government and the states
Question: What do the four letters in the PDCA Model represent?
Answer Options:
a. Plan-Design-Check-Act
b. Plan-Do-Check-Act
c. Plan-Design-Control-Achieve
d. Plan-Draw-Click-Act
e. None of these are correct.
Answer: b. Plan-Do-Check-Act
Question: Information security professionals report spending a lot of time on
Answer Options:
Political issues
Fixing software bugs
Developing internal security policies, standards and procedures
Researching new technologies
Answer: Developing internal security policies, standards and procedures
Question: A ‘health service risk with risks that outweigh its benefits’ is the definition of which of the following terms?
Answer Options:
a. Abuse
b. Misuse
c. Overuse
d. Underuse
e. Reuse
Answer: c. Overuse
Question: The following are all public insurance programs EXCEPT:
Answer Options:
a. Medicaid
b. Medicare
c. Children’s Health Insurance Program
d. Meaningful Use
Answer: d. Meaningful Use
Question: HIPAA is important to information security for
Answer Options:
Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant Internet outages ever
Driving demand for information security in a large sector of the US economy
Answer: Driving demand for information security in a large sector of the US economy
Question: Which of the following quality improvement techniques helps to identify and organize the possible cause for a problem in a structured format?
Answer Options:
a. Process analysis
b. Process mapping
c. Fishbone diagram
d. Data collection
e. Geographical mapping
Answer: c. Fishbone diagram