Question: The Morris worm is well known in the information security literature for

Answer Options:
Falsification of financial records at publicly traded companies
Intruding into a number of high profile computer installations
Causing one of the most significant Internet outages ever
Stealing commercial information by exploiting weakness in wireless networks

Answer: Causing one of the most significant Internet outages ever

 

Question: Medical technicians calculate the amount of time it took for clinicians to produce their reports. This is an example of which part of the DMAIC process?

Answer Options:
a. Define
b. Measure
c. Analyze
d. Improve
e. Control

Answer: b. Measure

 

Question: The term ‘effectiveness’ of clinical care can be addressed with which of the following questions?

Answer Options:
a. Are things done?
b. Are the right things done?
c. What are the right things to do?
d. Was the clinical procedure done correctly?
e. None of these are correct.

Answer: b. Are the right things done?

 

Question: Windows 95 is important to information security for

Answer Options:
Stealing commercial information by exploiting weakness in wireless networks
Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant Internet outages ever

Answer: Popularizing computers among the masses

 

Question: Which of the following laws have had a major impact on social insurance in the U.S.?

Answer Options:
a. Social Security Act of 1935
b. Patient Protection and Affordable Care Act
c. Medicare Prescription Drug, Improvement, and Modernization Act
d. All of these are correct
e. None of these are correct.

Answer: d. All of these are correct

 

Question: Information security is defined as

Answer Options:
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide incentives, confidence and avoidance
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide intelligence, control and evidence
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide insights, competence and advantage
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability

Answer: Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability

 

Question: Many of those who are uninsured:

Answer Options:
a. Are workers who are employed in industries that do not provide health insurance
b. Do not have access to routine health care
c. Are American citizens
d. All of these are correct.

Answer: d. All of these are correct.

 

Question: The team tests the proposed solution, documents the amount time their solution has saved, and makes sure the solution is sustainable. This is an example of which part of the DMAIC process?

Answer Options:
a. Define
b. Measure
c. Analyze
d. Improve
e. Control

Answer: e. Control

 

Question: Thinking (T) People (MBTI):

Answer Options:
a. Like working in harmonious needs
b. Value fairness and like clear objectives
c. Are detail-oriented and trust facts
d. Find energy in things and people
e. All of the above

Answer: b. Value fairness and like clear objectives

 

Question: Medicaid is a program that is:

Answer Options:
a. A partnership between the federal government and the states
b. The same in each state
c. Covers adults over 65
d. Provides coverage to all children adults under the Federal Poverty Line

Answer: a. A partnership between the federal government and the states

 

Question: What do the four letters in the PDCA Model represent?

Answer Options:
a. Plan-Design-Check-Act
b. Plan-Do-Check-Act
c. Plan-Design-Control-Achieve
d. Plan-Draw-Click-Act
e. None of these are correct.

Answer: b. Plan-Do-Check-Act

 

Question: Information security professionals report spending a lot of time on

Answer Options:
Political issues
Fixing software bugs
Developing internal security policies, standards and procedures
Researching new technologies

Answer: Developing internal security policies, standards and procedures

 

Question: A ‘health service risk with risks that outweigh its benefits’ is the definition of which of the following terms?

Answer Options:
a. Abuse
b. Misuse
c. Overuse
d. Underuse
e. Reuse

Answer: c. Overuse

 

Question: The following are all public insurance programs EXCEPT:

Answer Options:
a. Medicaid
b. Medicare
c. Children’s Health Insurance Program
d. Meaningful Use

Answer: d. Meaningful Use

 

Question: HIPAA is important to information security for

Answer Options:
Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant Internet outages ever
Driving demand for information security in a large sector of the US economy

Answer: Driving demand for information security in a large sector of the US economy

 

Question: Which of the following quality improvement techniques helps to identify and organize the possible cause for a problem in a structured format?

Answer Options:
a. Process analysis
b. Process mapping
c. Fishbone diagram
d. Data collection
e. Geographical mapping

Answer: c. Fishbone diagram