ExamGecko
Home Home / ISC / HCISPP

ISC HCISPP Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

A.
Document the system as high risk
A.
Document the system as high risk
Answers
B.
Perform a vulnerability assessment
B.
Perform a vulnerability assessment
Answers
C.
Perform a quantitative threat assessment
C.
Perform a quantitative threat assessment
Answers
D.
Notate the information and move on
D.
Notate the information and move on
Answers
Suggested answer: B

A health care provider is considering Internet access for their employees and patients. Which of the following is the organization's MOST secure solution for protection of data?

A.
Public Key Infrastructure (PKI) and digital signatures
A.
Public Key Infrastructure (PKI) and digital signatures
Answers
B.
Trusted server certificates and passphrases
B.
Trusted server certificates and passphrases
Answers
C.
User ID and password
C.
User ID and password
Answers
D.
Asymmetric encryption and User ID
D.
Asymmetric encryption and User ID
Answers
Suggested answer: A

Which of the BEST internationally recognized standard for evaluating security products and systems?

A.
Payment Card Industry Data Security Standards (PCI-DSS)
A.
Payment Card Industry Data Security Standards (PCI-DSS)
Answers
B.
Common Criteria (CC)
B.
Common Criteria (CC)
Answers
C.
Health Insurance Portability and Accountability Act (HIPAA)
C.
Health Insurance Portability and Accountability Act (HIPAA)
Answers
D.
Sarbanes-Oxley (SOX)
D.
Sarbanes-Oxley (SOX)
Answers
Suggested answer: B

The threat modeling identifies a man-in-the-middle (MITM) exposure. Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?

A.
Auditing
A.
Auditing
Answers
B.
Anonymization
B.
Anonymization
Answers
C.
Privacy monitoring
C.
Privacy monitoring
Answers
D.
Data retention
D.
Data retention
Answers
Suggested answer: B

Which of the following is considered the last line defense in regard to a Governance, Risk managements, and compliance (GRC) program?

A.
Internal audit
A.
Internal audit
Answers
B.
Internal controls
B.
Internal controls
Answers
C.
Board review
C.
Board review
Answers
D.
Risk management
D.
Risk management
Answers
Suggested answer: B

Which of the following is the BEST example of weak management commitment to the protection of security assets and resources?

A.
poor governance over security processes and procedures
A.
poor governance over security processes and procedures
Answers
B.
immature security controls and procedures
B.
immature security controls and procedures
Answers
C.
variances against regulatory requirements
C.
variances against regulatory requirements
Answers
D.
unanticipated increases in security incidents and threats
D.
unanticipated increases in security incidents and threats
Answers
Suggested answer: A

Which of the following is the BEST reason for the use of security metrics?

A.
They ensure that the organization meets its security objectives.
A.
They ensure that the organization meets its security objectives.
Answers
B.
They provide an appropriate framework for Information Technology (IT) governance.
B.
They provide an appropriate framework for Information Technology (IT) governance.
Answers
C.
They speed up the process of quantitative risk assessment.
C.
They speed up the process of quantitative risk assessment.
Answers
D.
They quantify the effectiveness of security processes.
D.
They quantify the effectiveness of security processes.
Answers
Suggested answer: B

Which of the following is the BEST reason for writing an information security policy?

A.
To support information security governance
A.
To support information security governance
Answers
B.
To reduce the number of audit findings
B.
To reduce the number of audit findings
Answers
C.
To deter attackers
C.
To deter attackers
Answers
D.
To implement effective information security controls
D.
To implement effective information security controls
Answers
Suggested answer: A

A covered healthcare provider which a direct treatment relationship with an individual need not:

A.
provide the notice no later than the date of the first service delivery, including service delivered electronically
A.
provide the notice no later than the date of the first service delivery, including service delivered electronically
Answers
B.
have the notice available at the service delivery site for individuals to request and keep
B.
have the notice available at the service delivery site for individuals to request and keep
Answers
C.
get a acknowledgement of the notice from each individual on stamped paper
C.
get a acknowledgement of the notice from each individual on stamped paper
Answers
D.
post the notice in a clear and prominent location where it is reasonable to expect individuals seeking service from the covered healthcare provider to be able to read it
D.
post the notice in a clear and prominent location where it is reasonable to expect individuals seeking service from the covered healthcare provider to be able to read it
Answers
Suggested answer: C

Health Information Rights although your health record is the physical property of the healthcare practitioner or facility that compiled it, the information belongs to you. You do not have the right to:

A.
obtain a paper copy of the notice of information practices upon request inspect and obtain a copy of your health record as provided for in 45 CFR 164.524
A.
obtain a paper copy of the notice of information practices upon request inspect and obtain a copy of your health record as provided for in 45 CFR 164.524
Answers
B.
request a restriction on certain uses and disclosures of your information outside the terms as provided by 45 CFR 164.522
B.
request a restriction on certain uses and disclosures of your information outside the terms as provided by 45 CFR 164.522
Answers
C.
amend your health record as provided in 45 CFR 164.528 obtain an accounting of disclosures of your health information as provided in 45 CFR 164.528
C.
amend your health record as provided in 45 CFR 164.528 obtain an accounting of disclosures of your health information as provided in 45 CFR 164.528
Answers
D.
revoke your authorization to use or disclose health information except to the extent that action has already been taken
D.
revoke your authorization to use or disclose health information except to the extent that action has already been taken
Answers
Suggested answer: B
Total 305 questions
Go to page: of 31