Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

HIO-201 Certified HIPAA Professional Questions and Answers

Questions 4

The National Provider File (NPF) includes information such as:

Options:

A.

Effective date.

B.

CPT-4.

C.

CDT.

D.

ICD-9-CM.

E.

Enrollment date.

Buy Now
Questions 5

Which of the following is NOT a HIPAA national health care identifier?

Options:

A.

National Provider Identifier (NPI)

B.

Social Security Number (SSN)

C.

National Health Plan Identifier (PlanID)

D.

National Employer Identifier for Health Care (EIN)

E.

National Health Identifier for Individuals (NHII)

Buy Now
Questions 6

A health care clearinghouse is an entity that:

Options:

A.

Requires PKI for the provider and the patient.

B.

Is exempt from HIPAA regulations.

C.

Is a not-for-profit operation.

D.

Identifies all hospitals and health care organizations.

E.

Performs the functions of format translation and data conversion.

Buy Now
Questions 7

A business associate must agree to:

Options:

A.

Report to the covered entity any security incident of which it becomes aware

B.

Ensure the complete safety of all electronic protected health information

C.

Compensate the covered entity for penalties incurred because of the business associate's security incidents.

D.

Register as a business associate with HHS

E.

Submit to periodic audits by HHS of critical systems containing electronic protected health information

Buy Now
Questions 8

An Electronic Medical Record (EMR):

Options:

A.

Is another name for the Security Ruling.

B.

Requires the use of biometrics for access to records.

C.

Is electronically stored information about an individual's health status and health care.

D.

Identifies all hospitals and health care organizations.

E.

Requires a PKI for the provider and the patient.

Buy Now
Questions 9

Health information is protected by the Privacy Rule as long as:

Options:

A.

The authorization has been revoked by the physician.

B.

The patient remains a citizen of the United States.

C.

The information is under the control of HHS.

D.

The information is in the possession of a covered entity.

E.

The information is not also available on paper forms.

Buy Now
Questions 10

The best example of a party that would use the 835 - Health Care Claim Payment/Advice transaction is:

Options:

A.

HHS.

B.

A community health management information system.

C.

Health statistics collection agency.

D.

Government agency

E.

Insurance Company.

Buy Now
Questions 11

Individually identifiable health information (IIHI) includes information that is:

Options:

A.

Transmitted to a business associate for payment purposes only.

B.

Stored on a smart card only by the patient.

C.

Created or received by a credit company that provided a personal loan for surgical procedures.

D.

Created or received by a health care clearinghouse for claim processing.

E.

Requires the use of biometrics for access to records.

Buy Now
Questions 12

The transaction number assigned to the Benefit Enrollment and Maintenance transaction is:

Options:

A.

270

B.

276

C.

278

D.

280

E.

834

Buy Now
Questions 13

The code set that must be used to describe or identify inpatient hospital services and surgical procedures is:

Options:

A.

ICD-9-CM, Volumes land 2

B.

CPT-4

C.

CDT

D.

ICD-9-CM, Volume 3

E.

HCPCS

Buy Now
Questions 14

Performing a periodic review in response to environmental or operational changes affecting the security of electronic protected health information is called:

Options:

A.

Transmission Security

B.

Evaluation

C.

Audit Control

D.

Integrity

E.

Security Management Process

Buy Now
Questions 15

A State insurance commissioner is requesting specific, individually identifiable information from an insurer as a part of a routine review of the insurer's practices. What must the insurer do to deidentify the information?

Options:

A.

The protected health information must be removed from the information. A substitute "key" may be supplied to allow re-identification, if needed.

B.

Limit the information to coverage, dates of treatment, and payment amounts to avoid collecting any protected data.

C.

Nothing. An oversight agency has the right to access this information without prior authorization.

D.

Request that the insurance commissioner ask for an exception from HIPAA from the Department of Health and Human Services.

E.

A written authorization is required from the patient.

Buy Now
Questions 16

Under the Privacy Rule, an individual may request a covered provider to restrict routine use or disclosure beyond what exists in the provider's Notice of Privacy Practices. Upon that request, the provider.

Options:

A.

Must store the information in an encrypted formal.

B.

May refuse the request but still offer treatment.

C.

Must comply within seventy-five (75) days.

D.

Must only transfer the information using the ASC XI2 format specification.

E.

Can request binding arbitration.

Buy Now
Questions 17

When limiting protected health information (PHI) to the minimum necessary for a use or disclosure, a covered entity can use:

Options:

A.

Their professional judgment and standards.

B.

The policies set by the security rule for the protection of the information.

C.

Specific guidelines set by WEDI.

D.

Measures that are expedient and reduce costs.

E.

The information for research and marketing purposes only.

Buy Now
Questions 18

Which of the following is NOT a correct statement regarding HIPAA requirements?

Options:

A.

A coveted entity must change its policies and procedures to complywith HIPPPregulations, standards, and implementation specifications.

B.

A covered entity must reasonably safeguard PHI from any intentional or unintentional use or disclosure that is in violation of the regulations.

C.

A covered entity must provide a process for individuals to make complaints concerning privacy issues.

D.

A covered entity must document all complaints received regarding privacy issues.

E.

The Privacy Rule requires that the covered entity has a documented security policy.

Buy Now
Questions 19

Ensuring that physical access to electronic information systems and the facilities in which they are housed is limited, is addressed under which security rule standard?

Options:

A.

Security Management Process

B.

Transmission Security

C.

Person or Entity Authentication

D.

Facility Access Controls

E.

Information Access Management

Buy Now
Questions 20

Which of the following is a required implementation specification associated with the Contingency Plan Standard?

Options:

A.

Integrity Controls

B.

Access Control and Validation Procedures

C.

Emergency Mode Operation

D.

Plan Response and Reporting

E.

Risk Analysis

Buy Now
Questions 21

Which of the following is example of "Payment" as defined in the HIPAA regulations?

Options:

A.

Annual Audits

B.

Claims Management

C.

Salary disbursement to the workforce having direct treatment relationships.

D.

Life Insurance underwriting

E.

Cash given to the pharmacist for the purchase of an over-the-counter drug medicine

Buy Now
Questions 22

Select the best statement regarding the definition of the term "use" as used by the HIPAA regulations.

Options:

A.

"Use" refers to the release, transfer, or divulging of IIHI between various covered entities

B.

"Use" refers to adding, modifying and deleting the PHI by other covered entities.

C.

"Use" refers to utilizing, examining, or analyzing IIHI within the covered entity

D.

"Use" refers to the movement of de-identified information within an organization.

E.

"Use" refers to the movement of information outside the entity holding the information

Buy Now
Questions 23

This Security Standard addresses the proper functions to be performed on a specific workstation as well as the physical attributes of its surroundings.

Options:

A.

Information Access Management

B.

Workstation Security

C.

Access Control

D.

Facility Access Controls

E.

Workstation Use

Buy Now
Questions 24

ANSI ASC X12 is the standard for:

Options:

A.

Security requirements.

B.

Privacy requirements.

C.

Is another name for the Security Rule.

D.

Representation of all health care claims.

E.

Encrypting all information for use over a PKI.

Buy Now
Exam Code: HIO-201
Exam Name: Certified HIPAA Professional
Last Update: May 8, 2024
Questions: 160

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now HIO-201 testing engine

PDF (Q&A)

$35  $99.99
buy now HIO-201 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 09 May 2024