jillnoz
Quiz by , created more than 1 year ago

part two of the security coordinator certification

272
0
0
No tags specified
jillnoz
Created by jillnoz almost 9 years ago
Close

Security Coordinator SEC200

Question 1 of 100

1

What three of the four levels is used to describe the Chronicles hierachy?

Select one or more of the following:

  • Master File

  • Contact -item

  • Record

  • Subset

Explanation

Question 2 of 100

1

What are two of the four response types for items?

Select one or more of the following:

  • single

  • multi

  • constant

Explanation

Question 3 of 100

1

There are five valid data types?

Select one of the following:

  • True
  • False

Explanation

Question 4 of 100

1

The .1 Record ID is the 'speical item' required for each record in the master file?

Select one of the following:

  • True
  • False

Explanation

Question 5 of 100

1

A neworked item is an item that stores the item ID of a record in another master file?

Select one of the following:

  • True
  • False

Explanation

Question 6 of 100

1

There are four pieces to a category item, pick three from this list?

Select one or more of the following:

  • category value

  • title

  • synonyms

  • comment

Explanation

Question 7 of 100

1

It is possible to view only a few items for a record within EAVIEWID

Select one of the following:

  • True
  • False

Explanation

Question 8 of 100

1

EAVIEW converts some data types into human readable form. This will also be done for networked record IDs?

Select one of the following:

  • True
  • False

Explanation

Question 9 of 100

1

Record Viewer is available on all Hyperspace menus?

Select one of the following:

  • True
  • False

Explanation

Question 10 of 100

1

Who can find a public report in the Library?

Select one or more of the following:

  • any user

  • users with access

  • administrators

Explanation

Question 11 of 100

1

A private report is one that anyone can run, but only the creator can edit?

Select one of the following:

  • True
  • False

Explanation

Question 12 of 100

1

What is valid unti time mean?

Select one or more of the following:

  • user can re-run the report

  • report has expired

  • call the help desk to get the desired report

Explanation

Question 13 of 100

1

Use the 'save results' option from within the Results Viewer or the the Recent Results. This will save the results of the report to the Saved Results section of my reports.

Select one of the following:

  • True
  • False

Explanation

Question 14 of 100

1

To create a search you, choose the type of search, date and specify item criteria?

Select one of the following:

  • True
  • False

Explanation

Question 15 of 100

1

Name two things Chronicles prompts you to save?

Select one or more of the following:

  • Search conditions

  • Contacts and subset of records

  • date and time

Explanation

Question 16 of 100

1

What happens if required information is missing when creating a new record for an import?

Select one or more of the following:

  • record will not import

  • record imports with error

Explanation

Question 17 of 100

1

Data courier has sizx sending requirements: select build, define pacxkage, calculate dependancies, preview, send, verify?

Select one of the following:

  • True
  • False

Explanation

Question 18 of 100

1

Proactive Query is the process used by data courier to determine if a dependents records CID exists in target environments?

Select one of the following:

  • True
  • False

Explanation

Question 19 of 100

1

Dependency record 'will be sent' records are NOT moved when you click send?

Select one of the following:

  • True
  • False

Explanation

Question 20 of 100

1

User role extensions are a good way to limit a user's access to particular dangerous activities?

Select one of the following:

  • True
  • False

Explanation

Question 21 of 100

1

When a person has a name change, it should only need to be done on the EMP record?

Select one of the following:

  • True
  • False

Explanation

Question 22 of 100

1

The release notes sent out by Epic should be reviewed in case of security changes. It can help an organization prepare for security updates and avoid unanticipated security changes.

Select one of the following:

  • True
  • False

Explanation

Question 23 of 100

1

When a provider leaves your organization, you need to remove his in basket security?

Select one of the following:

  • True
  • False

Explanation

Question 24 of 100

1

A common help desk activity is updating and resetting user passwords?

Select one of the following:

  • True
  • False

Explanation

Question 25 of 100

1

You can only change passwords in Hyperspace?

Select one of the following:

  • True
  • False

Explanation

Question 26 of 100

1

To change a user's license, you should create a new contact in the provider record?

Select one of the following:

  • True
  • False

Explanation

Question 27 of 100

1

A front desk person changes her name. What is the recommended way to update her EMP record (there is ONLY one answer)?

Select one or more of the following:

  • Create new EMP and SER records

  • Create a new EMP record

  • Create a new contact and update the user name in the EMP record directly

Explanation

Question 28 of 100

1

It is recommended that you create new EMP and SER records for providers that need updates to their information?

Select one of the following:

  • True
  • False

Explanation

Question 29 of 100

1

You should always hard delete user and provider records when employees leave your organization in order to keep your system up to date and uncluttered?

Select one of the following:

  • True
  • False

Explanation

Question 30 of 100

1

What are the actions you should take when a provider leaves your organization? (Choose ALL that apply).

Select one or more of the following:

  • Inactivate the provider

  • Block the provider's login

  • Add a subtemplate to remove the provider's In Basket Security

  • Reset the provider's password

Explanation

Question 31 of 100

1

Record and Item Auditing captures data about changed items in any Chronicles master file

Select one of the following:

  • True
  • False

Explanation

Question 32 of 100

1

Which auditing tool captures only desaignated items when enabled?

Select one or more of the following:

  • Record and Item Auditing

  • Change History

  • Access History

  • None

Explanation

Question 33 of 100

1

What is the purpose of Access History?

Select one or more of the following:

  • To capture all changed items

  • To audit a user's interaction with patient activities

  • To prevent a user from accessing patient activities

  • To audit a user's interactions with patient activities and what actions were taken

Explanation

Question 34 of 100

1

Appropriate is checked first when Break the Glass runs?

Select one of the following:

  • True
  • False

Explanation

Question 35 of 100

1

VIPS, employees, minors, inmates are all good examples of patient charts who might need Break the Glass?

Select one of the following:

  • True
  • False

Explanation

Question 36 of 100

1

Which users usually need unrestricted access to all patient charts? (Choose ALL answers that apply).

Select one or more of the following:

  • Physicians

  • Health Information Management Users

  • Pharmacists

  • Respiratory therapists

Explanation

Question 37 of 100

1

Action lists are security checks used to determine access

Select one of the following:

  • True
  • False

Explanation

Question 38 of 100

1

When a user breaks the glass, an action list record is used to determine the follow-up actions.

Select one of the following:

  • True
  • False

Explanation

Question 39 of 100

1

Break the Glass window can display patient information but not user information.

Select one of the following:

  • True
  • False

Explanation

Question 40 of 100

1

What four places can you go in order to configure where Break the Glass messages will be sent?

Select one or more of the following:

  • email

  • shared configuration

  • department

  • location

  • service area

Explanation

Question 41 of 100

1

Patient Event Reports can track access to a specific department?

Select one of the following:

  • True
  • False

Explanation

Question 42 of 100

1

User Event Reports can track one user's access to multiple charts?

Select one of the following:

  • True
  • False

Explanation

Question 43 of 100

1

Department Event Reports can give an overview of Break the Glass events in a single department?

Select one of the following:

  • True
  • False

Explanation

Question 44 of 100

1

Of the choices below, what types of auditing can be categorized as event-based auditing?

Select one or more of the following:

  • Break the Glass

  • Authentication History

  • Change History

  • Item Auditing

Explanation

Question 45 of 100

1

If Dr. Simpson, Bobby's attending provider, accesses his chart by logging into the hosptial med surg department, he would be denied access?

Select one of the following:

  • True
  • False

Explanation

Question 46 of 100

1

If Marty, a therapist who has not seen Bobby yet, but who has logged into the hospital physical therapy department accesses Bobby's chart he will be prompted to break the glass?

Select one of the following:

  • True
  • False

Explanation

Question 47 of 100

1

If Paolo, a registrar logged into the East Clinic to try and access Bobby's chart, he will be denied immediately?

Select one of the following:

  • True
  • False

Explanation

Question 48 of 100

1

Lookback data means that the data stored within the contact will always be different for each contact?

Select one of the following:

  • True
  • False

Explanation

Question 49 of 100

1

What happens when a dependency not currently in the target environment is found for a record you are preparing to migrate?

Select one or more of the following:

  • Nothing - the system assumes that all dependencies are already in the target environments

  • The system will calculate the dependencies needed and add them to list to migrate

  • The system will abort the migration. Dependancies must be sent before the intended record is set

  • The system wiil calculate the dependancies needed but will not add them to the list to migrate

Explanation

Question 50 of 100

1

When adding data to an import spreadsheet, what is the effet of putting an asterick in Field 1? choose all that apply.

Select one or more of the following:

  • The import will automatically generate a local ID (.1) for the imported records

  • The import will automatically look up the existing record's local id (.1) based on the record's Name (.2)

  • The import will create a new record

  • The flat file will be automatically generate a local ID (.1) for the imported record

Explanation

Question 51 of 100

1

When a mistake is found during the import process (either during scan or import), where should one go to fix the data?

Select one or more of the following:

  • Import spreadsheet

  • Flat file

  • Import Specifications

Explanation

Question 52 of 100

1

As of Epic 2014 release, all master files can be moved by the Data Courier.

Select one of the following:

  • True
  • False

Explanation

Question 53 of 100

1

Which activity an one use to determine why a record (or category entry) is unable to be selected with the Data Courier? (choose only one answer)

Select one or more of the following:

  • Preview report

  • Quick Check

  • Data Dictionary in Chronicles

  • Evaluate Records

Explanation

Question 54 of 100

1

After running the Proactive Query (by clicking Calculate Dependancies) which type of dependent records will be automatically added tothe Will be Sent section? (choose only one answer)

Select one or more of the following:

  • Epic release records

  • Records which already exist on the target environment

  • Records which do not exist on the target environment, but the user has the ability to send

  • Records which do not exist on the target environment, but the user does NOT have the ability to send

Explanation

Question 55 of 100

1

Which record type would be added if Rose, a registrar, requests that the Patient Station button be added to her Hyperspace toolbar? (Choose only one answer)

Select one or more of the following:

  • Add an item to the menu

  • Add a Menu to an item

  • Add a Sub Menu to an item

  • Add a sub menu to a menu

Explanation

Question 56 of 100

1

Which of the following can you find with Menu Summary, choose ALL that apply

Select one or more of the following:

  • A user's role

  • A menu's descriptor

  • The current activity a user is looking at

Explanation

Question 57 of 100

1

Which of the following response types can contain multiple lines?

Select one or more of the following:

  • Single

  • Multiple

  • Related

  • Related Multiple

Explanation

Question 58 of 100

1

When looking at a text side entry screen, which of the following methods can you use to find the current field's INI and Item Number?

Select one or more of the following:

  • Shift + F7

  • Shift + F5

  • Home, F8

  • Control + Click

Explanation

Question 59 of 100

1

When setting up a Reporting Workbench Report, where can you configure the items you would like to search on? (Choose only ONE answer)

Select one or more of the following:

  • Criteria Tab

  • Appearance Tab

  • Display Tab

  • General Tab

Explanation

Question 60 of 100

1

What is saved in a Subset after an Ad Hoc Search? Choose only ONE answer

Select one or more of the following:

  • Record selection method

  • Contact selection method

  • Records and contacts found in the search

  • Search conditions (and Boolean logic)

  • The display format

Explanation

Question 61 of 100

1

In an Ad Hoc Search how can I search for information not about the current record, but about another record the current record is NETWORKED to? Choose only one answer.

Select one or more of the following:

  • Write down the list of all networked records and do a second search on them

  • Use as slash (/) to look at the Networked record

  • Save a subset of all networked records and do a second search on them

Explanation

Question 62 of 100

1

An SER record is a good example of a NOT over time record

Select one of the following:

  • True
  • False

Explanation

Question 63 of 100

1

For visits (the PRC) is not over time because of the types of visits themselves do not change?

Select one of the following:

  • True
  • False

Explanation

Question 64 of 100

1

How many contacts could be in a NOT OVER TIME master file?

Select one or more of the following:

  • One

  • Three

  • Five

Explanation

Question 65 of 100

1

How many contacts could be in an OVER TIME master file?

Select one or more of the following:

  • Only one

  • As many as you need

  • Limited to 5

Explanation

Question 66 of 100

1

Networking specifies relationships between one item to another, frequently in a different database

Select one of the following:

  • True
  • False

Explanation

Question 67 of 100

1

Lookback values change frequently and hold only the current values.

Select one of the following:

  • True
  • False

Explanation

Question 68 of 100

1

Data Courier maintains Referential Integrity, ensuring networked items point to records which also exist. This is the preferred method of moving data.

Select one of the following:

  • True
  • False

Explanation

Question 69 of 100

1

The CID is a unique record ID or category ID that is shared across all environments that communicate through the Data Courier

Select one of the following:

  • True
  • False

Explanation

Question 70 of 100

1

CIDs and UCIs have two pieces

Select one or more of the following:

  • Environment prefix

  • Incremental Number

  • Local ID

Explanation

Question 71 of 100

1

Data courier moves records and categories

Select one of the following:

  • True
  • False

Explanation

Question 72 of 100

1

Data Courier is a way to move code from environment to environment

Select one of the following:

  • True
  • False

Explanation

Question 73 of 100

1

Proactive Query determines which records dependencies are sent through Data Courier

Select one of the following:

  • True
  • False

Explanation

Question 74 of 100

1

Every user must have a role to log in. Without one, Epic cannot determine the layout of Hyperspace

Select one of the following:

  • True
  • False

Explanation

Question 75 of 100

1

A menu is defined as the Epic Button in a set order

Select one of the following:

  • True
  • False

Explanation

Question 76 of 100

1

What is the INI file for Menus?

Select one or more of the following:

  • E2U

  • ECL

  • EMP

  • E2R

Explanation

Question 77 of 100

1

When looking at EDMAINAPPMENU it controls?

Select one or more of the following:

  • Users toolbox

  • Epic Button

  • Fixed toolbar

Explanation

Question 78 of 100

1

When looking at EDUSERTOOLBAR it represents?

Select one or more of the following:

  • Epic Button

  • User toolbar

  • Fixed Toolbar

Explanation

Question 79 of 100

1

When looking at EDFIXEDTOOLBAR it represents?

Select one or more of the following:

  • Epic button

  • Users Toolbar

  • Fixed Toolbar

Explanation

Question 80 of 100

1

Security Coordinator as part of ongoing maintenace prepares the organization for security upgrades, by reviewing release notes.

Select one of the following:

  • True
  • False

Explanation

Question 81 of 100

1

Security Workground assists with maintaining security classes and templates for their application.

Select one of the following:

  • True
  • False

Explanation

Question 82 of 100

1

The security group maintains the EMP and SER records for users at your organization?

Select one of the following:

  • True
  • False

Explanation

Question 83 of 100

1

Nova is Epic's hosted release note management tool used to track and follow up on release notes and FYIs

Select one of the following:

  • True
  • False

Explanation

Question 84 of 100

1

One of your nurses has decided to leave your organization to go to medical school to become a physician. Select what you would do to modify his EMP record.

Select one or more of the following:

  • Block User's Login

  • Add subtemplate that does not contain an In Baskeet Security Class

  • Add a new contact

Explanation

Question 85 of 100

1

Last week one of your physicians earned her PhD. Which things would you do to indicate this as part of her credentials?

Select one or more of the following:

  • Change her license for display in the SER

  • Add a new contact

  • Change User Name

Explanation

Question 86 of 100

1

At your organization, the security coordinator is in charge of handling all release notes. As you prepare for the approaching upgrade slated for the end of the year, what actions should you take to ensure the success of the upgrade?

Select one or more of the following:

  • Use Nova to read and take action

  • Update, build, test, migrate, test

  • Inactivate all users until the upgrade is complete

Explanation

Question 87 of 100

1

You have a unit clerk who is leaving your organization at the end of the month to get married and move to Hawaii. What action should you take to indicate this change to your system?

Select one or more of the following:

  • Set an end date

  • Add former name to alias field

  • Block her login today

Explanation

Question 88 of 100

1

You have a user who just returned from three months of maternity leave who cannot remember her password to log into the system. Your organization does not use an LDAP server. What do you do?

Select one or more of the following:

  • Reset her password elsewhere

  • Set her to active again

  • Add a contact

Explanation

Question 89 of 100

1

The Help Desk should be the department most interested in your auditing?

Select one of the following:

  • True
  • False

Explanation

Question 90 of 100

1

What are the tools for Event-Based Auditing?

Select one or more of the following:

  • Authentication History

  • Access History

  • Break the Glass

  • Record Auditing

Explanation

Question 91 of 100

1

Authentication History is used to track just unsuccessful logins by a user.

Select one of the following:

  • True
  • False

Explanation

Question 92 of 100

1

Access History is used to track a user's access to data

Select one of the following:

  • True
  • False

Explanation

Question 93 of 100

1

There are two tools that fall under Static Auditing

Select one or more of the following:

  • Item Auditing

  • Record Auditing

  • Authentication Auditing

Explanation

Question 94 of 100

1

All data is protected by BTG

Select one of the following:

  • True
  • False

Explanation

Question 95 of 100

1

Break the glass is a technical system for controlling access to PHI

Select one of the following:

  • True
  • False

Explanation

Question 96 of 100

1

If you keep bumping the glass enough we will eventually give you access

Select one of the following:

  • True
  • False

Explanation

Question 97 of 100

1

This check will either give or deny access to the entire patient's chart?

Select one or more of the following:

  • Record Level Check

  • Contact Level Check

Explanation

Question 98 of 100

1

This level check will give or deny access to a particular encounter or contact within a chart

Select one or more of the following:

  • Record Level Check

  • Contact Level Check

Explanation

Question 99 of 100

1

Department Event Report specific to a department's break the glass events over time.

Select one of the following:

  • True
  • False

Explanation

Question 100 of 100

1

Patient Event Reports can track access to multiple charts

Select one of the following:

  • True
  • False

Explanation