Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Certified HIPAA Professional Question and Answers

Certified HIPAA Professional

Last Update May 18, 2024
Total Questions : 160

We are offering FREE HIO-201 HIPAA exam questions. All you do is to just go and sign up. Give your details, prepare HIO-201 free exam questions and then go for complete pool of Certified HIPAA Professional test questions that will help you more.

HIO-201 pdf

HIO-201 PDF

$35  $99.99
HIO-201 Engine

HIO-201 Testing Engine

$42  $119.99
HIO-201 PDF + Engine

HIO-201 PDF + Testing Engine

$56  $159.99
Questions 1

Use or disclosure of Protected Health Information (PHI) for Treatment, Payment, and Health care Operations (TPO) is:

Options:

A.  

Limited 1o the minimum necessary to accomplish the intended purpose.

B.  

Left to the professional judgment and discretion of the requestor.

C.  

Controlled totally by the requestor's pre-existing authorization document.

D.  

Governed by industry "best practices" regarding use

E.  

Left in force for eighteen (18) years.

Discussion 0
Questions 2

Select the best statement regarding the definition of protected health information (PHI).

Options:

A.  

PHI includes all individually identifiable health information (IIHI).

B.  

PHI does not include physician's hand written notes about the patient's treatment.

C.  

PHI does not include PHI stored on paper.

D.  

PHI does not include PHI in transit.

E.  

PHI includes de-identified health information

Discussion 0
Questions 3

Signed authorization forms must be retained:

Options:

A.  

Indefinitely, because the life of a signed authorization isindefinite.

B.  

Six (6) years from the time it expires.

C.  

For as long as the patient's records are kept.

D.  

Until it is specifically revoked by the individual.

E.  

Ten (10) years from the date it was signed.

Discussion 0
Questions 4

Encryption is included as an addressable implementation specification under which security rule standard?

Options:

A.  

Information Access Management

B.  

Security Management Process

C.  

Evaluation

D.  

Transmission Security

E.  

Device and Media Controls

Discussion 0
Questions 5

Conducting an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic PHI is:

Options:

A.  

Risk Analysis

B.  

Risk Management

C.  

Access Establishment and Modification

D.  

Isolating Health care Clearinghouse Function

E.  

Information System Activity Review

Discussion 0
Questions 6

The security standard that has the objective of implementing mechanisms to record and examine system activity is:

Options:

A.  

Access Control

B.  

Audit Controls

C.  

Authorization Controls

D.  

Data Authentication

E.  

Person or Entity Authentication

Discussion 0
Questions 7

Select the best statement regarding the definition of a business associate of a covered entity. A business associate is:

Options:

A.  

A person who acts on behalf of a non-covered entity.

B.  

A person who's function may involve claims processing, administration, data analysis or practice management with access to PHI.

C.  

A person who is a member of the covered entity's workforce.

D.  

A clearinghouse.

E.  

A person that performs or assists in the performance of a function or activity that involves the use or disclosure of de-identified health information.

Discussion 0
Questions 8

This transaction type may be used in three ways:

1) Reply to a Health Care Claim Status Request.

2) Unsolicited notification of a health care claim status.

3) Request for additional information about a health care claim.

Options:

A.  

837.

B.  

820.

C.  

277.

D.  

835.

E.  

278.

Discussion 0
Questions 9

HIPAA transaction standards apply to:

Options:

A.  

Employee drug tests.

B.  

Health component of auto insurance.

C.  

Stored health information data.

D.  

Eligibility inquiries.

E.  

Non-reimbursed employee medical expenses.

Discussion 0
Questions 10

In terms of Security, the best definition of "Access Control" is:

Options:

A.  

A list of authorized entities, together with their access rights.

B.  

Corroborating your identity.

C.  

The prevention of an unauthorized use of a resource.

D.  

Proving that nothing regarding your identity has been altered

E.  

Being unable to deny you took pan in a transaction.

Discussion 0
Questions 11

The transaction number assigned to the Benefit Enrollment and Maintenance transaction is:

Options:

A.  

270

B.  

276

C.  

278

D.  

280

E.  

834

Discussion 0
Questions 12

Select the correct statement regarding code sets and identifiers.

Options:

A.  

A covered entity must use the applicable code set that is valid at the time the transaction is initiated.

B.  

April 14, 2003 is the compliance date for implementation of the National Provider Identifier.

C.  

CMS is responsible for updating the CPT-4 code set.

D.  

An organization that assigns NPIs is referred to as National Provider for Identifiers.

E.  

HHS assigns the Employer Identification Number (EIN), which has been selected as the National Provider Identifier for Health Care.

Discussion 0
Questions 13

Processes enabling an enterprise to restore any lost data in the event of fire, vandalism, natural disaster, or system failure are defined under:

Options:

A.  

Risk Analysis

B.  

Contingency Operations

C.  

Emergency Mode Operation Plan

D.  

Data Backup Plan

E.  

Disaster Recover Plan

Discussion 0
Questions 14

The code set that must be used to describe or identify dentists services and procedures is:

Options:

A.  

ICD-9-CM, Volumes 1 and 2

B.  

CPT-4

C.  

CDT

D.  

ICD-9-CM, Volume 3

E.  

HCPCS

Discussion 0
Questions 15

Which one of the following is a required implementation specification of the Security Management Process?

Options:

A.  

Risk Analysis

B.  

Access Control and Validation Procedures

C.  

Integrity Controls

D.  

Access Authorization

E.  

Termination Procedures

Discussion 0
Questions 16

Information in this transaction is generated by the payer's adjudication system:

Options:

A.  

Eligibility (270/271)

B.  

Premium Payment (820)

C.  

Unsolicited Claim Status (277)

D.  

Remittance Advice (835)

E.  

Functional Acknowledgment (997)

Discussion 0
Questions 17

The Health Care Claim Status Response (277) can be used in a number of ways. Select the correct usage.

Options:

A.  

As a response to a health care claim status request

B.  

As a health care claim payment advice

C.  

Electronic funds transfer

D.  

As a request for health care claims status

E.  

Request for the psychotherapy notes of a patient

Discussion 0
Questions 18

Physical safeguards using media controls do not include procedures to:

Options:

A.  

Control access to tapes, floppies, and re-writeable CDs.

B.  

Track the access of record able media.

C.  

Dispose of storage devices.

D.  

Backup copies of health information.

E.  

Prohibit alteration of health information.

Discussion 0
Questions 19

A pharmacist is approached by an individual and asked a question about an over-the-counter medication. The pharmacist needs some protected health information (PHI) from the individual to answer the question. The pharmacist will not be creating a record of this interaction. The Privacy Rule requires the pharmacist to:

Options:

A.  

Verbally request 3 consent and offer a copy of the Notice of Privacy Practices.

B.  

Verbally request specific authorization for the PHI.

C.  

Do nothing more.

D.  

Obtain the signature of the patient on their Notice of Privacy Practices.

E.  

Not respond to the request without an authorization from the primary physician.

Discussion 0
Questions 20

ANSI X12 specifies the use of a (an):

Options:

A.  

Simple flat file structure for transactions.

B.  

Envelope structure for transactions.

C.  

Employer identifier.

D.  

Health plan identifier

E.  

Provider identifier.

Discussion 0
Questions 21

Select the best statement regarding organized health care arrangements (OHCA).

Options:

A.  

An organized health care arrangement is a clinically integrated setting in which patients receive care from multiple providers.

B.  

Independent providers participating in an organized health care arrangement are business associates of each other.

C.  

An example of an OHCA is a nurse employed in a physician's office.

D.  

An example of an OHCA is a laboratory attached to a physician's office.

E.  

An example of an OHCA is a health insurance company and its affiliated life insurancecompany.

Discussion 0
Questions 22

Which of the following was not established under the Administrative Simplification title?

Options:

A.  

National PKI Identifier.

B.  

National Standard Health Care Provider Identifier.

C.  

National Standard Employer Identifier.

D.  

Standards for Electronic Transactions and Code Sets.

E.  

Security Rule.

Discussion 0
Questions 23

When limiting protected health information (PHI) to the minimum necessary for a use or disclosure, a covered entity can use:

Options:

A.  

Their professional judgment and standards.

B.  

The policies set by the security rule for the protection of the information.

C.  

Specific guidelines set by WEDI.

D.  

Measures that are expedient and reduce costs.

E.  

The information for research and marketing purposes only.

Discussion 0
Questions 24

This requires records of the movement of hardware and electronic media that contain PHI.

Options:

A.  

Business Associate Contract

B.  

Data Backup Plan

C.  

Media Re-use

D.  

Disposal

E.  

Accountability

Discussion 0