Download Certified HIPAA Professional.HIO-201.Test4Prep.2018-06-30.95q.vcex

Vendor: HIPAA
Exam Code: HIO-201
Exam Name: Certified HIPAA Professional
Date: Jun 30, 2018
File Size: 73 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
The National Provider File (NPF) includes information such as:
  1. Effective date
  2. CPT-4
  3. CDT
  4. ICD-9-CM
  5. Enrollment date
Correct answer: A
Question 2
This transaction type is a “response” transaction that may include information such as accepted/rejected claim, approved claim(s) pre-payment, or approved claim(s) post-payment:
  1. 270.
  2. 820.
  3. 837.
  4. 277.
  5. 278.
Correct answer: D
Question 3
The code set that must be used to describe or identify outpatient physician services and procedures is:
  1. lCD-SCM, Volumes 1 and 2
  2. CPT-4
  3. CDT
  4. lCD-SCM, Volume 3
  5. NDC
Correct answer: B
Question 4
The Security Incident Procedures standard requires just one implementation specification. That implementation specification is:
  1. Termination Procedures
  2. Automatic Logoff
  3. Emergency Access Procedure
  4. Contingency Operations
  5. Response and Reporting
Correct answer: E
Question 5
A hospital is preparing a file of treatment information for the state of California. 
This file is to be sent to external medical researchers. The hospital has removed SSN, name, phone and other information that specifically identifies an individual. However, there may still be data in the file that potentially could identify the individual. Can the hospital claim ‘safe harbor” and release the file to the researchers?
  1. Yes the hospital’s actions satisfy the “safe harbor” method of de-identification.
  2. No - a person with appropriate knowledge and experience must determine that the information that remains can identify an individual.
  3. No - authorization to release the information is still required by HIPAA.
  4. No - to satisfy “safe harbor the hospital must also have no knowledge of a way to use the remaining data to identify an individual.
  5. Yes - medical researchers are covered entities and “research” is considered a part of “treatment” by HIPAA.
Correct answer: D
Question 6
Which of the following is NOT a HIPAA national health care identifier?
  1. National Provider Identifier (NPI)
  2. Social Security Number (SSN)
  3. National Health Plan Identifier (PlanID)
  4. National Employer Identifier for Health Care (EIN)
  5. National Health Identifier for Individuals (NI-UI)
Correct answer: B
Question 7
Select the correct statement regarding code sets and identifiers.
  1. A covered entity must use the applicable code set that is valid at the time the transaction is initiated.
  2. April 14, 2003 is the compliance date for implementation of the National Provider Identifier.
  3. CMS is responsible for updating the CPT-4 code sets.
  4. An organization that assigns NPIs is referred to as National Provider for Identifiers.
  5. HHS assigns the Employer Identification Number (EIN), which has been selected as the National Provider Identifier for Health Care.
Correct answer: A
Question 8
This security standard requires that the covered entity establishes agreements with each organization with which it exchanges data electronically, protecting the security of all such data:
  1. Security incident Procedures
  2. Integrity
  3. Person or Entity Authentication
  4. Assigned Security Responsibility
  5. Business Associate Contracts and other Arrangements
Correct answer: E
Question 9
Select the FALSE statement regarding code sets and identifiers.
  1. The CPT-4 code set is maintained by the American Medical Association (AMA).
  2. A covered entity must use the applicable medical code set that is valid at the time the health care is delivered.
  3. The National Provider Identifier (NPI) will be assigned by the National Provider System (NPS).
  4. The Centers for Medicare and Medicaid Services is responsible for updating the HCPCS code set.
  5. The National Provider Identifier (NPI) will be assigned to health plans.
Correct answer: E
Question 10
The Data Backup Plan is part of which Security Standard?
  1. Contingency Plan
  2. Evaluation
  3. Security Management Procedures
  4. Facility Access Control
  5. Security Incident Procedures
Correct answer: A
Question 11
The National Provider File (NPF) includes information such as:
  1. Effective date
  2. CPT-4
  3. CDT
  4. ICD-9-CM
  5. Enrollment date
Correct answer: A
Question 12
This transaction type is a “response” transaction that may include information such as accepted/rejected claim, approved claim(s) pre-payment, or approved claim(s) post-payment:
  1. 270.
  2. 820.
  3. 837.
  4. 277.
  5. 278.
Correct answer: D
Question 13
The code set that must be used to describe or identify outpatient physician services and procedures is:
  1. lCD-SCM, Volumes 1 and 2
  2. CPT-4
  3. CDT
  4. lCD-SCM, Volume 3
  5. NDC
Correct answer: B
Question 14
The Security Incident Procedures standard requires just one implementation specification. That implementation specification is:
  1. Termination Procedures
  2. Automatic Logoff
  3. Emergency Access Procedure
  4. Contingency Operations
  5. Response and Reporting
Correct answer: E
Question 15
A hospital is preparing a file of treatment information for the state of California. 
This file is to be sent to external medical researchers. The hospital has removed SSN, name, phone and other information that specifically identifies an individual. However, there may still be data in the file that potentially could identify the individual. Can the hospital claim ‘safe harbor” and release the file to the researchers?
  1. Yes the hospital’s actions satisfy the “safe harbor” method of de-identification.
  2. No - a person with appropriate knowledge and experience must determine that the information that remains can identify an individual.
  3. No - authorization to release the information is still required by HIPAA.
  4. No - to satisfy “safe harbor the hospital must also have no knowledge of a way to use the remaining data to identify an individual.
  5. Yes - medical researchers are covered entities and “research” is considered a part of “treatment” by HIPAA.
Correct answer: D
Question 16
Which of the following is NOT a HIPAA national health care identifier?
  1. National Provider Identifier (NPI)
  2. Social Security Number (SSN)
  3. National Health Plan Identifier (PlanID)
  4. National Employer Identifier for Health Care (EIN)
  5. National Health Identifier for Individuals (NI-UI)
Correct answer: B
Question 17
Select the correct statement regarding code sets and identifiers.
  1. A covered entity must use the applicable code set that is valid at the time the transaction is initiated.
  2. April 14, 2003 is the compliance date for implementation of the National Provider Identifier.
  3. CMS is responsible for updating the CPT-4 code sets.
  4. An organization that assigns NPIs is referred to as National Provider for Identifiers.
  5. HHS assigns the Employer Identification Number (EIN), which has been selected as the National Provider Identifier for Health Care.
Correct answer: A
Question 18
This security standard requires that the covered entity establishes agreements with each organization with which it exchanges data electronically, protecting the security of all such data:
  1. Security incident Procedures
  2. Integrity
  3. Person or Entity Authentication
  4. Assigned Security Responsibility
  5. Business Associate Contracts and other Arrangements
Correct answer: E
Question 19
Select the FALSE statement regarding code sets and identifiers.
  1. The CPT-4 code set is maintained by the American Medical Association (AMA).
  2. A covered entity must use the applicable medical code set that is valid at the time the health care is delivered.
  3. The National Provider Identifier (NPI) will be assigned by the National Provider System (NPS).
  4. The Centers for Medicare and Medicaid Services is responsible for updating the HCPCS code set.
  5. The National Provider Identifier (NPI) will be assigned to health plans.
Correct answer: E
Question 20
The Data Backup Plan is part of which Security Standard?
  1. Contingency Plan
  2. Evaluation
  3. Security Management Procedures
  4. Facility Access Control
  5. Security Incident Procedures
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!