A certified nursing assistant (CNA) at a local nursing home logs on to the facility's clinical information system. The CNA can only see information about the clients that were assigned by the registered nurse for that day.
The CNA cannot see financial data regarding any of the assigned clients. This situation is an example of which of the following? 1. Password protection
2. Computer forensics
3. Access levels
4. User authentication
Question 2Why do most breaches of confidentiality occur?
1. Malicious behavior
2. System hacking
3. Intent
4. Carelessness
Question 3Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use of information.
Fill in the blank(s) with correct word
Question 4A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access to client information, the NP must first slide a smartcard through a card reader and then place a finger on a scanner.
Which authentication measures were used to verify the NP's authorization to access client data? Select all that apply. 1. Appearance of the user's name on a screen
2. Biometric authentication
3. Picture authentication package
4. Proximity radio authentication
5. Encrypted pass key authentication
Question 5Which of the following issues would be of concern to public health nurses?
1. The number of school children with influenza
2. The number of premature births in the county
3. The county plans to build a medical waste incinerator
4. The lack of compliance with TB medications