Continued Social Work Phone: 866-419-0818


Exam Preview

Cybersecurity for Telehealth

View Course Details Please note: exam questions are subject to change.


1.  What is the most likely way that hackers will attack telehealth?
  1. Theft of physical equipment
  2. Bribe an employee
  3. Phishing attacks
  4. Ransomware
2.  A compromised device could enable a hacker to:
  1. Commit medical billing fraud
  2. Illegally access live videos between patients and providers
  3. Access cloud-based EHR/EMR systems where patient data is stored
  4. All of the above
3.  Which of the following should be done before every telehealth appointment?
  1. Remove sensitive information visible on camera
  2. Logout of your email
  3. Reboot your computer
  4. Silence your phone
4.  When selecting a telehealth provider or solution, which of the following features would help improve security the LEAST?
  1. Strong encryption
  2. A virtual waiting room
  3. Business associate agreement (BAA)
  4. 24/7 customer service
5.  How often should you review the security of your telehealth services?
  1. Every day
  2. Every 30 days
  3. Once a year
  4. When a vulnerability is reported in the press
6.  Which of the following is NOT an example of a telehealth technology?
  1. Video conferencing
  2. Landlines and wireless communication
  3. Store and forward imaging
  4. Urgent care clinic
7.  Which of the following is an effective webcam cover?
  1. Hard plastic privacy cover
  2. Tape
  3. Post-it note
  4. Stickers
8.  What is a reputable source for maintaining awareness of new and emerging cybersecurity threats?
  1. Reddit
  2. Cybersecurity and Infrastructure Security Agency (CISA)
  3. Unsolicited email
  4. Paid advertisements
9.  HIPAA-compliant telehealth video communication products must:
  1. Enter into a HIPAA Business Associate Agreement (BAA)
  2. Be non-public facing (i.e., be access controlled)
  3. Be used with reasonable safeguards in place
  4. All of the above
10.  Which of the following is FALSE?
  1. Telehealth has the same HIPAA requirements as in-person appointments
  2. Only authorized users should have access to ePHI
  3. Secure communication are needed to protect the integrity of ePHI
  4. Telehealth will go away after COVID

Our site uses cookies to improve your experience. By using our site, you agree to our Privacy Policy.