Which of the following are the two required implementation specifications of the access control standard under HIPAA?
A) Unique user identification and establishing emergency access procedures
B) Implementing automatic logoff procedures and encrypting/decrypting information at rest
C) Unique user identification and implementing automatic logoff procedures
D) Encrypting/decrypting information at rest and establishing emergency access procedures
A) Unique user identification and establishing emergency access procedures
You might also like to view...
Which of the following refers to the sale of stolen goods through technological means?
a. day trading b. insider trading c. e-Fencing d. spoofing
____ attacks involve overloading a server with an overwhelming amount of network traffic so that it can't handle legitimate requests for network services.
A. Brute-force B. Session hijacking C. Address spoofing D. Denial-of-service (DoS)