This topic contains a solution. Click here to go to the answer

Author Question: Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or ... (Read 152 times)

cmoore54

  • Hero Member
  • *****
  • Posts: 568
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use of information.
 
  Fill in the blank(s) with correct word

Question 2

A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access to client information, the NP must first slide a smartcard through a card reader and then place a finger on a scanner.
 
  Which authentication measures were used to verify the NP's authorization to access client data? Select all that apply. 1. Appearance of the user's name on a screen
  2. Biometric authentication
  3. Picture authentication package
  4. Proximity radio authentication
  5. Encrypted pass key authentication



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

Carliemb17

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

audit trail
Rationale : Software that tracks system access by users, creates a(n) audit trail that can reveal unusual activity or inappropriate use of information.
Global Rationale:

Cognitive Level: Applying
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:

Answer to Question 2

2,5
Rationale: Biometric authentication is based on unique biological traits; thus, the fingerprint identification is Also correct is encrypted passkey authentication that uses a secret number verified against a registered digital certificate which would be kept on the smartcard. Proximity radio authentication requires the radio device be close to the sensing unit but there is nothing in the scenario to suggest this method was used. The appearance of the user's name on a screen and picture authentication packages are not indicated in this scenario.




cmoore54

  • Member
  • Posts: 568
Reply 2 on: Jul 7, 2018
:D TYSM


Jossy

  • Member
  • Posts: 336
Reply 3 on: Yesterday
Excellent

 

Did you know?

Although the Roman numeral for the number 4 has always been taught to have been "IV," according to historians, the ancient Romans probably used "IIII" most of the time. This is partially backed up by the fact that early grandfather clocks displayed IIII for the number 4 instead of IV. Early clockmakers apparently thought that the IIII balanced out the VIII (used for the number 8) on the clock face and that it just looked better.

Did you know?

IgA antibodies protect body surfaces exposed to outside foreign substances. IgG antibodies are found in all body fluids. IgM antibodies are the first type of antibody made in response to an infection. IgE antibody levels are often high in people with allergies. IgD antibodies are found in tissues lining the abdomen and chest.

Did you know?

A good example of polar molecules can be understood when trying to make a cake. If water and oil are required, they will not mix together. If you put them into a measuring cup, the oil will rise to the top while the water remains on the bottom.

Did you know?

The first successful kidney transplant was performed in 1954 and occurred in Boston. A kidney from an identical twin was transplanted into his dying brother's body and was not rejected because it did not appear foreign to his body.

Did you know?

It is difficult to obtain enough calcium without consuming milk or other dairy foods.

For a complete list of videos, visit our video library