This topic contains a solution. Click here to go to the answer

Author Question: Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or ... (Read 132 times)

cmoore54

  • Hero Member
  • *****
  • Posts: 568
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use of information.
 
  Fill in the blank(s) with correct word

Question 2

A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access to client information, the NP must first slide a smartcard through a card reader and then place a finger on a scanner.
 
  Which authentication measures were used to verify the NP's authorization to access client data? Select all that apply. 1. Appearance of the user's name on a screen
  2. Biometric authentication
  3. Picture authentication package
  4. Proximity radio authentication
  5. Encrypted pass key authentication



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

Carliemb17

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

audit trail
Rationale : Software that tracks system access by users, creates a(n) audit trail that can reveal unusual activity or inappropriate use of information.
Global Rationale:

Cognitive Level: Applying
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:

Answer to Question 2

2,5
Rationale: Biometric authentication is based on unique biological traits; thus, the fingerprint identification is Also correct is encrypted passkey authentication that uses a secret number verified against a registered digital certificate which would be kept on the smartcard. Proximity radio authentication requires the radio device be close to the sensing unit but there is nothing in the scenario to suggest this method was used. The appearance of the user's name on a screen and picture authentication packages are not indicated in this scenario.




cmoore54

  • Member
  • Posts: 568
Reply 2 on: Jul 7, 2018
YES! Correct, THANKS for helping me on my review


kswal303

  • Member
  • Posts: 316
Reply 3 on: Yesterday
Great answer, keep it coming :)

 

Did you know?

Aspirin may benefit 11 different cancers, including those of the colon, pancreas, lungs, prostate, breasts, and leukemia.

Did you know?

The human body's pharmacokinetics are quite varied. Our hair holds onto drugs longer than our urine, blood, or saliva. For example, alcohol can be detected in the hair for up to 90 days after it was consumed. The same is true for marijuana, cocaine, ecstasy, heroin, methamphetamine, and nicotine.

Did you know?

Excessive alcohol use costs the country approximately $235 billion every year.

Did you know?

Though the United States has largely rejected the metric system, it is used for currency, as in 100 pennies = 1 dollar. Previously, the British currency system was used, with measurements such as 12 pence to the shilling, and 20 shillings to the pound.

Did you know?

Interferon was scarce and expensive until 1980, when the interferon gene was inserted into bacteria using recombinant DNA technology, allowing for mass cultivation and purification from bacterial cultures.

For a complete list of videos, visit our video library