This topic contains a solution. Click here to go to the answer

Author Question: Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or ... (Read 73 times)

cmoore54

  • Hero Member
  • *****
  • Posts: 568
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use of information.
 
  Fill in the blank(s) with correct word

Question 2

A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access to client information, the NP must first slide a smartcard through a card reader and then place a finger on a scanner.
 
  Which authentication measures were used to verify the NP's authorization to access client data? Select all that apply. 1. Appearance of the user's name on a screen
  2. Biometric authentication
  3. Picture authentication package
  4. Proximity radio authentication
  5. Encrypted pass key authentication



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

Carliemb17

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

audit trail
Rationale : Software that tracks system access by users, creates a(n) audit trail that can reveal unusual activity or inappropriate use of information.
Global Rationale:

Cognitive Level: Applying
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:

Answer to Question 2

2,5
Rationale: Biometric authentication is based on unique biological traits; thus, the fingerprint identification is Also correct is encrypted passkey authentication that uses a secret number verified against a registered digital certificate which would be kept on the smartcard. Proximity radio authentication requires the radio device be close to the sensing unit but there is nothing in the scenario to suggest this method was used. The appearance of the user's name on a screen and picture authentication packages are not indicated in this scenario.




cmoore54

  • Member
  • Posts: 568
Reply 2 on: Jul 7, 2018
:D TYSM


Hdosisshsbshs

  • Member
  • Posts: 315
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

The U.S. Preventive Services Task Force recommends that all women age 65 years of age or older should be screened with bone densitometry.

Did you know?

Since 1988, the CDC has reported a 99% reduction in bacterial meningitis caused by Haemophilus influenzae, due to the introduction of the vaccine against it.

Did you know?

The toxic levels for lithium carbonate are close to the therapeutic levels. Signs of toxicity include fine hand tremor, polyuria, mild thirst, nausea, general discomfort, diarrhea, vomiting, drowsiness, muscular weakness, lack of coordination, ataxia, giddiness, tinnitus, and blurred vision.

Did you know?

Only 12 hours after an egg cell is fertilized by a sperm cell, the egg cell starts to divide. As it continues to divide, it moves along the fallopian tube toward the uterus at about 1 inch per day.

Did you know?

Atropine, along with scopolamine and hyoscyamine, is found in the Datura stramonium plant, which gives hallucinogenic effects and is also known as locoweed.

For a complete list of videos, visit our video library