This topic contains a solution. Click here to go to the answer

Author Question: Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or ... (Read 131 times)

cmoore54

  • Hero Member
  • *****
  • Posts: 568
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use of information.
 
  Fill in the blank(s) with correct word

Question 2

A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access to client information, the NP must first slide a smartcard through a card reader and then place a finger on a scanner.
 
  Which authentication measures were used to verify the NP's authorization to access client data? Select all that apply. 1. Appearance of the user's name on a screen
  2. Biometric authentication
  3. Picture authentication package
  4. Proximity radio authentication
  5. Encrypted pass key authentication



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

Carliemb17

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

audit trail
Rationale : Software that tracks system access by users, creates a(n) audit trail that can reveal unusual activity or inappropriate use of information.
Global Rationale:

Cognitive Level: Applying
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:

Answer to Question 2

2,5
Rationale: Biometric authentication is based on unique biological traits; thus, the fingerprint identification is Also correct is encrypted passkey authentication that uses a secret number verified against a registered digital certificate which would be kept on the smartcard. Proximity radio authentication requires the radio device be close to the sensing unit but there is nothing in the scenario to suggest this method was used. The appearance of the user's name on a screen and picture authentication packages are not indicated in this scenario.




cmoore54

  • Member
  • Posts: 568
Reply 2 on: Jul 7, 2018
Thanks for the timely response, appreciate it


AmberC1996

  • Member
  • Posts: 317
Reply 3 on: Yesterday
:D TYSM

 

Did you know?

Acetaminophen (Tylenol) in overdose can seriously damage the liver. It should never be taken by people who use alcohol heavily; it can result in severe liver damage and even a condition requiring a liver transplant.

Did you know?

Medications that are definitely not safe to take when breastfeeding include radioactive drugs, antimetabolites, some cancer (chemotherapy) agents, bromocriptine, ergotamine, methotrexate, and cyclosporine.

Did you know?

About 80% of major fungal systemic infections are due to Candida albicans. Another form, Candida peritonitis, occurs most often in postoperative patients. A rare disease, Candida meningitis, may follow leukemia, kidney transplant, other immunosuppressed factors, or when suffering from Candida septicemia.

Did you know?

Patients who have been on total parenteral nutrition for more than a few days may need to have foods gradually reintroduced to give the digestive tract time to start working again.

Did you know?

The average human gut is home to perhaps 500 to 1,000 different species of bacteria.

For a complete list of videos, visit our video library