This topic contains a solution. Click here to go to the answer

Author Question: Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or ... (Read 117 times)

cmoore54

  • Hero Member
  • *****
  • Posts: 568
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use of information.
 
  Fill in the blank(s) with correct word

Question 2

A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access to client information, the NP must first slide a smartcard through a card reader and then place a finger on a scanner.
 
  Which authentication measures were used to verify the NP's authorization to access client data? Select all that apply. 1. Appearance of the user's name on a screen
  2. Biometric authentication
  3. Picture authentication package
  4. Proximity radio authentication
  5. Encrypted pass key authentication



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

Carliemb17

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

audit trail
Rationale : Software that tracks system access by users, creates a(n) audit trail that can reveal unusual activity or inappropriate use of information.
Global Rationale:

Cognitive Level: Applying
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:

Answer to Question 2

2,5
Rationale: Biometric authentication is based on unique biological traits; thus, the fingerprint identification is Also correct is encrypted passkey authentication that uses a secret number verified against a registered digital certificate which would be kept on the smartcard. Proximity radio authentication requires the radio device be close to the sensing unit but there is nothing in the scenario to suggest this method was used. The appearance of the user's name on a screen and picture authentication packages are not indicated in this scenario.




cmoore54

  • Member
  • Posts: 568
Reply 2 on: Jul 7, 2018
YES! Correct, THANKS for helping me on my review


tranoy

  • Member
  • Posts: 344
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

Nearly all drugs pass into human breast milk. How often a drug is taken influences the amount of drug that will pass into the milk. Medications taken 30 to 60 minutes before breastfeeding are likely to be at peak blood levels when the baby is nursing.

Did you know?

Hyperthyroidism leads to an increased rate of metabolism and affects about 1% of women but only 0.1% of men. For most people, this increased metabolic rate causes the thyroid gland to become enlarged (known as a goiter).

Did you know?

The first documented use of surgical anesthesia in the United States was in Connecticut in 1844.

Did you know?

Although puberty usually occurs in the early teenage years, the world's youngest parents were two Chinese children who had their first baby when they were 8 and 9 years of age.

Did you know?

The U.S. Preventive Services Task Force recommends that all women age 65 years of age or older should be screened with bone densitometry.

For a complete list of videos, visit our video library