Question 1
Question
What three of the four levels is used to describe the Chronicles hierachy?
Answer
-
Master File
-
Contact -item
-
Record
-
Subset
Question 2
Question
What are two of the four response types for items?
Question 3
Question
There are five valid data types?
Question 4
Question
The .1 Record ID is the 'speical item' required for each record in the master file?
Question 5
Question
A neworked item is an item that stores the item ID of a record in another master file?
Question 6
Question
There are four pieces to a category item, pick three from this list?
Answer
-
category value
-
title
-
synonyms
-
comment
Question 7
Question
It is possible to view only a few items for a record within EAVIEWID
Question 8
Question
EAVIEW converts some data types into human readable form. This will also be done for networked record IDs?
Question 9
Question
Record Viewer is available on all Hyperspace menus?
Question 10
Question
Who can find a public report in the Library?
Answer
-
any user
-
users with access
-
administrators
Question 11
Question
A private report is one that anyone can run, but only the creator can edit?
Question 12
Question
What is valid unti time mean?
Question 13
Question
Use the 'save results' option from within the Results Viewer or the the Recent Results. This will save the results of the report to the Saved Results section of my reports.
Question 14
Question
To create a search you, choose the type of search, date and specify item criteria?
Question 15
Question
Name two things Chronicles prompts you to save?
Question 16
Question
What happens if required information is missing when creating a new record for an import?
Question 17
Question
Data courier has sizx sending requirements: select build, define pacxkage, calculate dependancies, preview, send, verify?
Question 18
Question
Proactive Query is the process used by data courier to determine if a dependents records CID exists in target environments?
Question 19
Question
Dependency record 'will be sent' records are NOT moved when you click send?
Question 20
Question
User role extensions are a good way to limit a user's access to particular dangerous activities?
Question 21
Question
When a person has a name change, it should only need to be done on the EMP record?
Question 22
Question
The release notes sent out by Epic should be reviewed in case of security changes. It can help an organization prepare for security updates and avoid unanticipated security changes.
Question 23
Question
When a provider leaves your organization, you need to remove his in basket security?
Question 24
Question
A common help desk activity is updating and resetting user passwords?
Question 25
Question
You can only change passwords in Hyperspace?
Question 26
Question
To change a user's license, you should create a new contact in the provider record?
Question 27
Question
A front desk person changes her name. What is the recommended way to update her EMP record (there is ONLY one answer)?
Question 28
Question
It is recommended that you create new EMP and SER records for providers that need updates to their information?
Question 29
Question
You should always hard delete user and provider records when employees leave your organization in order to keep your system up to date and uncluttered?
Question 30
Question
What are the actions you should take when a provider leaves your organization? (Choose ALL that apply).
Answer
-
Inactivate the provider
-
Block the provider's login
-
Add a subtemplate to remove the provider's In Basket Security
-
Reset the provider's password
Question 31
Question
Record and Item Auditing captures data about changed items in any Chronicles master file
Question 32
Question
Which auditing tool captures only desaignated items when enabled?
Answer
-
Record and Item Auditing
-
Change History
-
Access History
-
None
Question 33
Question
What is the purpose of Access History?
Answer
-
To capture all changed items
-
To audit a user's interaction with patient activities
-
To prevent a user from accessing patient activities
-
To audit a user's interactions with patient activities and what actions were taken
Question 34
Question
Appropriate is checked first when Break the Glass runs?
Question 35
Question
VIPS, employees, minors, inmates are all good examples of patient charts who might need Break the Glass?
Question 36
Question
Which users usually need unrestricted access to all patient charts? (Choose ALL answers that apply).
Question 37
Question
Action lists are security checks used to determine access
Question 38
Question
When a user breaks the glass, an action list record is used to determine the follow-up actions.
Question 39
Question
Break the Glass window can display patient information but not user information.
Question 40
Question
What four places can you go in order to configure where Break the Glass messages will be sent?
Answer
-
email
-
shared configuration
-
department
-
location
-
service area
Question 41
Question
Patient Event Reports can track access to a specific department?
Question 42
Question
User Event Reports can track one user's access to multiple charts?
Question 43
Question
Department Event Reports can give an overview of Break the Glass events in a single department?
Question 44
Question
Of the choices below, what types of auditing can be categorized as event-based auditing?
Answer
-
Break the Glass
-
Authentication History
-
Change History
-
Item Auditing
Question 45
Question
If Dr. Simpson, Bobby's attending provider, accesses his chart by logging into the hosptial med surg department, he would be denied access?
Question 46
Question
If Marty, a therapist who has not seen Bobby yet, but who has logged into the hospital physical therapy department accesses Bobby's chart he will be prompted to break the glass?
Question 47
Question
If Paolo, a registrar logged into the East Clinic to try and access Bobby's chart, he will be denied immediately?
Question 48
Question
Lookback data means that the data stored within the contact will always be different for each contact?
Question 49
Question
What happens when a dependency not currently in the target environment is found for a record you are preparing to migrate?
Answer
-
Nothing - the system assumes that all dependencies are already in the target environments
-
The system will calculate the dependencies needed and add them to list to migrate
-
The system will abort the migration. Dependancies must be sent before the intended record is set
-
The system wiil calculate the dependancies needed but will not add them to the list to migrate
Question 50
Question
When adding data to an import spreadsheet, what is the effet of putting an asterick in Field 1? choose all that apply.
Answer
-
The import will automatically generate a local ID (.1) for the imported records
-
The import will automatically look up the existing record's local id (.1) based on the record's Name (.2)
-
The import will create a new record
-
The flat file will be automatically generate a local ID (.1) for the imported record
Question 51
Question
When a mistake is found during the import process (either during scan or import), where should one go to fix the data?
Answer
-
Import spreadsheet
-
Flat file
-
Import Specifications
Question 52
Question
As of Epic 2014 release, all master files can be moved by the Data Courier.
Question 53
Question
Which activity an one use to determine why a record (or category entry) is unable to be selected with the Data Courier? (choose only one answer)
Question 54
Question
After running the Proactive Query (by clicking Calculate Dependancies) which type of dependent records will be automatically added tothe Will be Sent section? (choose only one answer)
Answer
-
Epic release records
-
Records which already exist on the target environment
-
Records which do not exist on the target environment, but the user has the ability to send
-
Records which do not exist on the target environment, but the user does NOT have the ability to send
Question 55
Question
Which record type would be added if Rose, a registrar, requests that the Patient Station button be added to her Hyperspace toolbar? (Choose only one answer)
Question 56
Question
Which of the following can you find with Menu Summary, choose ALL that apply
Question 57
Question
Which of the following response types can contain multiple lines?
Answer
-
Single
-
Multiple
-
Related
-
Related Multiple
Question 58
Question
When looking at a text side entry screen, which of the following methods can you use to find the current field's INI and Item Number?
Answer
-
Shift + F7
-
Shift + F5
-
Home, F8
-
Control + Click
Question 59
Question
When setting up a Reporting Workbench Report, where can you configure the items you would like to search on? (Choose only ONE answer)
Answer
-
Criteria Tab
-
Appearance Tab
-
Display Tab
-
General Tab
Question 60
Question
What is saved in a Subset after an Ad Hoc Search? Choose only ONE answer
Question 61
Question
In an Ad Hoc Search how can I search for information not about the current record, but about another record the current record is NETWORKED to? Choose only one answer.
Answer
-
Write down the list of all networked records and do a second search on them
-
Use as slash (/) to look at the Networked record
-
Save a subset of all networked records and do a second search on them
Question 62
Question
An SER record is a good example of a NOT over time record
Question 63
Question
For visits (the PRC) is not over time because of the types of visits themselves do not change?
Question 64
Question
How many contacts could be in a NOT OVER TIME master file?
Question 65
Question
How many contacts could be in an OVER TIME master file?
Answer
-
Only one
-
As many as you need
-
Limited to 5
Question 66
Question
Networking specifies relationships between one item to another, frequently in a different database
Question 67
Question
Lookback values change frequently and hold only the current values.
Question 68
Question
Data Courier maintains Referential Integrity, ensuring networked items point to records which also exist. This is the preferred method of moving data.
Question 69
Question
The CID is a unique record ID or category ID that is shared across all environments that communicate through the Data Courier
Question 70
Question
CIDs and UCIs have two pieces
Answer
-
Environment prefix
-
Incremental Number
-
Local ID
Question 71
Question
Data courier moves records and categories
Question 72
Question
Data Courier is a way to move code from environment to environment
Question 73
Question
Proactive Query determines which records dependencies are sent through Data Courier
Question 74
Question
Every user must have a role to log in. Without one, Epic cannot determine the layout of Hyperspace
Question 75
Question
A menu is defined as the Epic Button in a set order
Question 76
Question
What is the INI file for Menus?
Question 77
Question
When looking at EDMAINAPPMENU it controls?
Answer
-
Users toolbox
-
Epic Button
-
Fixed toolbar
Question 78
Question
When looking at EDUSERTOOLBAR it represents?
Answer
-
Epic Button
-
User toolbar
-
Fixed Toolbar
Question 79
Question
When looking at EDFIXEDTOOLBAR it represents?
Answer
-
Epic button
-
Users Toolbar
-
Fixed Toolbar
Question 80
Question
Security Coordinator as part of ongoing maintenace prepares the organization for security upgrades, by reviewing release notes.
Question 81
Question
Security Workground assists with maintaining security classes and templates for their application.
Question 82
Question
The security group maintains the EMP and SER records for users at your organization?
Question 83
Question
Nova is Epic's hosted release note management tool used to track and follow up on release notes and FYIs
Question 84
Question
One of your nurses has decided to leave your organization to go to medical school to become a physician. Select what you would do to modify his EMP record.
Question 85
Question
Last week one of your physicians earned her PhD. Which things would you do to indicate this as part of her credentials?
Question 86
Question
At your organization, the security coordinator is in charge of handling all release notes. As you prepare for the approaching upgrade slated for the end of the year, what actions should you take to ensure the success of the upgrade?
Answer
-
Use Nova to read and take action
-
Update, build, test, migrate, test
-
Inactivate all users until the upgrade is complete
Question 87
Question
You have a unit clerk who is leaving your organization at the end of the month to get married and move to Hawaii. What action should you take to indicate this change to your system?
Question 88
Question
You have a user who just returned from three months of maternity leave who cannot remember her password to log into the system. Your organization does not use an LDAP server. What do you do?
Question 89
Question
The Help Desk should be the department most interested in your auditing?
Question 90
Question
What are the tools for Event-Based Auditing?
Answer
-
Authentication History
-
Access History
-
Break the Glass
-
Record Auditing
Question 91
Question
Authentication History is used to track just unsuccessful logins by a user.
Question 92
Question
Access History is used to track a user's access to data
Question 93
Question
There are two tools that fall under Static Auditing
Answer
-
Item Auditing
-
Record Auditing
-
Authentication Auditing
Question 94
Question
All data is protected by BTG
Question 95
Question
Break the glass is a technical system for controlling access to PHI
Question 96
Question
If you keep bumping the glass enough we will eventually give you access
Question 97
Question
This check will either give or deny access to the entire patient's chart?
Answer
-
Record Level Check
-
Contact Level Check
Question 98
Question
This level check will give or deny access to a particular encounter or contact within a chart
Answer
-
Record Level Check
-
Contact Level Check
Question 99
Question
Department Event Report specific to a department's break the glass events over time.
Question 100
Question
Patient Event Reports can track access to multiple charts