Question 1
Which of the following describes the process of identifying, analyzing, and evaluating risks to healthcare information systems?
Question 2
What is the primary purpose of 'threat modeling' in the context of healthcare information systems?
Question 3
Which of the following activities is a core part of 'vulnerability management'?
Question 4
An effective 'incident response plan' for a healthcare organization should primarily focus on:
Question 5
Which of the following best describes a 'vulnerability' in a healthcare information system?