3 Months Free Update
3 Months Free Update
3 Months Free Update
A hospital system based in both Texas and Massachusetts processes credit card data within its scoped environment. Management has asked that all relevant regulatory factors be included in the r2 assessment. Which of the following regulatory requirements should be selected? (Select all that apply) [0013]
When testing, can you sample across a population of ungrouped primary components within an assessment's scope?
When performing r2 assessments, any added compliance factors should be considered before marking a requirement statement "N/A".
In an i1 assessment a Control Reference score of 62 would yield which result?
Should a company always select the most current version of the CSF framework? [0163]
Which assessment type tests against requirement statements considered essential to cybersecurity hygiene?
What frameworks are the HITRUST CSF built upon? (Select all that apply) [0005]
NIST SP 800-53
David, a member of an external assessor organization, helped his client remediate a control gap. As part of the validation process, David can then review the remediation for appropriateness.
The HITRUST CSF applies to covered information in all forms (words, numbers, pictures, sounds).
What are HITRUST Assurance Advisories designed to provide? (Select all that apply) [0051]
Once an assessment has been submitted to the assessor, can the assessed entity change their responses?
The concept of HITRUST CSF risk levels was adapted from what security standard?
Firewalls with identical configurations can be grouped for testing as one component.
The Subscriber’s Comments field should be populated with the rationale for any requirement statement marked not-applicable (N/A). [0048]
Vulnerability testing should never be performed on client systems by an external assessor.
It is possible to test only privacy-related requirements to obtain a HITRUST privacy certification.
What is the minimum number of days an organization must wait before a remediated requirement statement's Implemented maturity level can be reconsidered for i1 testing?
Would the certification threshold be met in an e1 assessment if all Requirement Statements had Implemented scored at 50%?
When scoping an r2 assessment, selecting regulatory factors is required and may generate additional Requirement Statements in the assessment object.
The A1 Security Assessment requirements can only be added to the r2 assessment type.
Is the Payment Card Industry – Data Security Standard (PCI-DSS) a Risk Management Framework (RMF)?
Under which version of the CSF did the framework go industry agnostic and HIPAA became its own regulatory factor?
A pharmacy that accepts Medicare/Medicaid and also takes credit cards should include which regulatory factors in their assessment?
An Interim Assessment must be completed in how many months after r2 certification is achieved? [0023]
Upon submission of an assessment object by the assessor, how many days does HITRUST take to either accept or reject the assessment?
An organization has identified a number of components needed for an assessment. These components cover systems/applications for customers in the states of Massachusetts and Nevada. Assuming management wants corresponding regulatory factors to be included in their assessment, which regulatory factors would apply?
(Select all that apply)
When an implementation gap is remediated, what is the minimum number of days the control must operate before retesting? [0130]
Select the four general risk factor categories used when scoping r2 assessments.
If a requirement statement beginning with "The Privacy Officer..." scored a 50 instead of 42, would the overall assessment achieve certification?

Insights Reports provide a more comprehensive review of authoritative sources than a standard e1 report. [0042]
The HITRUST CSF applies to covered information across all transmission and storage methods.