Build Users & Grant Access Flashcards

1
Q

EMP

A

user master file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ECL

A

security classification master file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

User templates, also built in the EMP master file, allow you to maintain shared settings for ____ user records.

A

multiple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

four examples of settings set for an individual user

A

User ID and system login, password, default login department, link to a provider (SER) record if appropriate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False? An SER (provider record) can only be linked to one user record.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false? Linkable templates = user templates

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ records enable users to log in to Hyperspace

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Within Epic, access is controlled by security ____ and security ____.

A

points, classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security ____ grant users access to a piece of Epic functionality, like a key that allows you to open a specific door.

A

points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provider on the Fly or In Basket are examples of security points for features shared across ____ applications

A

multiple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

There are about ____ security points related to imaging functionality in Epic

A

200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A group of security points of the same type is a ____

A

security class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Basket is a type of security class that controls ____.

A

secure messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shared is a type of security class that controls ____

A

miscellaneous Epic-wide functionality (i.e. Provider on the Fly, documenting a PCP, SmartTools configuration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Radar is a type of security class that controls _____

A

Reporting and Learning Home dashboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reporting Workbench is a type of security class that controls ____

A

on demand reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EpicCare is a type of security class that controls

A

shared clinical activities, including Chart Review and Manage Orders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EpicCare Inpatient is a security class that controls ____

A

shared clinical activities for inpatients like Patient Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OpTime security class controls access to ___-

A

invasive tools, including timeouts, implants, and case-based functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

General Procedural security class controls shared imaging functionality including ____

A

ancillary orders, the tech work list, the reading worklist, plus case entry, case scheduling, and log creation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cupid security class controls Cupid-specific registry activities and exports like ___

A

CathPCI, ICD, PINNACLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Radiant security class controls ____

A

Breast imaging-specific activities, like Track Recs and Path Results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Registry security class controls ____

A

Shared clinical registry activities like Registry Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cadence security class controls ____

A

viewing, scheduling, and checking in appointments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Prelude security controls

A

registration screens

26
Q

The Security Point Dictionary available via Galaxy contains all of the Epic-released security points, broken out by the type of security ____ to which they belong

A

points

27
Q

If you make a print group report available on the Tech Work List via the profile, users will only be able to see that report if they have the ____ to access that activity.

A

security

28
Q

The General Procedural security class contains security points for ___ procedural functionality.

A

shared

29
Q

Most activities in Cupid and Radiant run off of ____ reports

A

application

30
Q

Some activities, like the Tech work List and the Reading Work List, only require ____ security. There is no associated ____.

A

report, security point

31
Q

security points } security class } template } ____

A

user

32
Q

overbook security point

A

schedule appointments into time slots with available overbooks

33
Q

super overbook security point

A

schedule appointments into time slots without available overbooks

34
Q

override security point

A

schedule appointments outside of a provider’s schedule

35
Q

You just super-overbooked a time slot. In which security class did you set that up?

A

cadence

36
Q

What are the four loevels of report security you can assign in the General Procedural security class?

A

Administrator, Power User, User (no edit), User (with edit)

37
Q

If a user is unable to access the Tech Work List, which security class should you troubleshoot?

A

General Procedural

38
Q

If a user is unable to check in patients, which security class should you troubleshoot?

A

Cadence

39
Q

To troubleshoot scheduling issues for an end user, you will likely need to add a ____ to a ____ and link it to a ____

A

security point, security class, user template

40
Q

true or false: User roles are records in the E2R master file that control much about how Hyperspace looks for a group of users

A

True

41
Q

Every user needs a ___ in order to use Hyperspace.

A

role

42
Q

A ____ tells the system what eactly Hyperspace should look like and how it should behave.

A

role

43
Q

5 key settings associated with a role record

A

menu configuration, home workspace, maximum number of workspaces that can be opened at once, length of time for inactivity, recall for the user’s last login department

44
Q

Which settings does the role record control?

A

Hyperspace toolbar, startup activities, whether the system will remember the user’s last login department

45
Q

True or false: the same timeout settings are appropriate for all imaging users?

A

false

46
Q

Cardiologists should only have two patient workspaces open at a time. In their user role, what should you enter in the maximum workspaces field?

A

3

47
Q

To identify the descriptor for an activity, you should use ____.

A

About Hyperspace

48
Q

When entering an order in Ancillary Orders, the Prov field is a required ____, and the patient’s name is the ____ that the front desk user will enter in the Prov field.

A

item, value

49
Q

You are updating the provider records for a few physicians who were recently hired at your organization. if you pres Shift+F5 in a given field, what is the result?

A

access to help text or possible values in a category list

50
Q

When building and configuring reports, why is it useful to know the particular style of a print group?

A

Print groups that you add to a report should match the style of those already included in the report, and you can use the style to filter the Data Handbook when searching for print groups

51
Q

What steps should you take to find the record IDs of a particular report or print group?

A

access the session information report in hyperspace and click the show report and print group IDs link

52
Q

A user can be affected by up to ____ profiles at once, with ___ being the most specific level of the hierarchy.

A

6, user template

53
Q

Which settings are controlled by a user’s compiled profile?

A

status board quick buttons, chart review tabs, print group reports

54
Q

true or false: When reading a Workflow Engine rule, the system typically stops reading once it matches on a series of nested conditions and executes any directives.

A

true

55
Q

true or false: items (E2U) in Hyperspace can be both within menus or nested in submenus.

A

true

56
Q

As an analyst in charge of troubleshooting menu configuration, how can the Menu Summary activity be useful to you?

A

Identifying the E3U records affecting users
Viewing the menus records in a hierarchy similar to what an end user would see
Identifying items that have been filtered out because of security

57
Q

When building a provider record, setting the orders authorizing provider item to Yes gives end users the ability to do what?

A

authorize imaging orders

58
Q

true or false: Anesthesiologists at your organization work in IR and the cath lab, as well as the OR. The anesthesiologist resource type should be available for both cases and appointments

A

true

59
Q

In addition to configuring access to imaging specific-functionality, all clinical users working in imaging departments will need which types of security classes?

A

EpicCare, In Basket, Reporting Workbench, Shared

60
Q

A front desk user is unable to access Ancillary Orders. What could be the problem?

A

He does not have general procedural security class or he is missing the access ancillary orders security point or he is missing the patient ancillary orders report security

61
Q

What are configured in the user role record?

A

the limit for number of open workspaces, menu configuration, startup activities

62
Q

Why do reading workstations or reading physicians need different settings than other users or workstations?

A

timeouts - radiologists read for long periods of time