Acronyms (Page 13) - Reverse Flashcards

1
Q

Any information about health status, provision of health care, or payment for health care that can be linked to a specific individual.

A

PHI

Personal Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.

A

PII

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A United States federal government standard for reliable identification and access control card.

A

PIV

Personal Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A set of standards for public-key cryptography that were established by RSA Data Security, Inc.

A

PKCS

Public Key Cryptography Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

A

PKI

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An Internet standard protocol used by local email clients to retrieve email from a remote server over a TCP/IP connection.

A

POP

Post Office Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The voice-grade telephone service that remains the basic form of residential and small business service connection to the telephone network in most parts of the world.

A

POTS

Plain Old Telephone Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A data link protocol commonly used to establish a direct connection between two networking nodes.

A

PPP

Point-to-Point Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A method for implementing virtual private networks.

A

PPTP

Point-to-Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

A

PSK

Pre-shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of camera that is capable of remote directional and zoom control.

A

PTZ

Pan-tilt-zoom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A program that a user may perceive as unwanted.

A

PUP

Potentially Unwanted Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An entity that has the ability to recover a key, certificate, or encrypted data.

A

RA

Recovery Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An authority in a network that verifies user requests for a digital certificate and tells the Certificate Authority (CA) to issue it.

A

RA

Registration Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A former European Union research and development program focused on developing advanced telecommunications networks.

A

RACE

Research and Development in Advanced Communications Technologies in Europe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of software development methodology that prioritizes rapid prototype releases and iterations.

A

RAD

Rapid Application Development

17
Q

A networking protocol that provides centralized Authentication, Authorization and Accounting (AAA or Triple A) management for users who connect and use a network service.

A

RADIUS

Remote Authentication Dial-in User Service