Chapter 7 Key Terms Flashcards

Learn the definitions of the Key Terms used within the Healthcare and IT world

1
Q

Antispyware

A

A program designed to prevent spyware from being installed on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Badge

A

A card with a magnetic strip or chip that identifies the person assigned to the card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometric Scanner

A

A device used to identify a person based on biological data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Encryption Standard (DES)

A

An outdated block cipher that uses a 64-bit cipher block and a 56-bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Heating, Ventilation, and Air Conditioning (HVAC) unit

A

Equipment designed to regulate temperature and humidity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intermediate Distribution Frame (IDF)

A

A cable rack that connects and manages wiring used for telecommunicating between MDF and devices such as computers or network printers. IDFs are usually found on each floor of a building in a data closet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key Fob

A

A device synched with a network authentication service that provides a code used to log in to a network or other system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 2 Tunneling Protocol (L2TP)

A

A fully encrypted tunneling protocol used to create a VPN connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Main Distribution Frame (MDF)

A

A cable rack that connects and manages wiring used for telecommunication between a service provider and intermediate distribution frames (IDFs). The MDF connects private or public lines coming into a facility with the networking devices in the facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious Software

A

Any program unknowingly transmitted to a computer or network designed to cause damage, also called malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

Any program unknowingly transmitted to a computer or network designed to cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Media Access Control (MAC) Filtering

A

The method to secure a network by limiting which devices are allowed to connect to a network based on a list of MAC addresses kept by the wireless access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Attached Storage (NAS)

A

A storage device connected directly to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

A form of social engineering in which an attacker tricks or manipulates a user to giving out sensitive data or into allowing unauthorized programs onto the computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pretty Good Privacy (PGP)

A

An encryption method designed for signing and encrypting e-mail, which uses both symmetric and asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Desktop Connection (RDP)

A

A remote connection used to view another computer’s desktop in a window. RDC was created by Microsoft

17
Q

Secure Shell (SSH)

A

An encrypted tunneling protocol used by clients/server applications to connect a remote client to a sever. The protocol is designed to ensure confidentiality and integrity of data over an unsecured network

18
Q

Secure Socket Layer (SSL)

A

A malicious attack using social directed at a person who has access to sensitive data

19
Q

Social Engineering

A

A malicious attack using social directed at a person who has access to sensitive data

20
Q

Spam

A

Unsolicited contact that you did not ask for and don’t want and might come from an attacker

21
Q

Spyware

A

A type of malware designed to secretly collect information on a computer or network

22
Q

Storage Area Network (SAN)

A

An independent network separate from the normal LAN designed for data storage

23
Q

Terminal Emulator

A

A connection to a mainframe computer that holds all the data being accessed. A terminal emulator typically looks like a command prompt window

24
Q

Triple Data Encryption Standard (3DES)

A

An encryption similar to DES but uses a key that can be three times the size, at a 168-bit key