Download TSA Cybersecurity Study Guide -with 100% verified solutions 2024-2025.docx and more Exams Advanced Education in PDF only on Docsity! TSA Cybersecurity Study Guide -with 100% verified solutions 2024-2025 The Web The digital content that is delivered over the Internet, usually through a web browser. Internet Service Provider (ISP) A company that provides individuals and businesses access to the Internet and other related devices. The Internet Often used synonymously with the Web, the vast collection of networking hardware and physical computing devices that make up the Internet. IP Address A numerical label that is assigned to devices so they can connect and communicate on a network. Hypertext Transfer Protocol (HTTP) A set of rules that govern the transfer of web content between computers. File Transfer Protocol (FTP) A set of rules that govern the transfer of files between computers. Universal Resource Locator (URL) The reference or address to a resource on the Internet. Domain Name System (DNS) A system and set of rules that associates domain names (such as web servers) with unique IP addresses so that users can find and use network resources by an easily readable name instead of by IP address. Transmission Control Protocol/Internet Protocol (TCP-IP) A set of rules that facilitates internet communication. Hypertext Markup Language (HTML) A programming language that web pages use to display content through web browsers. Intranet A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet. Voice over IP (VoIP) A technology that sends voice phone calls using the TCP/IP protocol over digital data lines. Wi-Fi A technology that allows computers, smartphones, and other devices to communicate on a wireless network. Internet of Things (IoT) A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet. Cloud Storage A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network. An information system that connects documents to each other by hypertext links. Web services that help people meet, interact, and share content with other people online are called _____. Social Media ________ computing refers to services and applications that run remotely over the Internet. Cloud Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called _____. OneDrive A service that lets you store data in a remote location over the Internet is called ______. Cloud Storage Clickable text or images that take you to different sites on the World Wide Web are called ____. Hyperlinks A pop-up blocker is a web browser feature that _____. Prevents unwanted advertisements. When might it be most helpful to clear your browser's cache of temporary Internet files? When a website is not functioning as it should. Small files that a website saves on your computer to remember your preferences are called _____. Cookies Web browsers save website information in their _____, which helps the site load faster on future visits. Cache You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for research. Which of the following is the most likely cause of this problem? A proxy server is filtering access to websites. After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is most likely the problem? Proxy Settings Which of the following components is not required to create a network? Wireless Adapters Multiple computers configures to be able to communicate and share information with each other form a ____. Network Which of the following is the best definition for a LAN? A network in a small geographic area, like in an office. Assigning a unique letter (such as N:) to a shared drive is called ____ the drive. Mapping Which of the following provides services to hosts on its network? Server You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones? NFC Chips Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network? Ethernet Internet Protocol Divides files into packets and routes them through the Internet to their destination UDP Transmits packets in a continuous stream but doesn't verify packets What is the name of the protocol suite used on the Internet? TCP/IP Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server? IMAP What protocol is used to send email messages from a mail client to a mail server? SMTP Employees complain to be the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented? Email Filtering Which of the following is used on a wireless network to identify the network name? SSID You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? WPA2 Which of the following features is supplied by WPA2 on a wireless network? Authentication and encryption A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this? 5GHz A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which is the best reason to upgrade? Improved Performance Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters? Network Architect You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose? Local Installation What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission? Proprietary Software What is the term for software that anyone can use or modify for free? Open-Source Software One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model? Open-Source Software that requires a monthly subscription fee is often called ______. Software as a service A statement that describes what users can and cannot do on the various system components. What is a method of sending information from one device to another using removable media? Sneakernet Data transmission involves sending information from one device to another. There are numerous methods to transmit information between devices including: Sneaker net - uses removable media to physically move data from one computer to another Wired networks - uses cables to transmit data Wireless networks - uses radio waves to transmit data What mechanism can organizations use to prevent accidental changes by authorized users? - Version control Two users cannot update the same object. Objects can be files, database records, or transactions. For example, the first user to open a document has the permission to change that document; the second person has a read-only version. What is a secure virtual network called that uses the public network? VPN What is a virtual private network (VPN) Network? A virtual private network (VPN) is a secure virtual network that uses the public network (i.e., the Internet). The security of a VPN lies in the encryption of packet content between the endpoints that define the VPN. What are methods to help to ensure data integrity? -hashing -data consistency checks -access controls -data validation checks What are the three states of data? (Choose three.) - in-transit - at rest - in-process What name is given to a storage device connected to a network? NAS What is a network-attached storage (NAS) device? It is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. What is direct-attached storage (DAS)? Direct-attached storage (DAS) is storage connected to a computer. A hard drive or USB flash drive is an example of direct-attached storage. By default, systems are not set up to share direct-attached storage. What is Redundant Array of Independent Disks (RAID)? Redundant array of independent disks (RAID) uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk. RAID provides improved performance and fault tolerance. What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures? Data modification What is a SAN network? A storage area network (SAN) architecture is a network based storage system. SAN systems connect to the network using high-speed interfaces allowing improved performance and the ability to connect multiple servers to a centralized disk storage repository. What is cloud storage? Cloud storage is a remote storage option that uses space on a data center provider and is accessible from any computer with Internet access. Google Drive, iCloud, and Dropbox are all examples of cloud storage providers. What is the third state of data?