TSA Cybersecurity Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/112

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

113 Terms

1
New cards

The Web

The digital content that is delivered over the Internet, usually through a web browser.

2
New cards

Internet Service Provider (ISP)

A company that provides individuals and businesses access to the Internet and other related devices.

3
New cards

The Internet

Often used synonymously with the Web, the vast collection of networking hardware and physical computing devices that make up the Internet.

4
New cards

IP Address

A numerical label that is assigned to devices so they can connect and communicate on a network.

5
New cards

Hypertext Transfer Protocol (HTTP)

A set of rules that govern the transfer of web content between computers.

6
New cards

File Transfer Protocol (FTP)

A set of rules that govern the transfer of files between computers.

7
New cards

Universal Resource Locator (URL)

The reference or address to a resource on the Internet.

8
New cards

Domain Name System (DNS)

A system and set of rules that associates domain names (such as web servers) with unique IP addresses so that users can find and use network resources by an easily readable name instead of by IP address.

9
New cards

Transmission Control Protocol/Internet Protocol (TCP-IP)

A set of rules that facilitates internet communication.

10
New cards

Hypertext Markup Language (HTML)

A programming language that web pages use to display content through web browsers.

11
New cards

Intranet

A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet.

12
New cards

Voice over IP (VoIP)

A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.

13
New cards

Wi-Fi

A technology that allows computers, smartphones, and other devices to communicate on a wireless network.

14
New cards

Internet of Things (IoT)

A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.

15
New cards

Cloud Storage

A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.

16
New cards

Cloud Computing

The use of remote services hosted on the internet to store, manage, and process data.

17
New cards

Streaming

A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred.

18
New cards

Live Streaming

A streaming method that transmits data in real time as it is created.

19
New cards

On-Demand Streaming

A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a scheduled broadcast time.

20
New cards

Buffering

The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.

21
New cards

What are benefits of cloud computing?

Backup, accessibility, collaboration, and resource pooling.

22
New cards

What are drawbacks of cloud computing?

Privacy and security concerns, internet connection issues, and cloud hosting outages.

23
New cards

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

World Wide Web

24
New cards

Which of the following terms describes an organization that connects users to the Internet?

Internet Service Provider

25
New cards

Which medium does Wi-Fi use to send data between networks and devices?

Radio Waves

26
New cards

Browser

A software application that accesses web applications and websites.

27
New cards

Internet

An interconnected global public computer network.

28
New cards

World Wide Web

An information system that connects documents to each other by hypertext links.

29
New cards

Web services that help people meet, interact, and share content with other people online are called _____.

Social Media

30
New cards

________ computing refers to services and applications that run remotely over the Internet.

Cloud

31
New cards

Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called _____.

OneDrive

32
New cards

A service that lets you store data in a remote location over the Internet is called ______.

Cloud Storage

33
New cards

Clickable text or images that take you to different sites on the World Wide Web are called ____.

Hyperlinks

34
New cards

A pop-up blocker is a web browser feature that _____.

Prevents unwanted advertisements.

35
New cards

When might it be most helpful to clear your browser's cache of temporary Internet files?

When a website is not functioning as it should.

36
New cards

Small files that a website saves on your computer to remember your preferences are called _____.

Cookies

37
New cards

Web browsers save website information in their _____, which helps the site load faster on future visits.

Cache

38
New cards

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for research. Which of the following is the most likely cause of this problem?

A proxy server is filtering access to websites.

39
New cards

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is most likely the problem?

Proxy Settings

40
New cards

Which of the following components is not required to create a network?

Wireless Adapters

41
New cards

Multiple computers configures to be able to communicate and share information with each other form a ____.

Network

42
New cards

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office.

43
New cards

Assigning a unique letter (such as N:) to a shared drive is called ____ the drive.

Mapping

44
New cards

Which of the following provides services to hosts on its network?

Server

45
New cards

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?

NFC Chips

46
New cards

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet

47
New cards

Which kind of connector do you use to connect a modem to a standard telephone line?

RJ-11

48
New cards

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the best choice for this connectivity?

Access Point

49
New cards

Which of the following is the best advice to deploy to protect your private network from an untrusted public network?

Firewall

50
New cards

Which of the following is a firewall function?

Packet Filtering

51
New cards

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

Modem

52
New cards

Which type of network uses light pulses to transmit data?

Fiber Optics

53
New cards

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

54
New cards

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?

MAC address filtering

55
New cards

TCP

Verifies that each packet has been transmitted and received correctly

56
New cards

HTTPS

Encrypts and transfers hypertext pages on the World Wide Web

57
New cards

DNS

Matches unique IP addresses with easy-to-read URLs

58
New cards

HTTP

Transfers hypertext pages on the World Wide Web

59
New cards

Internet Protocol

Divides files into packets and routes them through the Internet to their destination

60
New cards

UDP

Transmits packets in a continuous stream but doesn't verify packets

61
New cards

What is the name of the protocol suite used on the Internet?

TCP/IP

62
New cards

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IMAP

63
New cards

What protocol is used to send email messages from a mail client to a mail server?

SMTP

64
New cards

Employees complain to be the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

Email Filtering

65
New cards

Which of the following is used on a wireless network to identify the network name?

SSID

66
New cards

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

67
New cards

Which of the following features is supplied by WPA2 on a wireless network?

Authentication and encryption

68
New cards

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

5GHz

69
New cards

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which is the best reason to upgrade?

Improved Performance

70
New cards

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

Network Architect

71
New cards

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

Local Installation

72
New cards

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?

Proprietary Software

73
New cards

What is the term for software that anyone can use or modify for free?

Open-Source Software

74
New cards

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model?

Open-Source

75
New cards

Software that requires a monthly subscription fee is often called ______.

Software as a service

76
New cards

What is software that is delivered over the Internet through a web browser called?

Web applications

77
New cards

Which installation method often requires you to immediately install updates from the Internet after installation is complete?

CD or DVD installation

78
New cards

Which installation method is most likely to put your computer at risk of downloading a virus?

Internet installation

79
New cards

Which application makes sure your computer has the most recent versions of its system software?

Windows Update

80
New cards

What are three access control security services? (Choose three.)

- accounting

- authorization

- authentication

81
New cards

What are two methods that ensure confidentiality? (Choose two.)

- authentication

- encryption

- access control

82
New cards

What are two common hash functions? (Choose two.)

- MD5

- SHA

83
New cards

What three design principles help to ensure high availability? (Choose three.)

-eliminate single points of failure

-provide for reliable crossover

- detect failures as they occur

84
New cards

What is a five nines?

One of the most popular high availability practices is five nines. The five nines refer to 99.999%. This means that downtime is less than 5.26 minutes per year.

85
New cards

What three tasks are accomplished by a comprehensive security policy? (Choose three.)

- defines legal consequences of violations

- sets rules for expected behavior

- gives security staff the backing of management

86
New cards

Acceptable Use Policy (AUP)

A statement that describes what users can and cannot do on the various system components.

87
New cards

What is a method of sending information from one device to another using removable media?

Sneakernet

88
New cards

Data transmission involves sending information from one device to another. There are numerous methods to transmit information between devices including:

Sneaker net - uses removable media to physically move data from one computer to another

Wired networks - uses cables to transmit data

Wireless networks - uses radio waves to transmit data

89
New cards

What mechanism can organizations use to prevent accidental changes by authorized users?

- Version control

Two users cannot update the same object. Objects can be files, database records, or transactions. For example, the first user to open a document has the permission to change that document; the second person has a read-only version.

90
New cards

What is a secure virtual network called that uses the public network?

VPN

91
New cards

What is a virtual private network (VPN) Network?

A virtual private network (VPN) is a secure virtual network that uses the public network (i.e., the Internet). The security of a VPN lies in the encryption of packet content between the endpoints that define the VPN.

92
New cards

What are methods to help to ensure data integrity?

-hashing

-data consistency checks

-access controls

-data validation checks

93
New cards

What are the three states of data? (Choose three.)

- in-transit

- at rest

- in-process

94
New cards

What name is given to a storage device connected to a network?

NAS

95
New cards

What is a network-attached storage (NAS) device?

It is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.

96
New cards

What is direct-attached storage (DAS)?

Direct-attached storage (DAS) is storage connected to a computer. A hard drive or USB flash drive is an example of direct-attached storage. By default, systems are not set up to share direct-attached storage.

97
New cards

What is Redundant Array of Independent Disks (RAID)?

Redundant array of independent disks (RAID) uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk. RAID provides improved performance and fault tolerance.

98
New cards

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?

Data modification

99
New cards

What is a SAN network?

A storage area network (SAN) architecture is a network based storage system. SAN systems connect to the network using high-speed interfaces allowing improved performance and the ability to connect multiple servers to a centralized disk storage repository.

100
New cards

What is cloud storage?

Cloud storage is a remote storage option that uses space on a data center provider and is accessible from any computer with Internet access. Google Drive, iCloud, and Dropbox are all examples of cloud storage providers.