Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

TSA Cybersecurity Study Guide Questions and answers with 100% Complete solutions | verifie, Exams of Cybercrime, Cybersecurity and Data Privacy

The Web - ✔✔The digital content that is delivered over the Internet, usually through a web browser. Internet Service Provider (ISP) - ✔✔A company that provides individuals and businesses access to the Internet and other related devices. The Internet - ✔✔Often used synonymously with the Web, the vast collection of networking hardware and physical computing devices that make up the Internet.

Typology: Exams

2024/2025

Available from 01/11/2025

Holygrams
Holygrams 🇺🇸

3.7

(3)

2.2K documents

1 / 27

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
TSA Cybersecurity Study Guide Questions and
answers with 100% Complete solutions | verified
&updated 2025
The Web - ✔✔The digital content that is delivered over the Internet, usually
through a web browser.
Internet Service Provider (ISP) - ✔✔A company that provides individuals and
businesses access to the Internet and other related devices.
The Internet - ✔✔Often used synonymously with the Web, the vast collection of
networking hardware and physical computing devices that make up the Internet.
IP Address - ✔✔A numerical label that is assigned to devices so they can connect
and communicate on a network.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b

Partial preview of the text

Download TSA Cybersecurity Study Guide Questions and answers with 100% Complete solutions | verifie and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

TSA Cybersecurity Study Guide Questions and

answers with 100% Complete solutions | verified

&updated 202 5

The Web - ✔✔The digital content that is delivered over the Internet, usually through a web browser. Internet Service Provider (ISP) - ✔✔A company that provides individuals and businesses access to the Internet and other related devices. The Internet - ✔✔Often used synonymously with the Web, the vast collection of networking hardware and physical computing devices that make up the Internet. IP Address - ✔✔A numerical label that is assigned to devices so they can connect and communicate on a network.

Hypertext Transfer Protocol (HTTP) - ✔✔A set of rules that govern the transfer of web content between computers. File Transfer Protocol (FTP) - ✔✔A set of rules that govern the transfer of files between computers. Universal Resource Locator (URL) - ✔✔The reference or address to a resource on the Internet. Domain Name System (DNS) - ✔✔A system and set of rules that associates domain names (such as web servers) with unique IP addresses so that users can find and use network resources by an easily readable name instead of by IP address. Transmission Control Protocol/Internet Protocol (TCP-IP) - ✔✔A set of rules that facilitates internet communication.

streetlights, and environmental tracking systems) that communicate with the internet. Cloud Storage - ✔✔A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network. Cloud Computing - ✔✔The use of remote services hosted on the internet to store, manage, and process data. Streaming - ✔✔A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred. Live Streaming - ✔✔A streaming method that transmits data in real time as it is created.

On-Demand Streaming - ✔✔A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a scheduled broadcast time. Buffering - ✔✔The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts. What are benefits of cloud computing? - ✔✔Backup, accessibility, collaboration, and resource pooling. What are drawbacks of cloud computing? - ✔✔Privacy and security concerns, internet connection issues, and cloud hosting outages. Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? - ✔✔World Wide Web

computing refers to services and applications that run remotely over the Internet. - ✔✔Cloud Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called. - ✔✔OneDrive A service that lets you store data in a remote location over the Internet is called

. - ✔✔Cloud Storage Clickable text or images that take you to different sites on the World Wide Web are called. - ✔✔Hyperlinks A pop-up blocker is a web browser feature that. - ✔✔Prevents unwanted advertisements.

When might it be most helpful to clear your browser's cache of temporary Internet files? - ✔✔When a website is not functioning as it should. Small files that a website saves on your computer to remember your preferences are called. - ✔✔Cookies Web browsers save website information in their , which helps the site load faster on future visits. - ✔✔Cache You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for research. Which of the following is the most likely cause of this problem? - ✔✔A proxy server is filtering access to websites. After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is most likely the problem? - ✔✔Proxy Settings

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones? - ✔✔NFC Chips Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network? - ✔✔Ethernet Which kind of connector do you use to connect a modem to a standard telephone line? - ✔✔RJ- 11 A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the best choice for this connectivity? - ✔✔Access Point

Which of the following is the best advice to deploy to protect your private network from an untrusted public network? - ✔✔Firewall Which of the following is a firewall function? - ✔✔Packet Filtering Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer? - ✔✔Modem Which type of network uses light pulses to transmit data? - ✔✔Fiber Optics A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas? - ✔✔Satellite

UDP - ✔✔Transmits packets in a continuous stream but doesn't verify packets What is the name of the protocol suite used on the Internet? - ✔✔TCP/IP Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server? - ✔✔IMAP What protocol is used to send email messages from a mail client to a mail server?

  • ✔✔SMTP Employees complain to be the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented? - ✔✔Email Filtering

Which of the following is used on a wireless network to identify the network name? - ✔✔SSID You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? - ✔✔WPA Which of the following features is supplied by WPA2 on a wireless network? - ✔✔Authentication and encryption A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this? - ✔✔5GHz A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which is the best reason to upgrade? - ✔✔Improved Performance

training, or added functionality. What is the name of this model? - ✔✔Open- Source Software that requires a monthly subscription fee is often called. - ✔✔Software as a service What is software that is delivered over the Internet through a web browser called? - ✔✔Web applications Which installation method often requires you to immediately install updates from the Internet after installation is complete? - ✔✔CD or DVD installation Which installation method is most likely to put your computer at risk of downloading a virus? - ✔✔Internet installation

Which application makes sure your computer has the most recent versions of its system software? - ✔✔Windows Update What are three access control security services? (Choose three.) - ✔✔- accounting

  • authorization
  • authentication What are two methods that ensure confidentiality? (Choose two.) - ✔✔- authentication
  • encryption
  • access control What are two common hash functions? (Choose two.) - ✔✔- MD
  • SHA

What is a method of sending information from one device to another using removable media? - ✔✔Sneakernet Data transmission involves sending information from one device to another. There are numerous methods to transmit information between devices including:

  • ✔✔Sneaker net - uses removable media to physically move data from one computer to another Wired networks - uses cables to transmit data Wireless networks - uses radio waves to transmit data

What mechanism can organizations use to prevent accidental changes by authorized users? - ✔✔- Version control Two users cannot update the same object. Objects can be files, database records, or transactions. For example, the first user to open a document has the permission to change that document; the second person has a read-only version. What is a secure virtual network called that uses the public network? - ✔✔VPN What is a virtual private network (VPN) Network? - ✔✔A virtual private network (VPN) is a secure virtual network that uses the public network (i.e., the Internet). The security of a VPN lies in the encryption of packet content between the endpoints that define the VPN. What are methods to help to ensure data integrity? - ✔✔-hashing

  • data consistency checks
  • access controls