TSA Cybersecurity Study Guide Latest Update 2024-2025 Actual Exam 200 Questions and 100% Verified Correct Answers Guaranteed A+
________ computing refers to services and applications that run remotely over the
Internet. - CORRECT ANSWER: Cloud
A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located
anywhere in the world, even remote areas? - CORRECT ANSWER: Satellite
A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following
frequencies or protocols would accomplish this? - CORRECT ANSWER: 5GHz
A pop-up blocker is a web browser feature that _____. - CORRECT ANSWER:
Prevents unwanted advertisements.
A service that lets you store data in a remote location over the Internet is called ______.
- CORRECT ANSWER: Cloud Storage
A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer
to upgrade to 802.11ac. Which is the best reason to upgrade? - CORRECT ANSWER:
Improved Performance
A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the best choice for this connectivity? - CORRECT
ANSWER: Access Point
Acceptable Use Policy (AUP) - CORRECT ANSWER: A statement that describes what
users can and cannot do on the various system components.
Accounting - Controlling Access - CORRECT ANSWER: Accounting keeps track of
what users do, including what they access, the amount of time they access resources, and any changes made. For example, a bank keeps track of each customer account. An audit of that system can reveal the time and amount of all transactions and the employee or system that executed the transactions. Cybersecurity accounting services work the same way. The system tracks each data transaction and provides auditing results.
- / 3
After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is most likely the problem? - CORRECT ANSWER: Proxy Settings
Assigning a unique letter (such as N:) to a shared drive is called ____ the drive. -
CORRECT ANSWER: Mapping
Authentication - Controlling Access - CORRECT ANSWER: Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or ID. In addition, users need to verify their identity by providing one of the
following:
-Something they know (such as a password) -Something they have (such as a token or card) -Something they are (such a fingerprint)
Authorization - Controlling Access - CORRECT ANSWER: Authorization services
determine which resources users can access, along with the operations that users can perform, as shown in Figure 2. Some systems accomplish this by using an access control list, or an ACL. Authorization can also control when a user has access to a specific resource. For example, employees may have access to a sales database during work hours, but the system locks them out after hours.
Browser - CORRECT ANSWER: A software application that accesses web applications
and websites.
Buffering - CORRECT ANSWER: The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.
Clickable text or images that take you to different sites on the World Wide Web are
called ____. - CORRECT ANSWER: Hyperlinks
Cloud Computing - CORRECT ANSWER: The use of remote services hosted on the
internet to store, manage, and process data.
Cloud Storage - CORRECT ANSWER: A cloud computing service that remotely
maintains, manages, and backs up data and makes that data available to users over a network.
Data transmission involves sending information from one device to another. There are
numerous methods to transmit information between devices including: - CORRECT
ANSWER: Sneaker net - uses removable media to physically move data from one
computer to another
Wired networks - uses cables to transmit data
- / 3
Wireless networks - uses radio waves to transmit data
DNS - CORRECT ANSWER: Matches unique IP addresses with easy-to-read URLs
Domain Name System (DNS) - CORRECT ANSWER: A system and set of rules that
associates domain names (such as web servers) with unique IP addresses so that users can find and use network resources by an easily readable name instead of by IP address.
Employees complain to be the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be
implemented? - CORRECT ANSWER: Email Filtering
File Transfer Protocol (FTP) - CORRECT ANSWER: A set of rules that govern the
transfer of files between computers.
How does cybersecurity accounting track and monitor? - CORRECT ANSWER:
Cybersecurity accounting tracks and monitors in real time. Websites, like Norse, show attacks in real-time based on data collected as part of an accounting or tracking system.
HTTP - CORRECT ANSWER: Transfers hypertext pages on the World Wide Web
HTTPS - CORRECT ANSWER: Encrypts and transfers hypertext pages on the World
Wide Web
Hypertext Markup Language (HTML) - CORRECT ANSWER: A programming language
that web pages use to display content through web browsers.
Hypertext Transfer Protocol (HTTP) - CORRECT ANSWER: A set of rules that govern
the transfer of web content between computers.
Internet - CORRECT ANSWER: An interconnected global public computer network.
Internet of Things (IoT) - CORRECT ANSWER: A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.
Internet Protocol - CORRECT ANSWER: Divides files into packets and routes them
through the Internet to their destination
Internet Service Provider (ISP) - CORRECT ANSWER: A company that provides
individuals and businesses access to the Internet and other related devices.
- / 3