TSA Cybersecurity Study Guide Latest Update

Study Guides Aug 17, 2025
Loading...

Loading document viewer...

Page 0 of 0

Document Text

TSA Cybersecurity Study Guide Latest Update 2024-2025 Actual Exam 200 Questions and 100% Verified Correct Answers Guaranteed A+

________ computing refers to services and applications that run remotely over the

Internet. - CORRECT ANSWER: Cloud

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located

anywhere in the world, even remote areas? - CORRECT ANSWER: Satellite

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following

frequencies or protocols would accomplish this? - CORRECT ANSWER: 5GHz

A pop-up blocker is a web browser feature that _____. - CORRECT ANSWER:

Prevents unwanted advertisements.

A service that lets you store data in a remote location over the Internet is called ______.

- CORRECT ANSWER: Cloud Storage

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer

to upgrade to 802.11ac. Which is the best reason to upgrade? - CORRECT ANSWER:

Improved Performance

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the best choice for this connectivity? - CORRECT

ANSWER: Access Point

Acceptable Use Policy (AUP) - CORRECT ANSWER: A statement that describes what

users can and cannot do on the various system components.

Accounting - Controlling Access - CORRECT ANSWER: Accounting keeps track of

what users do, including what they access, the amount of time they access resources, and any changes made. For example, a bank keeps track of each customer account. An audit of that system can reveal the time and amount of all transactions and the employee or system that executed the transactions. Cybersecurity accounting services work the same way. The system tracks each data transaction and provides auditing results.

  • / 3

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is most likely the problem? - CORRECT ANSWER: Proxy Settings

Assigning a unique letter (such as N:) to a shared drive is called ____ the drive. -

CORRECT ANSWER: Mapping

Authentication - Controlling Access - CORRECT ANSWER: Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or ID. In addition, users need to verify their identity by providing one of the

following:

-Something they know (such as a password) -Something they have (such as a token or card) -Something they are (such a fingerprint)

Authorization - Controlling Access - CORRECT ANSWER: Authorization services

determine which resources users can access, along with the operations that users can perform, as shown in Figure 2. Some systems accomplish this by using an access control list, or an ACL. Authorization can also control when a user has access to a specific resource. For example, employees may have access to a sales database during work hours, but the system locks them out after hours.

Browser - CORRECT ANSWER: A software application that accesses web applications

and websites.

Buffering - CORRECT ANSWER: The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.

Clickable text or images that take you to different sites on the World Wide Web are

called ____. - CORRECT ANSWER: Hyperlinks

Cloud Computing - CORRECT ANSWER: The use of remote services hosted on the

internet to store, manage, and process data.

Cloud Storage - CORRECT ANSWER: A cloud computing service that remotely

maintains, manages, and backs up data and makes that data available to users over a network.

Data transmission involves sending information from one device to another. There are

numerous methods to transmit information between devices including: - CORRECT

ANSWER: Sneaker net - uses removable media to physically move data from one

computer to another

Wired networks - uses cables to transmit data

  • / 3

Wireless networks - uses radio waves to transmit data

DNS - CORRECT ANSWER: Matches unique IP addresses with easy-to-read URLs

Domain Name System (DNS) - CORRECT ANSWER: A system and set of rules that

associates domain names (such as web servers) with unique IP addresses so that users can find and use network resources by an easily readable name instead of by IP address.

Employees complain to be the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be

implemented? - CORRECT ANSWER: Email Filtering

File Transfer Protocol (FTP) - CORRECT ANSWER: A set of rules that govern the

transfer of files between computers.

How does cybersecurity accounting track and monitor? - CORRECT ANSWER:

Cybersecurity accounting tracks and monitors in real time. Websites, like Norse, show attacks in real-time based on data collected as part of an accounting or tracking system.

HTTP - CORRECT ANSWER: Transfers hypertext pages on the World Wide Web

HTTPS - CORRECT ANSWER: Encrypts and transfers hypertext pages on the World

Wide Web

Hypertext Markup Language (HTML) - CORRECT ANSWER: A programming language

that web pages use to display content through web browsers.

Hypertext Transfer Protocol (HTTP) - CORRECT ANSWER: A set of rules that govern

the transfer of web content between computers.

Internet - CORRECT ANSWER: An interconnected global public computer network.

Internet of Things (IoT) - CORRECT ANSWER: A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.

Internet Protocol - CORRECT ANSWER: Divides files into packets and routes them

through the Internet to their destination

Internet Service Provider (ISP) - CORRECT ANSWER: A company that provides

individuals and businesses access to the Internet and other related devices.

  • / 3

Download Document

Buy This Document

$5.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration
OR
Study Guides Documents
20.99/30 days
  • Full access to all Study Guides documents
  • Access for 30 days
  • Study materials and practice papers
Purchase Membership
Get download access to all Study Guides documents

Document Information

Category: Study Guides
Added: Aug 17, 2025
Description:

TSA Cybersecurity Study Guide Latest Update 2024-2025 Actual Exam 200 Questions and 100% Verified Correct Answers Guaranteed A+ ________ computing refers to services and applications that run remot...

Get this document $5.00