Practice Free 112-12 Exam Online Questions
Question #1
What is a common feature of a secure wireless network?
- A . Use of strong encryption protocols like WPA3.
- B . Default router settings for convenience.
- C . Open network access for all users.
- D . Lack of password protection for guest networks.
Correct Answer: A
A
Explanation:
Strong encryption protocols, such as WPA3, ensure secure communication over wireless networks.
A
Explanation:
Strong encryption protocols, such as WPA3, ensure secure communication over wireless networks.
Question #2
What is the main advantage of using cloud backups?
- A . Offline access during network outages.
- B . Automated backups and remote accessibility.
- C . Reduced encryption requirements.
- D . Faster performance compared to local drives.
Correct Answer: B
B
Explanation:
Cloud backups offer automation and remote access, ensuring data is available from any location with an internet connection.
B
Explanation:
Cloud backups offer automation and remote access, ensuring data is available from any location with an internet connection.
Question #3
Which wireless network setting reduces the likelihood of unauthorized access?
- A . Disabling SSID broadcasting.
- B . Using default router credentials.
- C . Enabling WEP encryption.
- D . Allowing guest access by default.
Correct Answer: A
A
Explanation:
Disabling SSID broadcasting hides the network from casual attackers, making it harder to detect and access.
A
Explanation:
Disabling SSID broadcasting hides the network from casual attackers, making it harder to detect and access.
Question #4
What should users check before entering credentials on a website linked in an email?
- A . The design of the email header
- B . The presence of HTTPS and the legitimacy of the URL
- C . The length of the email content
- D . The number of attachments in the email
Correct Answer: B
B
Explanation:
Ensuring the website uses HTTPS and verifying the URL prevents users from entering credentials on phishing sites.
B
Explanation:
Ensuring the website uses HTTPS and verifying the URL prevents users from entering credentials on phishing sites.
Question #5
Which type of security loss occurs due to a ransomware attack?
- A . Loss of availability
- B . Loss of confidentiality
- C . Loss of integrity
- D . Regulatory penalties
Correct Answer: A
A
Explanation:
Ransomware attacks primarily affect availability by restricting access to systems and data until a ransom is paid.
A
Explanation:
Ransomware attacks primarily affect availability by restricting access to systems and data until a ransom is paid.
Question #6
Which two factors improve antivirus software efficiency?
- A . Frequent updates and real-time protection
- B . Increased CPU performance and reduced scans
- C . Uninstalling unused software and firewalls
- D . Disabling non-essential system processes
Correct Answer: A
A
Explanation:
Regular updates and real-time protection keep antivirus software prepared for current threats and ensure constant monitoring.
A
Explanation:
Regular updates and real-time protection keep antivirus software prepared for current threats and ensure constant monitoring.
Question #7
Why is secure video conferencing important for remote work?
- A . To improve audio quality during calls.
- B . To prevent unauthorized access to virtual meetings.
- C . To reduce the cost of internet usage.
- D . To simplify scheduling for participants.
Correct Answer: B
B
Explanation:
Secure video conferencing protects sensitive discussions from eavesdropping or unauthorized participation.
B
Explanation:
Secure video conferencing protects sensitive discussions from eavesdropping or unauthorized participation.
Question #8
Which two measures can enhance both data integrity and availability?
- A . Regular data backups and hash verification
- B . Firewalls and intrusion detection systems
- C . Biometric authentication and monitoring
- D . Security awareness training and disaster recovery plans
Correct Answer: A, D
A, D
Explanation:
Data backups and hash verification protect integrity, while disaster recovery ensures availability during incidents.
A, D
Explanation:
Data backups and hash verification protect integrity, while disaster recovery ensures availability during incidents.
Question #9
Which of the following is a step to prevent malware infections? (Choose two)
- A . Regularly update operating systems and software.
- B . Avoid using antivirus software to reduce system overhead.
- C . Open email attachments from unknown senders.
- D . Download software only from trusted sources.
Correct Answer: A, D
A, D
Explanation:
Keeping systems updated and downloading from trusted sources minimizes vulnerabilities that malware can exploit.
A, D
Explanation:
Keeping systems updated and downloading from trusted sources minimizes vulnerabilities that malware can exploit.
Question #10
What is the risk of not securing IoT devices connected to smart home systems?
- A . Reduced device compatibility.
- B . Unauthorized access to home networks and systems.
- C . Improved encryption for device communications.
- D . Limited functionality of connected devices.
Correct Answer: B
B
Explanation:
Unsecured IoT devices can be exploited to access and control smart home systems, compromising security and privacy.
B
Explanation:
Unsecured IoT devices can be exploited to access and control smart home systems, compromising security and privacy.