Practice Free 112-12 Exam Online Questions
Question #91
Which is a common threat in remote working environments?
- A . Physical theft of devices.
- B . Automatic encryption of all data.
- C . Improved system compatibility.
- D . Increased battery efficiency.
Correct Answer: A
A
Explanation:
Remote workers are at risk of device theft, which can lead to unauthorized access to sensitive company information.
A
Explanation:
Remote workers are at risk of device theft, which can lead to unauthorized access to sensitive company information.
Question #92
Which of the following describes a man-in-the-middle attack on email?
- A . Intercepting and altering email communication without the sender or recipient knowing.
- B . Sending multiple spam emails to overwhelm the recipient.
- C . Encrypting email content for privacy.
- D . Filtering malicious content from emails.
Correct Answer: A
A
Explanation:
A man-in-the-middle attack intercepts and alters email communication, potentially exposing or tampering with sensitive information.
A
Explanation:
A man-in-the-middle attack intercepts and alters email communication, potentially exposing or tampering with sensitive information.
Question #93
Which of the following is a primary objective of data classification?
- A . Enhance system performance
- B . Reduce storage requirements
- C . Prioritize security measures based on data sensitivity
- D . Enable universal data sharing across departments
Correct Answer: C
C
Explanation:
Data classification organizes information by sensitivity, helping to apply appropriate security controls and prioritize protection efforts.
C
Explanation:
Data classification organizes information by sensitivity, helping to apply appropriate security controls and prioritize protection efforts.
Question #94
Which of the following is a safe practice for instant messaging?
- A . Accepting file transfers only from trusted contacts
- B . Disabling end-to-end encryption
- C . Using generic usernames for anonymity
- D . Ignoring software updates for IM clients
Correct Answer: A
A
Explanation:
Accepting files only from trusted sources minimizes the risk of malware or malicious content infiltrating your system via IM.
A
Explanation:
Accepting files only from trusted sources minimizes the risk of malware or malicious content infiltrating your system via IM.
Question #95
What is the risk of using default passwords on IoT devices?
- A . Faster device communication.
- B . Increased vulnerability to brute force attacks.
- C . Enhanced compatibility with other devices.
- D . Simplified setup for secure networks.
Correct Answer: B
B
Explanation:
Default passwords are widely known and can be easily exploited through brute force attacks, compromising device security.
B
Explanation:
Default passwords are widely known and can be easily exploited through brute force attacks, compromising device security.
Question #96
What is the purpose of two-factor authentication (2FA) for online accounts?
- A . To provide faster access to online services.
- B . To enhance security by requiring two forms of verification.
- C . To eliminate the need for passwords.
- D . To bypass firewalls during login.
Correct Answer: B
B
Explanation:
Two-factor authentication enhances security by requiring two verification factors, such as a password and a one-time code, to access accounts.
B
Explanation:
Two-factor authentication enhances security by requiring two verification factors, such as a password and a one-time code, to access accounts.
Question #97
Why is regular security training important?
- A . To avoid compliance penalties
- B . To keep employees informed about evolving threats
- C . To reduce encryption overhead
- D . To maintain software licensing requirements
Correct Answer: B
B
Explanation:
Regular training helps employees recognize and respond to evolving cybersecurity threats, improving overall security posture.
B
Explanation:
Regular training helps employees recognize and respond to evolving cybersecurity threats, improving overall security posture.
Question #98
What is the purpose of enabling logging on a home network?
- A . To monitor and record network activity for suspicious behavior.
- B . To disable encryption during data transmission.
- C . To improve network speed during backups.
- D . To allow unrestricted access to all users.
Correct Answer: A
A
Explanation:
Network logging tracks activity, helping identify unauthorized access or suspicious behavior for improved security.
A
Explanation:
Network logging tracks activity, helping identify unauthorized access or suspicious behavior for improved security.
Question #99
Which of the following best describes a zero-day attack?
- A . Exploiting a known vulnerability without a patch.
- B . Attacking systems after a vulnerability is patched.
- C . Using outdated software for malicious purposes.
- D . Monitoring network traffic for suspicious activity.
Correct Answer: A
A
Explanation:
Zero-day attacks exploit software vulnerabilities that are unknown to vendors, leaving systems defenseless until a patch is released.
A
Explanation:
Zero-day attacks exploit software vulnerabilities that are unknown to vendors, leaving systems defenseless until a patch is released.
Question #100
Which two steps should be taken to ensure antivirus effectiveness?
- A . Schedule regular scans and keep software updated.
- B . Disable real-time protection and use manual scans.
- C . Remove software firewalls and enable default settings.
- D . Install multiple antivirus programs for redundancy.
Correct Answer: A
A
Explanation:
Regular scans and updates keep antivirus software effective against new and existing threats.
A
Explanation:
Regular scans and updates keep antivirus software effective against new and existing threats.