Practice Free 112-12 Exam Online Questions
Question #101
What is the role of checksum verification in backups?
- A . To reduce storage requirements.
- B . To verify the integrity of backup files.
- C . To enhance encryption protocols.
- D . To enable automatic file synchronization.
Correct Answer: B
B
Explanation:
Checksum verification ensures that backup files are intact and have not been corrupted during the backup process.
B
Explanation:
Checksum verification ensures that backup files are intact and have not been corrupted during the backup process.
Question #102
Which two actions help secure personal information on social media?
- A . Restricting profile visibility and limiting shared personal details
- B . Allowing unrestricted access to your account and accepting all app permissions
- C . Ignoring security updates and disabling MFA
- D . Posting personal updates in public forums and enabling GPS tagging
Correct Answer: A
A
Explanation:
Limiting profile visibility and being cautious about shared details reduces exposure to unauthorized access and identity theft.
A
Explanation:
Limiting profile visibility and being cautious about shared details reduces exposure to unauthorized access and identity theft.
Question #103
What should users do to protect themselves from malicious browser extensions?
- A . Install extensions only from trusted sources.
- B . Disable all browser updates.
- C . Allow permissions for all installed extensions.
- D . Use outdated browsers for compatibility.
Correct Answer: A
A
Explanation:
Installing extensions from trusted sources ensures they are less likely to contain malicious code or compromise user security.
A
Explanation:
Installing extensions from trusted sources ensures they are less likely to contain malicious code or compromise user security.
Question #104
What is the primary reason for physically destroying hard drives?
- A . To reduce storage capacity.
- B . To ensure sensitive data cannot be recovered.
- C . To enable faster data deletion.
- D . To improve hardware performance.
Correct Answer: B
B
Explanation:
Physically destroying hard drives is a reliable method for permanently erasing data, preventing unauthorized recovery.
B
Explanation:
Physically destroying hard drives is a reliable method for permanently erasing data, preventing unauthorized recovery.
Question #105
Which two factors contribute to the loss of confidentiality in a system?
- A . Weak password policies
- B . Data encryption during transmission
- C . Lack of access controls
- D . Hashing techniques for validation
Correct Answer: A, C
A, C
Explanation:
Weak passwords and insufficient access controls expose systems to unauthorized access, compromising confidentiality.
A, C
Explanation:
Weak passwords and insufficient access controls expose systems to unauthorized access, compromising confidentiality.
Question #106
Which feature enhances security during video conferencing?
- A . Using meeting passwords and enabling waiting rooms.
- B . Allowing open access for all participants.
- C . Disabling encryption for faster connections.
- D . Sharing meeting links publicly.
Correct Answer: A
A
Explanation:
Meeting passwords and waiting rooms prevent unauthorized users from joining, ensuring secure video conferences.
A
Explanation:
Meeting passwords and waiting rooms prevent unauthorized users from joining, ensuring secure video conferences.
Question #107
Which two strategies improve overall malware prevention?
- A . Regular user awareness training and updating software.
- B . Disabling real-time antivirus protection for speed.
- C . Using strong passwords and regularly clearing cache files.
- D . Employing firewalls and avoiding public Wi-Fi for sensitive tasks.
Correct Answer: A, D
A, D
Explanation:
Awareness training and updated software reduce user-related risks, while firewalls and avoiding public Wi-Fi minimize external vulnerabilities.
A, D
Explanation:
Awareness training and updated software reduce user-related risks, while firewalls and avoiding public Wi-Fi minimize external vulnerabilities.
Question #108
Which two features are commonly found in antivirus software?
- A . Real-time scanning and scheduled scans
- B . Data encryption and physical security
- C . Intrusion detection and firewall settings
- D . Multi-factor authentication and password management
Correct Answer: A
A
Explanation:
Antivirus software often includes real-time scanning to detect threats as they occur and scheduled scans for regular system checks.
A
Explanation:
Antivirus software often includes real-time scanning to detect threats as they occur and scheduled scans for regular system checks.
Question #109
What is a common threat to wireless networks?
- A . Improved connection speeds.
- B . Unauthorized access due to weak passwords.
- C . Enhanced encryption protocols.
- D . Limited device compatibility.
Correct Answer: B
B
Explanation:
Weak passwords on wireless networks make them vulnerable to unauthorized access and potential data breaches.
B
Explanation:
Weak passwords on wireless networks make them vulnerable to unauthorized access and potential data breaches.
Question #110
What should users do before clicking a link shared on social networks?
- A . Check the URL for legitimacy and verify the source.
- B . Click immediately if it seems interesting.
- C . Disable browser security for smooth access.
- D . Share the link with others to confirm authenticity.
Correct Answer: A
A
Explanation:
Verifying the legitimacy of URLs and sources minimizes the risk of falling victim to phishing or malware attacks.
A
Explanation:
Verifying the legitimacy of URLs and sources minimizes the risk of falling victim to phishing or malware attacks.