Practice Free 112-12 Exam Online Questions
Question #111
What is a benefit of using a home network safety checklist?
- A . Ensuring all devices are connected without encryption.
- B . Identifying and addressing potential security vulnerabilities.
- C . Disabling security features for convenience.
- D . Allowing unrestricted access to all users.
Correct Answer: B
B
Explanation:
A safety checklist helps identify potential weaknesses and implement best practices to secure the home network.
B
Explanation:
A safety checklist helps identify potential weaknesses and implement best practices to secure the home network.
Question #112
What is the purpose of device lockout policies in mobile security?
- A . To prevent unauthorized access after multiple failed login attempts.
- B . To disable encryption for faster access.
- C . To improve app multitasking efficiency.
- D . To allow unrestricted access to sensitive apps.
Correct Answer: A
A
Explanation:
Device lockout policies temporarily block access after repeated failed attempts, reducing the risk of unauthorized access.
A
Explanation:
Device lockout policies temporarily block access after repeated failed attempts, reducing the risk of unauthorized access.
Question #113
Which type of malware modifies its code to avoid detection?
- A . Polymorphic malware
- B . Spyware
- C . Adware
- D . Keylogger
Correct Answer: A
A
Explanation:
Polymorphic malware frequently changes its code structure, making it harder for antivirus programs to detect.
A
Explanation:
Polymorphic malware frequently changes its code structure, making it harder for antivirus programs to detect.
Question #114
Which is a common security vulnerability in mobile devices?
- A . Excessive data storage
- B . Weak or reused passwords
- C . Improved encryption protocols
- D . Limited storage capacity
Correct Answer: B
B
Explanation:
Weak or reused passwords make mobile devices vulnerable to unauthorized access and potential breaches.
B
Explanation:
Weak or reused passwords make mobile devices vulnerable to unauthorized access and potential breaches.
Question #115
Which two practices ensure secure cloud backups?
- A . Encrypting data before uploading and using strong authentication methods.
- B . Using weak passwords and avoiding encryption protocols.
- C . Disabling monitoring tools and ignoring suspicious activities.
- D . Sharing login credentials with trusted contacts and bypassing firewalls.
Correct Answer: A
A
Explanation:
Encryption protects the confidentiality of backup data, while strong authentication ensures only authorized users can access it.
A
Explanation:
Encryption protects the confidentiality of backup data, while strong authentication ensures only authorized users can access it.
Question #116
What is the role of a firewall in data security?
- A . Encrypt sensitive information
- B . Monitor and control incoming and outgoing network traffic
- C . Authenticate users before granting system access
- D . Prevent physical access to servers
Correct Answer: B
B
Explanation:
Firewalls act as a barrier between trusted and untrusted networks, filtering traffic based on security policies to prevent unauthorized access.
B
Explanation:
Firewalls act as a barrier between trusted and untrusted networks, filtering traffic based on security policies to prevent unauthorized access.
Question #117
What is the role of encryption in securing IoT device communications?
- A . To enhance device performance during use.
- B . To protect data from interception during transmission.
- C . To enable automatic updates for devices.
- D . To allow unrestricted access to device settings.
Correct Answer: B
B
Explanation:
Encryption ensures that data transmitted by IoT devices is secure and cannot be intercepted or read by unauthorized parties.
B
Explanation:
Encryption ensures that data transmitted by IoT devices is secure and cannot be intercepted or read by unauthorized parties.
Question #118
What is a common method to protect IoT devices from botnet attacks?
- A . Using strong passwords and keeping firmware updated.
- B . Disabling encryption and allowing open network access.
- C . Sharing credentials across all devices.
- D . Ignoring suspicious activity in network logs.
Correct Answer: A
A
Explanation:
Strong passwords and updated firmware prevent unauthorized access, reducing the likelihood of IoT devices being added to botnets.
A
Explanation:
Strong passwords and updated firmware prevent unauthorized access, reducing the likelihood of IoT devices being added to botnets.
Question #119
Which of the following is a characteristic of a secure home network?
- A . Use of strong passwords and regular firmware updates.
- B . Enabling open access and ignoring suspicious activities.
- C . Disabling encryption and using default router settings.
- D . Avoiding updates to improve compatibility.
Correct Answer: A
A
Explanation:
Strong passwords and firmware updates protect against unauthorized access and vulnerabilities in the network.
A
Explanation:
Strong passwords and firmware updates protect against unauthorized access and vulnerabilities in the network.
Question #120
Which type of attack involves creating a fake profile to manipulate users?
- A . Phishing
- B . Impersonation
- C . Keylogging
- D . Spoofing
Correct Answer: B
B
Explanation:
Impersonation involves creating fake profiles to deceive users into sharing personal information or engaging in fraudulent activities.
B
Explanation:
Impersonation involves creating fake profiles to deceive users into sharing personal information or engaging in fraudulent activities.