Practice Free 112-12 Exam Online Questions
Question #121
What is the primary purpose of email encryption?
- A . To enhance email readability.
- B . To protect email content from unauthorized access.
- C . To prevent emails from being sent to spam folders.
- D . To block all incoming email threats automatically.
Correct Answer: B
B
Explanation:
Email encryption ensures that only the intended recipient can access the email content, safeguarding it from unauthorized parties.
B
Explanation:
Email encryption ensures that only the intended recipient can access the email content, safeguarding it from unauthorized parties.
Question #122
What type of malware opens a backdoor for attackers to access systems?
- A . Worm
- B . Backdoor Trojan
- C . Adware
- D . Spyware
Correct Answer: B
B
Explanation:
Backdoor Trojans create hidden access points, allowing attackers to control infected systems remotely.
B
Explanation:
Backdoor Trojans create hidden access points, allowing attackers to control infected systems remotely.
Question #123
What is the purpose of reviewing application permissions on social networks?
- A . To improve account recovery options.
- B . To limit third-party apps from accessing sensitive data.
- C . To enable faster login times.
- D . To increase the visibility of shared posts.
Correct Answer: B
B
Explanation:
Reviewing app permissions ensures that third-party applications only access data that is necessary and authorized by the user.
B
Explanation:
Reviewing app permissions ensures that third-party applications only access data that is necessary and authorized by the user.
Question #124
A ransomware attack primarily affects which security element?
- A . Confidentiality
- B . Availability
- C . Integrity
- D . Scalability
Correct Answer: B
B
Explanation:
Ransomware encrypts data and systems, preventing access until a ransom is paid, compromising availability.
B
Explanation:
Ransomware encrypts data and systems, preventing access until a ransom is paid, compromising availability.
Question #125
What is a benefit of enabling voice recognition on smart speakers?
- A . Faster response to commands.
- B . Preventing unauthorized users from accessing the device.
- C . Allowing multiple users to access sensitive data.
- D . Simplifying device configuration.
Correct Answer: B
B
Explanation:
Voice recognition ensures that only authorized users can control the device, enhancing security and privacy.
B
Explanation:
Voice recognition ensures that only authorized users can control the device, enhancing security and privacy.
Question #126
Which two actions can reduce the risk of identity theft on social media?
- A . Avoiding oversharing personal details and using privacy settings effectively
- B . Accepting all friend requests and disabling security alerts
- C . Ignoring updates to social media platforms and allowing all app permissions
- D . Using weak passwords and avoiding login notifications
Correct Answer: A
A
Explanation:
Limiting shared information and customizing privacy settings reduce the risk of identity theft and unauthorized access.
A
Explanation:
Limiting shared information and customizing privacy settings reduce the risk of identity theft and unauthorized access.
Question #127
What is a common feature of secure instant messaging apps?
- A . Lack of encryption
- B . Automatic logging of all chats
- C . End-to-end encryption of messages
- D . Mandatory data sharing with advertisers
Correct Answer: C
C
Explanation:
Secure messaging apps use end-to-end encryption to ensure that messages remain private and cannot be accessed by unauthorized parties.
C
Explanation:
Secure messaging apps use end-to-end encryption to ensure that messages remain private and cannot be accessed by unauthorized parties.
Question #128
Which type of attack is often carried out through unsecured instant messaging platforms?
- A . Phishing attacks
- B . Distributed Denial-of-Service (DDoS) attacks
- C . SQL injection attacks
- D . Man-in-the-middle attacks
Correct Answer: A
A
Explanation:
Phishing attacks are common on unsecured messaging platforms, where malicious links deceive users into providing sensitive information.
A
Explanation:
Phishing attacks are common on unsecured messaging platforms, where malicious links deceive users into providing sensitive information.
Question #129
What is the purpose of versioning in cloud backups?
- A . To store multiple copies of a file at different stages.
- B . To enhance the speed of recovery processes.
- C . To increase storage space for new backups.
- D . To synchronize files in real-time.
Correct Answer: A
A
Explanation:
Versioning stores multiple iterations of a file, allowing users to retrieve previous versions if needed.
A
Explanation:
Versioning stores multiple iterations of a file, allowing users to retrieve previous versions if needed.
Question #130
How does adware affect a system?
- A . Encrypts system files until a ransom is paid.
- B . Displays unwanted advertisements, sometimes compromising privacy.
- C . Deletes critical system files.
- D . Modifies system settings to reduce performance.
Correct Answer: B
B
Explanation:
Adware generates unwanted advertisements and may collect user data to target personalized ads, affecting system usability.
B
Explanation:
Adware generates unwanted advertisements and may collect user data to target personalized ads, affecting system usability.