Practice Free 112-12 Exam Online Questions
Question #131
What should be done after installing antivirus software?
- A . Disconnect the system from the internet.
- B . Update the software and run a full system scan.
- C . Disable real-time scanning to improve performance.
- D . Perform a factory reset on the system.
Correct Answer: B
B
Explanation:
Updating antivirus software ensures it recognizes the latest threats, and running a full system scan identifies existing malware.
B
Explanation:
Updating antivirus software ensures it recognizes the latest threats, and running a full system scan identifies existing malware.
Question #132
What is a benefit of using cloud encryption keys managed by the user?
- A . Improved network performance.
- B . Enhanced control over data security.
- C . Reduced need for multi-factor authentication.
- D . Automatic backup of encryption keys.
Correct Answer: B
B
Explanation:
User-managed encryption keys provide greater control over data security, ensuring only authorized parties can decrypt the data.
B
Explanation:
User-managed encryption keys provide greater control over data security, ensuring only authorized parties can decrypt the data.
Question #133
Which tool helps monitor remote worker compliance with security policies?
- A . Endpoint detection and response (EDR) solutions.
- B . Data compression software.
- C . Open network access points.
- D . Encryption-free communication tools.
Correct Answer: A
A
Explanation:
EDR tools monitor devices, detect potential threats, and ensure compliance with security policies in remote working environments.
A
Explanation:
EDR tools monitor devices, detect potential threats, and ensure compliance with security policies in remote working environments.
Question #134
What is the main advantage of incremental backups?
- A . They back up all data every time.
- B . They are faster and require less storage space.
- C . They provide real-time encryption.
- D . They automatically delete old backups.
Correct Answer: B
B
Explanation:
Incremental backups save only the changes made since the last backup, reducing storage needs and backup time.
B
Explanation:
Incremental backups save only the changes made since the last backup, reducing storage needs and backup time.
Question #135
Which type of cloud model combines public and private cloud environments?
- A . Public cloud
- B . Hybrid cloud
- C . Private cloud
- D . Multi-cloud
Correct Answer: B
B
Explanation:
Hybrid clouds integrate public and private cloud environments, offering flexibility, scalability, and enhanced security.
B
Explanation:
Hybrid clouds integrate public and private cloud environments, offering flexibility, scalability, and enhanced security.
Question #136
What is the first step in the process of installing antivirus software?
- A . Running a full system scan.
- B . Checking the system for existing malware.
- C . Downloading the software from a trusted source.
- D . Updating the software definitions.
Correct Answer: C
C
Explanation:
The installation process begins with downloading antivirus software from a reliable source to ensure its integrity.
C
Explanation:
The installation process begins with downloading antivirus software from a reliable source to ensure its integrity.
Question #137
What is the role of identity and access management (IAM) in cloud security?
- A . To monitor network traffic for unauthorized activities.
- B . To enforce user authentication and access control policies.
- C . To ensure data remains unencrypted during transmission.
- D . To allow unrestricted access to cloud resources.
Correct Answer: B
B
Explanation:
IAM ensures that only authorized users have access to specific cloud resources, reducing the risk of unauthorized activities.
B
Explanation:
IAM ensures that only authorized users have access to specific cloud resources, reducing the risk of unauthorized activities.
Question #138
What is the primary purpose of a VPN?
- A . To encrypt and secure internet traffic.
- B . To increase browsing speed.
- C . To disable firewalls temporarily.
- D . To allow unrestricted access to blocked websites.
Correct Answer: A
A
Explanation:
VPNs encrypt internet traffic, masking a user’s IP address and ensuring secure and private browsing.
A
Explanation:
VPNs encrypt internet traffic, masking a user’s IP address and ensuring secure and private browsing.
Question #139
What is a primary function of encryption in data security?
- A . Improve system performance.
- B . Prevent unauthorized access to data.
- C . Enable seamless data sharing.
- D . Reduce storage requirements.
Correct Answer: B
B
Explanation:
Encryption converts data into unreadable formats, ensuring that only authorized users with decryption keys can access it.
B
Explanation:
Encryption converts data into unreadable formats, ensuring that only authorized users with decryption keys can access it.
Question #140
What is a key security risk associated with gaming consoles?
- A . Improved game performance after updates.
- B . Account breaches due to phishing or weak passwords.
- C . Enhanced encryption for network connections.
- D . Reduced functionality during online gameplay.
Correct Answer: B
B
Explanation:
Weak passwords and phishing attacks can compromise gaming accounts, exposing personal and financial information.
B
Explanation:
Weak passwords and phishing attacks can compromise gaming accounts, exposing personal and financial information.