Practice Free 112-12 Exam Online Questions
Question #11
Which two measures help maintain the availability of data during an attack?
- A . Data redundancy and failover systems
- B . Strong passwords and encryption
- C . Multi-factor authentication and hashing
- D . Firewalls and intrusion detection systems
Correct Answer: A
A
Explanation:
Redundancy and failover systems ensure continuous access to data even during system failures or attacks.
A
Explanation:
Redundancy and failover systems ensure continuous access to data even during system failures or attacks.
Question #12
Which of the following is a threat posed by rogue access points?
- A . Enhanced encryption
- B . Interception of sensitive data sent over Wi-Fi
- C . Improved connection speeds
- D . Limited access to mobile applications
Correct Answer: B
B
Explanation:
Rogue access points mimic legitimate Wi-Fi networks, tricking users into connecting and exposing their data to interception.
B
Explanation:
Rogue access points mimic legitimate Wi-Fi networks, tricking users into connecting and exposing their data to interception.
Question #13
What is the purpose of mobile device management (MDM) tools?
- A . To track device performance
- B . To secure, monitor, and manage mobile devices remotely
- C . To uninstall unused applications
- D . To improve internet speed
Correct Answer: B
B
Explanation:
MDM tools allow organizations to manage security policies, track devices, and protect data on mobile devices remotely.
B
Explanation:
MDM tools allow organizations to manage security policies, track devices, and protect data on mobile devices remotely.
Question #14
Which feature helps ensure a child’s safety while gaming online?
- A . Allowing access to games without age ratings
- B . Enabling parental controls to monitor in-game chats
- C . Sharing login credentials with other players
- D . Disabling antivirus software during gameplay
Correct Answer: B
B
Explanation:
Parental controls monitor in-game interactions, helping to block inappropriate content and protect children from online predators.
B
Explanation:
Parental controls monitor in-game interactions, helping to block inappropriate content and protect children from online predators.
Question #15
What is the primary role of Infrastructure-as-a-Service (IaaS)?
- A . Providing a platform for application development.
- B . Offering pre-installed software applications.
- C . Delivering virtualized computing resources.
- D . Securing cloud storage data.
Correct Answer: C
C
Explanation:
IaaS provides virtualized computing resources like servers and storage, enabling flexible and scalable infrastructure.
C
Explanation:
IaaS provides virtualized computing resources like servers and storage, enabling flexible and scalable infrastructure.
Question #16
What is the primary advantage of implementing access controls?
- A . To speed up system processes.
- B . To restrict unauthorized access to sensitive information.
- C . To simplify data encryption.
- D . To reduce the need for system audits.
Correct Answer: B
B
Explanation:
Access controls ensure only authorized individuals can access sensitive information, maintaining confidentiality and integrity.
B
Explanation:
Access controls ensure only authorized individuals can access sensitive information, maintaining confidentiality and integrity.
Question #17
What is the risk of using outdated firmware on a wireless router?
- A . Reduced network performance.
- B . Increased vulnerability to security exploits.
- C . Enhanced data encryption.
- D . Improved device compatibility.
Correct Answer: B
B
Explanation:
Outdated firmware may contain unpatched vulnerabilities that attackers can exploit to gain unauthorized access.
B
Explanation:
Outdated firmware may contain unpatched vulnerabilities that attackers can exploit to gain unauthorized access.
Question #18
What is a potential risk of using open wireless networks?
- A . Faster connection speeds for authorized devices.
- B . Exposure to unauthorized users and data theft.
- C . Improved device compatibility.
- D . Reduced data encryption.
Correct Answer: B
B
Explanation:
Open networks lack encryption, exposing sensitive data to unauthorized users and potential theft.
B
Explanation:
Open networks lack encryption, exposing sensitive data to unauthorized users and potential theft.
Question #19
What is a secure practice for downloading mobile apps?
- A . Downloading apps from trusted app stores like Google Play or Apple App Store
- B . Using third-party app stores to find exclusive apps
- C . Ignoring app permissions during installation
- D . Disabling antivirus software to speed up installation
Correct Answer: A
A
Explanation:
Trusted app stores verify apps for malware and security risks, reducing the likelihood of downloading malicious software.
A
Explanation:
Trusted app stores verify apps for malware and security risks, reducing the likelihood of downloading malicious software.
Question #20
What is the role of app-specific permissions in mobile security?
- A . To enable seamless app installation.
- B . To restrict apps from accessing unnecessary data or resources.
- C . To improve app performance during multitasking.
- D . To allow automatic updates for all apps.
Correct Answer: B
B
Explanation:
App-specific permissions limit access to sensitive resources, reducing the risk of data breaches or misuse.
B
Explanation:
App-specific permissions limit access to sensitive resources, reducing the risk of data breaches or misuse.