Practice Free 112-12 Exam Online Questions
Question #21
What does the CIA triad aim to achieve?
- A . Regulatory compliance
- B . Comprehensive data security
- C . Data processing efficiency
- D . Encryption protocols
Correct Answer: B
B
Explanation:
The CIA triad―confidentiality, integrity, and availability―forms the foundation of a comprehensive approach to protecting information assets.
B
Explanation:
The CIA triad―confidentiality, integrity, and availability―forms the foundation of a comprehensive approach to protecting information assets.
Question #22
What is the best method to remove stubborn malware from a system?
- A . Reinstalling the operating system.
- B . Running an antivirus scan in safe mode.
- C . Disabling internet connectivity.
- D . Restarting the system in normal mode.
Correct Answer: B
B
Explanation:
Running antivirus software in safe mode helps remove malware by preventing it from running during the scan.
B
Explanation:
Running antivirus software in safe mode helps remove malware by preventing it from running during the scan.
Question #23
What is the primary purpose of data backup?
- A . To enhance device performance.
- B . To create a copy of data for recovery in case of loss.
- C . To encrypt sensitive data during storage.
- D . To improve internet speeds.
Correct Answer: B
B
Explanation:
Data backup ensures that critical information can be recovered if original files are lost, corrupted, or deleted.
B
Explanation:
Data backup ensures that critical information can be recovered if original files are lost, corrupted, or deleted.
Question #24
What should users do if their email account is compromised?
- A . Change the password immediately and enable two-factor authentication.
- B . Forward suspicious emails to their contacts for review.
- C . Delete all emails and continue using the account without changes.
- D . Ignore login alerts and suspicious activities.
Correct Answer: A
A
Explanation:
Changing the password and enabling two-factor authentication helps secure compromised accounts and prevents further unauthorized access.
A
Explanation:
Changing the password and enabling two-factor authentication helps secure compromised accounts and prevents further unauthorized access.
Question #25
What is the purpose of a secure email gateway?
- A . To monitor user activity across all email platforms.
- B . To block malicious emails before they reach the recipient.
- C . To increase the speed of email delivery.
- D . To simplify email configuration settings.
Correct Answer: B
B
Explanation:
Secure email gateways filter and block malicious emails, protecting users from threats like phishing and malware.
B
Explanation:
Secure email gateways filter and block malicious emails, protecting users from threats like phishing and malware.
Question #26
What should users do to secure their social media accounts while using public computers?
- A . Save login credentials for faster access.
- B . Clear browsing history and log out after use.
- C . Enable auto-login to reduce password usage.
- D . Disable account notifications for convenience.
Correct Answer: B
B
Explanation:
Clearing browsing data and logging out prevent unauthorized access to accounts after using public computers.
B
Explanation:
Clearing browsing data and logging out prevent unauthorized access to accounts after using public computers.
Question #27
What is the primary risk of unencrypted sensitive data?
- A . Increased storage costs
- B . Loss of data availability
- C . Exposure during unauthorized access
- D . Longer processing times
Correct Answer: C
C
Explanation:
Unencrypted sensitive data is vulnerable to exposure during unauthorized access, compromising confidentiality.
C
Explanation:
Unencrypted sensitive data is vulnerable to exposure during unauthorized access, compromising confidentiality.
Question #28
Data breaches primarily threaten which aspect of the CIA triad?
- A . Integrity
- B . Confidentiality
- C . Availability
- D . All of the above
Correct Answer: B
B
Explanation:
Data breaches most directly threaten confidentiality by exposing sensitive information to unauthorized parties.
B
Explanation:
Data breaches most directly threaten confidentiality by exposing sensitive information to unauthorized parties.
Question #29
What is the difference between incremental and differential backups?
- A . Incremental backups save changes since the last backup, while differential saves changes since the last full backup.
- B . Incremental backups save all files, while differential saves specific file types.
- C . Incremental backups are faster to restore than differential backups.
- D . Differential backups overwrite all previous data, while incremental does not.
Correct Answer: A
A
Explanation:
Incremental backups save changes made after any backup, whereas differential backups save changes since the last full backup.
A
Explanation:
Incremental backups save changes made after any backup, whereas differential backups save changes since the last full backup.
Question #30
Why should remote workers use encrypted communication tools?
- A . To increase data transfer speed.
- B . To protect sensitive information from being intercepted.
- C . To allow unrestricted access to files.
- D . To simplify device management.
Correct Answer: B
B
Explanation:
Encrypted communication tools ensure that data remains secure and inaccessible to unauthorized parties during transmission.
B
Explanation:
Encrypted communication tools ensure that data remains secure and inaccessible to unauthorized parties during transmission.