Practice Free 112-12 Exam Online Questions
Question #31
Which are the key advantages of encryption? (Choose two)
- A . Protects data integrity
- B . Simplifies compliance requirements
- C . Ensures data confidentiality
- D . Reduces the need for backups
Correct Answer: A, C
A, C
Explanation:
Encryption protects data integrity by preventing unauthorized modifications and ensures confidentiality by restricting access to authorized parties.
A, C
Explanation:
Encryption protects data integrity by preventing unauthorized modifications and ensures confidentiality by restricting access to authorized parties.
Question #32
What is the function of a firewall in malware prevention?
- A . Encrypting sensitive files during transmission.
- B . Blocking unauthorized access to the network.
- C . Running system diagnostics and backups.
- D . Enhancing system processing speed.
Correct Answer: B
B
Explanation:
Firewalls monitor and block unauthorized access to networks, complementing antivirus efforts in malware prevention.
B
Explanation:
Firewalls monitor and block unauthorized access to networks, complementing antivirus efforts in malware prevention.
Question #33
What is the role of endpoint security in remote working?
- A . To monitor and protect devices from threats.
- B . To improve device compatibility with networks.
- C . To simplify software installation processes.
- D . To disable encryption for faster performance.
Correct Answer: A
A
Explanation:
Endpoint security ensures that remote devices are protected from malware, unauthorized access, and other threats.
A
Explanation:
Endpoint security ensures that remote devices are protected from malware, unauthorized access, and other threats.
Question #34
Which two precautions can improve cloud data security?
- A . Encrypting sensitive data and auditing access logs regularly
- B . Sharing login credentials with colleagues and using weak passwords
- C . Ignoring security updates and bypassing encryption protocols
- D . Disabling monitoring tools and reducing backup frequencies
Correct Answer: A
A
Explanation:
Encryption ensures data confidentiality, while auditing logs helps identify and address unauthorized access attempts.
A
Explanation:
Encryption ensures data confidentiality, while auditing logs helps identify and address unauthorized access attempts.
Question #35
Why is it important to securely wipe hard drives before disposal?
- A . To ensure compliance with data protection regulations.
- B . To enhance compatibility with other devices.
- C . To reduce the physical size of the drives.
- D . To improve their resale value.
Correct Answer: A
A
Explanation:
Securely wiping hard drives ensures compliance with data privacy regulations, preventing unauthorized access to sensitive information.
A
Explanation:
Securely wiping hard drives ensures compliance with data privacy regulations, preventing unauthorized access to sensitive information.
Question #36
What is the primary risk of using outdated mobile operating systems?
- A . Reduced app functionality.
- B . Increased exposure to unpatched security vulnerabilities.
- C . Improved compatibility with older apps.
- D . Decreased battery consumption.
Correct Answer: B
B
Explanation:
Outdated operating systems often contain unpatched vulnerabilities, making them targets for attackers.
B
Explanation:
Outdated operating systems often contain unpatched vulnerabilities, making them targets for attackers.
Question #37
What is the purpose of disabling unused ports on IoT devices?
- A . To reduce device latency.
- B . To minimize the attack surface for potential threats.
- C . To simplify device management.
- D . To allow unrestricted access for authorized users.
Correct Answer: B
B
Explanation:
Disabling unused ports reduces the potential entry points for attackers, improving IoT device security.
B
Explanation:
Disabling unused ports reduces the potential entry points for attackers, improving IoT device security.
Question #38
Which type of malware encrypts files and demands payment for access?
- A . Spyware
- B . Ransomware
- C . Worms
- D . Adware
Correct Answer: B
B
Explanation:
Ransomware encrypts files, restricting access to them until a ransom is paid, targeting availability and causing significant disruptions.
B
Explanation:
Ransomware encrypts files, restricting access to them until a ransom is paid, targeting availability and causing significant disruptions.
Question #39
What is a potential risk of remote working without a VPN?
- A . Faster data transmission speeds.
- B . Exposure to network eavesdropping and data interception.
- C . Improved compatibility with corporate systems.
- D . Reduced need for device encryption.
Correct Answer: B
B
Explanation:
Without a VPN, data transmitted over networks may be intercepted by unauthorized parties, compromising security.
B
Explanation:
Without a VPN, data transmitted over networks may be intercepted by unauthorized parties, compromising security.
Question #40
Which of the following is a safe instant messaging practice?
- A . Accepting contact requests from unknown users
- B . Using strong passwords and enabling encryption
- C . Ignoring software update notifications
- D . Sharing sensitive files via public chatrooms
Correct Answer: B
B
Explanation:
Strong passwords and encryption protect instant messaging accounts from unauthorized access and ensure secure communication.
B
Explanation:
Strong passwords and encryption protect instant messaging accounts from unauthorized access and ensure secure communication.