Practice Free 112-12 Exam Online Questions
Question #41
What is a critical security measure for Alexa-enabled devices?
- A . Disabling voice recognition features.
- B . Enabling two-factor authentication for connected accounts.
- C . Allowing open network access.
- D . Using weak passwords for convenience.
Correct Answer: B
B
Explanation:
Two-factor authentication protects Alexa accounts from unauthorized access, ensuring only trusted users can control the device.
B
Explanation:
Two-factor authentication protects Alexa accounts from unauthorized access, ensuring only trusted users can control the device.
Question #42
Which of the following can help secure home network connections?
- A . Using unique, strong passwords for the router.
- B . Enabling default router settings for faster setup.
- C . Avoiding regular network security updates.
- D . Allowing unrestricted access for all devices.
Correct Answer: A
A
Explanation:
Strong, unique passwords prevent unauthorized access to the router, enhancing home network security.
A
Explanation:
Strong, unique passwords prevent unauthorized access to the router, enhancing home network security.
Question #43
Which email security procedure helps ensure that email content remains unchanged during transmission?
- A . DKIM
- B . Auto-forwarding
- C . Spam filtering
- D . TLS encryption
Correct Answer: A
A
Explanation:
DKIM verifies the integrity of email content, ensuring it remains unaltered during transmission using cryptographic signatures.
A
Explanation:
DKIM verifies the integrity of email content, ensuring it remains unaltered during transmission using cryptographic signatures.
Question #44
What is the goal of a security policy?
- A . To enforce organizational structure
- B . To outline measures for protecting assets
- C . To identify potential attackers
- D . To ensure software usability
Correct Answer: B
B
Explanation:
A security policy defines the rules and measures necessary to protect an organization’s information assets and mitigate risks.
B
Explanation:
A security policy defines the rules and measures necessary to protect an organization’s information assets and mitigate risks.
Question #45
What is the purpose of encryption in cloud computing?
- A . To enhance data retrieval speed.
- B . To ensure data confidentiality by converting it into unreadable formats.
- C . To enable unlimited data sharing across networks.
- D . To automatically back up data.
Correct Answer: B
B
Explanation:
Encryption protects sensitive data by ensuring only authorized parties can read or access it.
B
Explanation:
Encryption protects sensitive data by ensuring only authorized parties can read or access it.
Question #46
What is the purpose of "safe search" settings on web browsers?
- A . To improve browsing speed.
- B . To filter and block inappropriate or harmful content.
- C . To provide unlimited access to all search results.
- D . To disable pop-up blockers.
Correct Answer: B
B
Explanation:
Safe search settings filter out harmful or inappropriate content, ensuring a safer browsing experience for users, especially children.
B
Explanation:
Safe search settings filter out harmful or inappropriate content, ensuring a safer browsing experience for users, especially children.
Question #47
Which term refers to an unauthorized entity gaining access to sensitive data?
- A . Data breach
- B . Data masking
- C . Data redundancy
- D . Data audit
Correct Answer: A
A
Explanation:
A data breach occurs when unauthorized individuals access sensitive information, violating confidentiality.
A
Explanation:
A data breach occurs when unauthorized individuals access sensitive information, violating confidentiality.
Question #48
Why is regular monitoring important in cloud environments?
- A . To enhance system performance during backups.
- B . To identify and respond to potential security threats promptly.
- C . To reduce the need for encryption protocols.
- D . To allow unrestricted access to resources.
Correct Answer: B
B
Explanation:
Monitoring detects anomalies and unauthorized activities in cloud environments, enabling timely mitigation of threats.
B
Explanation:
Monitoring detects anomalies and unauthorized activities in cloud environments, enabling timely mitigation of threats.
Question #49
What is the purpose of system image backup in Windows?
- A . To back up specific files only.
- B . To create a complete copy of the system, including OS and settings.
- C . To enhance device performance during recovery.
- D . To synchronize files between devices.
Correct Answer: B
B
Explanation:
System image backups replicate the entire operating system and its configurations, enabling full system restoration.
B
Explanation:
System image backups replicate the entire operating system and its configurations, enabling full system restoration.
Question #50
What is the benefit of restricting admin access to the router?
- A . Preventing unauthorized changes to network settings.
- B . Enhancing data encryption during transmission.
- C . Allowing automatic updates for connected devices.
- D . Improving network speed during peak usage.
Correct Answer: A
A
Explanation:
Restricting admin access ensures that only authorized users can modify router settings, protecting the network from tampering.
A
Explanation:
Restricting admin access ensures that only authorized users can modify router settings, protecting the network from tampering.