Practice Free 112-12 Exam Online Questions
Question #51
What is the primary goal of anti-spoofing measures in email security?
- A . To enhance email readability.
- B . To detect and block fake sender addresses.
- C . To improve email delivery speed.
- D . To prevent encryption errors.
Correct Answer: B
B
Explanation:
Anti-spoofing measures like SPF and DKIM validate sender addresses to prevent fake or unauthorized emails from being delivered.
B
Explanation:
Anti-spoofing measures like SPF and DKIM validate sender addresses to prevent fake or unauthorized emails from being delivered.
Question #52
Which are the main components of the CIA triad in security?
- A . Authentication, Integrity, Availability
- B . Confidentiality, Integrity, Availability
- C . Confidentiality, Accessibility, Authentication
- D . Authorization, Authentication, Access
Correct Answer: B
B
Explanation:
The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).
B
Explanation:
The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).
Question #53
What is a key purpose of encryption in data security?
- A . To make data readily accessible.
- B . To ensure data is transmitted securely.
- C . To reduce the need for firewalls.
- D . To optimize system performance.
Correct Answer: B
B
Explanation:
Encryption protects data during transmission by converting it into unreadable formats, ensuring secure communication.
B
Explanation:
Encryption protects data during transmission by converting it into unreadable formats, ensuring secure communication.
Question #54
What is a primary risk of using default router settings?
- A . Reduced network signal strength.
- B . Easier access for attackers who know default credentials.
- C . Improved compatibility with connected devices.
- D . Enhanced encryption for sensitive data.
Correct Answer: B
B
Explanation:
Default settings, including default passwords, are widely known and increase the likelihood of unauthorized access.
B
Explanation:
Default settings, including default passwords, are widely known and increase the likelihood of unauthorized access.
Question #55
What is the purpose of a sandbox mode in a web browser?
- A . To block all cookies from being stored.
- B . To isolate untrusted websites and prevent malicious activity.
- C . To allow unrestricted access to online resources.
- D . To share browsing data with third-party apps.
Correct Answer: B
B
Explanation:
Sandbox mode isolates potentially harmful websites, preventing them from affecting the browser or system.
B
Explanation:
Sandbox mode isolates potentially harmful websites, preventing them from affecting the browser or system.
Question #56
What is the purpose of restricting administrative privileges on remote devices?
- A . To enhance device performance.
- B . To limit unauthorized changes and potential misuse.
- C . To simplify software installation.
- D . To reduce file encryption requirements.
Correct Answer: B
B
Explanation:
Restricting administrative privileges prevents unauthorized changes that could compromise security or system stability.
B
Explanation:
Restricting administrative privileges prevents unauthorized changes that could compromise security or system stability.
Question #57
What is a primary benefit of automated cloud monitoring tools?
- A . Increased speed of resource scaling.
- B . Real-time detection and response to potential security threats.
- C . Enhanced data sharing across cloud environments.
- D . Elimination of encryption protocols.
Correct Answer: B
B
Explanation:
Automated monitoring tools detect and respond to suspicious activities in real-time, improving cloud security.
B
Explanation:
Automated monitoring tools detect and respond to suspicious activities in real-time, improving cloud security.
Question #58
Why is it important to monitor account activity on gaming consoles?
- A . To disable unused features.
- B . To identify unauthorized purchases or suspicious activity.
- C . To increase storage space for games.
- D . To enhance parental control settings.
Correct Answer: B
B
Explanation:
Monitoring account activity helps detect unauthorized access or unusual transactions, protecting user accounts.
B
Explanation:
Monitoring account activity helps detect unauthorized access or unusual transactions, protecting user accounts.
Question #59
An organization’s online store becomes unavailable due to a cyberattack.
What loss does this represent?
- A . Loss of integrity
- B . Loss of availability
- C . Loss of confidentiality
- D . Financial gain
Correct Answer: B
B
Explanation:
When an online store becomes unavailable, it is a loss of availability, affecting business operations and potentially causing financial losses.
B
Explanation:
When an online store becomes unavailable, it is a loss of availability, affecting business operations and potentially causing financial losses.
Question #60
What is the purpose of real-time scanning in antivirus software?
- A . To scan the system only during idle times.
- B . To monitor and detect threats as they occur.
- C . To analyze encrypted files for malware.
- D . To speed up the system’s processing time.
Correct Answer: B
B
Explanation:
Real-time scanning continuously monitors system activity to identify and neutralize threats immediately.
B
Explanation:
Real-time scanning continuously monitors system activity to identify and neutralize threats immediately.