Practice Free 112-12 Exam Online Questions
Question #61
Which of the following reduces the impact of insider threats?
- A . Encrypting data at rest.
- B . Implementing role-based access controls.
- C . Using redundant storage systems.
- D . Regularly updating antivirus software.
Correct Answer: B
B
Explanation:
Role-based access controls limit access to data based on job functions, minimizing opportunities for insider threats.
B
Explanation:
Role-based access controls limit access to data based on job functions, minimizing opportunities for insider threats.
Question #62
What is a common feature of mobile firewalls?
- A . Blocking unauthorized network traffic.
- B . Automatically disabling encryption for speed.
- C . Improving app performance during multitasking.
- D . Managing device storage capacity.
Correct Answer: A
A
Explanation:
Firewalls monitor and block unauthorized traffic, protecting mobile devices from external threats and attacks.
A
Explanation:
Firewalls monitor and block unauthorized traffic, protecting mobile devices from external threats and attacks.
Question #63
Why should users avoid using public Wi-Fi for Alexa devices?
- A . To reduce power consumption during usage.
- B . To prevent unauthorized access to device controls.
- C . To improve the response time of Alexa commands.
- D . To allow unrestricted data sharing between devices.
Correct Answer: B
B
Explanation:
Public Wi-Fi networks are unencrypted and can expose Alexa devices to unauthorized access and data breaches.
B
Explanation:
Public Wi-Fi networks are unencrypted and can expose Alexa devices to unauthorized access and data breaches.
Question #64
Why is data encryption critical for online backups?
- A . To improve the speed of data uploads.
- B . To prevent unauthorized access during data transfer or storage.
- C . To reduce storage space requirements.
- D . To enable automatic recovery of lost files.
Correct Answer: B
B
Explanation:
Encryption secures online backup data, ensuring it is protected from unauthorized access or interception during transfer.
B
Explanation:
Encryption secures online backup data, ensuring it is protected from unauthorized access or interception during transfer.
Question #65
Which two practices secure gaming consoles from unauthorized access?
- A . Using strong passwords and enabling two-factor authentication.
- B . Ignoring software updates and disabling encryption.
- C . Allowing default settings and sharing login credentials.
- D . Avoiding parental controls and using weak passwords.
Correct Answer: A
A
Explanation:
Strong passwords and two-factor authentication enhance security by preventing unauthorized access to gaming accounts.
A
Explanation:
Strong passwords and two-factor authentication enhance security by preventing unauthorized access to gaming accounts.
Question #66
Which of the following is a characteristic of worms?
- A . Requires user intervention to spread.
- B . Replicates itself to spread across networks.
- C . Disguises itself as legitimate software.
- D . Steals personal information via phishing.
Correct Answer: B
B
Explanation:
Worms are self-replicating malware that spreads across networks without requiring user action, exploiting vulnerabilities.
B
Explanation:
Worms are self-replicating malware that spreads across networks without requiring user action, exploiting vulnerabilities.
Question #67
Which social networking feature poses a risk to user privacy?
- A . Strong password requirements
- B . Location sharing in posts
- C . Two-factor authentication
- D . Encrypted messaging
Correct Answer: B
B
Explanation:
Location sharing reveals real-time user locations, which can be exploited for malicious purposes, such as stalking or theft.
B
Explanation:
Location sharing reveals real-time user locations, which can be exploited for malicious purposes, such as stalking or theft.
Question #68
Which of the following are potential losses due to security attacks? (Choose two)
- A . Financial loss
- B . Reduced system performance
- C . Increased regulatory oversight
- D . Damage to reputation
Correct Answer: A, D
A, D
Explanation:
Financial loss and damage to reputation are common outcomes of security breaches, affecting organizations severely.
A, D
Explanation:
Financial loss and damage to reputation are common outcomes of security breaches, affecting organizations severely.
Question #69
What is the purpose of network isolation for IoT devices?
- A . To simplify device management.
- B . To prevent compromised IoT devices from affecting critical systems.
- C . To increase device communication speeds.
- D . To enable automatic updates for all devices.
Correct Answer: B
B
Explanation:
Network isolation ensures that compromised IoT devices cannot impact other systems on the primary network.
B
Explanation:
Network isolation ensures that compromised IoT devices cannot impact other systems on the primary network.
Question #70
Which malware type disguises itself as legitimate software?
- A . Spyware
- B . Trojan horse
- C . Worm
- D . Ransomware
Correct Answer: B
B
Explanation:
Trojan horses appear as legitimate programs but execute harmful actions once installed or activated.
B
Explanation:
Trojan horses appear as legitimate programs but execute harmful actions once installed or activated.