Practice Free 112-12 Exam Online Questions
Question #71
What is the primary role of Platform-as-a-Service (PaaS) in cloud computing?
- A . Delivering storage and networking resources.
- B . Enabling application development and deployment.
- C . Offering end-user software applications.
- D . Managing encryption protocols for cloud data.
Correct Answer: B
B
Explanation:
PaaS provides a platform for developers to build, test, and deploy applications without managing the underlying infrastructure.
B
Explanation:
PaaS provides a platform for developers to build, test, and deploy applications without managing the underlying infrastructure.
Question #72
Which of the following scenarios demonstrates the importance of disaster recovery planning?
- A . Recovering critical files after a ransomware attack.
- B . Increasing system performance through optimization.
- C . Testing new features in backup software.
- D . Upgrading hardware for faster operations.
Correct Answer: A
A
Explanation:
Disaster recovery planning ensures systems and data are restored promptly following events like ransomware attacks or natural disasters.
A
Explanation:
Disaster recovery planning ensures systems and data are restored promptly following events like ransomware attacks or natural disasters.
Question #73
Why is it important to disable unused features on gaming consoles?
- A . To increase storage space for games.
- B . To reduce the attack surface and potential vulnerabilities.
- C . To enhance compatibility with older games.
- D . To simplify parental controls.
Correct Answer: B
B
Explanation:
Disabling unused features minimizes the risk of exploitation, reducing the console’s exposure to potential threats.
B
Explanation:
Disabling unused features minimizes the risk of exploitation, reducing the console’s exposure to potential threats.
Question #74
Which two actions can parents take to ensure child safety online?
- A . Set time limits for internet use and review browsing history
- B . Ignore content filters and avoid monitoring social media activity
- C . Disable antivirus tools to improve speed and bypass firewalls
- D . Allow unrestricted app downloads and avoid security software
Correct Answer: A
A
Explanation:
Setting time limits and reviewing browsing history help parents monitor and guide safe online behavior for children.
A
Explanation:
Setting time limits and reviewing browsing history help parents monitor and guide safe online behavior for children.
Question #75
Which of the following practices reduces the risk of SIM swapping attacks?
- A . Using multi-factor authentication (MFA) for account logins.
- B . Sharing personal information with service providers.
- C . Avoiding updates to mobile apps.
- D . Using public Wi-Fi without encryption.
Correct Answer: A
A
Explanation:
Multi-factor authentication reduces the impact of SIM swapping by requiring additional verification beyond SIM-based authentication.
A
Explanation:
Multi-factor authentication reduces the impact of SIM swapping by requiring additional verification beyond SIM-based authentication.
Question #76
What is a key feature of end-to-end encryption in instant messaging?
- A . It compresses messages for faster delivery.
- B . It ensures only the sender and receiver can read messages.
- C . It prevents spam messages from reaching users.
- D . It enables automatic backup of all chat data.
Correct Answer: B
B
Explanation:
End-to-end encryption secures communication by ensuring that only intended parties can access the messages, even if intercepted.
B
Explanation:
End-to-end encryption secures communication by ensuring that only intended parties can access the messages, even if intercepted.
Question #77
Which security measure ensures safe online shopping?
- A . Disabling HTTPS on payment pages
- B . Verifying websites for SSL certificates
- C . Using shared public devices for transactions
- D . Storing credit card details on third-party websites
Correct Answer: B
B
Explanation:
SSL certificates encrypt data during online transactions, ensuring secure payment processing and protection from interception.
B
Explanation:
SSL certificates encrypt data during online transactions, ensuring secure payment processing and protection from interception.
Question #78
Which of the following is a common email security threat?
- A . Email forwarding
- B . Phishing emails with malicious links
- C . Two-factor authentication
- D . Auto-reply emails
Correct Answer: B
B
Explanation:
Phishing emails trick users into clicking malicious links or providing sensitive information, making them a major security concern.
B
Explanation:
Phishing emails trick users into clicking malicious links or providing sensitive information, making them a major security concern.
Question #79
What is a potential impact of a successful social engineering attack?
- A . Unauthorized data access
- B . Network hardware failure
- C . System performance optimization
- D . Improved compliance policies
Correct Answer: A
A
Explanation:
Social engineering attacks trick individuals into revealing sensitive information, leading to unauthorized data access and breaches.
A
Explanation:
Social engineering attacks trick individuals into revealing sensitive information, leading to unauthorized data access and breaches.
Question #80
Which two measures enhance cloud data privacy?
- A . Encrypting data before uploading and configuring access controls
- B . Disabling two-factor authentication and relying on weak passwords
- C . Sharing cloud credentials publicly and avoiding backups
- D . Ignoring suspicious activities and bypassing encryption protocols
Correct Answer: A
A
Explanation:
Encrypting data ensures confidentiality, while access controls limit unauthorized access, protecting cloud data privacy.
A
Explanation:
Encrypting data ensures confidentiality, while access controls limit unauthorized access, protecting cloud data privacy.