Practice Free 112-12 Exam Online Questions
Question #81
What is the key characteristic of ransomware attacks?
- A . Encrypting data to restrict access until a ransom is paid.
- B . Infecting systems with malicious spyware.
- C . Overloading systems with fake traffic.
- D . Intercepting communication between devices.
Correct Answer: A
A
Explanation:
Ransomware encrypts files, denying users access to their data until a ransom is paid, targeting data availability.
A
Explanation:
Ransomware encrypts files, denying users access to their data until a ransom is paid, targeting data availability.
Question #82
Which two features protect against email spoofing?
- A . SPF and DKIM
- B . Encryption and spam filters
- C . Auto-forwarding and email archiving
- D . Two-factor authentication and spam blocking
Correct Answer: A
A
Explanation:
SPF and DKIM verify the sender’s authenticity, preventing spoofing and ensuring email integrity.
A
Explanation:
SPF and DKIM verify the sender’s authenticity, preventing spoofing and ensuring email integrity.
Question #83
Which cloud computing model provides the highest level of user control over infrastructure?
- A . Platform-as-a-Service (PaaS)
- B . Software-as-a-Service (SaaS)
- C . Infrastructure-as-a-Service (IaaS)
- D . Network-as-a-Service (NaaS)
Correct Answer: C
C
Explanation:
IaaS provides users with control over virtualized resources like servers, storage, and networks, offering flexibility and customization.
C
Explanation:
IaaS provides users with control over virtualized resources like servers, storage, and networks, offering flexibility and customization.
Question #84
What is the primary purpose of securing network connections?
- A . To ensure uninterrupted data transfer.
- B . To protect data and devices from unauthorized access.
- C . To improve network speed during peak hours.
- D . To share passwords between connected devices.
Correct Answer: B
B
Explanation:
Securing network connections protects sensitive data and devices from threats like unauthorized access and malware attacks.
B
Explanation:
Securing network connections protects sensitive data and devices from threats like unauthorized access and malware attacks.
Question #85
Which type of data is typically most at risk during transit?
- A . Encrypted data
- B . Redundant backup files
- C . Unencrypted sensitive data
- D . Archived files
Correct Answer: C
C
Explanation:
Unencrypted data in transit is vulnerable to interception, potentially compromising confidentiality and security.
C
Explanation:
Unencrypted data in transit is vulnerable to interception, potentially compromising confidentiality and security.
Question #86
What is the primary risk of not testing backup files regularly?
- A . Reduced storage capacity.
- B . Failure to recover data during emergencies.
- C . Increased recovery speeds.
- D . Enhanced security vulnerabilities.
Correct Answer: B
B
Explanation:
Regular testing ensures backups are functional and reliable, avoiding recovery failures during critical situations.
B
Explanation:
Regular testing ensures backups are functional and reliable, avoiding recovery failures during critical situations.
Question #87
What is the primary advantage of public cloud services?
- A . Exclusive infrastructure for a single organization.
- B . Cost efficiency and scalability through shared resources.
- C . Enhanced physical control over data centers.
- D . Higher operational costs and reduced flexibility.
Correct Answer: B
B
Explanation:
Public clouds provide cost-effective, scalable solutions by leveraging shared resources across multiple users.
B
Explanation:
Public clouds provide cost-effective, scalable solutions by leveraging shared resources across multiple users.
Question #88
Which type of encryption ensures that only the intended recipient can decrypt an email?
- A . Asymmetric encryption
- B . Hashing
- C . Symmetric encryption
- D . Data masking
Correct Answer: A
A
Explanation:
Asymmetric encryption uses a public and private key pair, allowing only the recipient with the private key to decrypt the email.
A
Explanation:
Asymmetric encryption uses a public and private key pair, allowing only the recipient with the private key to decrypt the email.
Question #89
What is the role of network segmentation in IoT security?
- A . To encrypt all IoT communications automatically.
- B . To isolate IoT devices from critical networks.
- C . To improve IoT device compatibility with gaming consoles.
- D . To simplify network configuration for all devices.
Correct Answer: B
B
Explanation:
Network segmentation isolates IoT devices, reducing the risk of compromised devices affecting critical systems.
B
Explanation:
Network segmentation isolates IoT devices, reducing the risk of compromised devices affecting critical systems.
Question #90
Which setting should parents enable to improve child online safety?
- A . Automatic password sharing
- B . Parental control filters for inappropriate content
- C . Anonymous browsing features
- D . Unlimited access to social media
Correct Answer: B
B
Explanation:
Parental control filters block access to age-inappropriate or harmful content, ensuring safer internet usage for children.
B
Explanation:
Parental control filters block access to age-inappropriate or harmful content, ensuring safer internet usage for children.