EC-Council 112-12 Practice Exams
Last updated on Apr 07,2025- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Apr 07,2025
Question #1
What is the primary purpose of a VPN?
- A . To encrypt and secure internet traffic.
- B . To increase browsing speed.
- C . To disable firewalls temporarily.
- D . To allow unrestricted access to blocked websites.
Question #2
Which of the following are potential losses due to security attacks? (Choose two)
- A . Financial loss
- B . Reduced system performance
- C . Increased regulatory oversight
- D . Damage to reputation
Question #3
Which type of malware can replicate itself and spread without user intervention?
- A . Virus
- B . Worm
- C . Spyware
- D . Adware
Question #4
What is the purpose of device management policies in remote working?
- A . To allow unrestricted access to corporate systems.
- B . To ensure compliance with security standards.
- C . To disable firewalls for faster network speeds.
- D . To simplify software updates.
Question #5
What is the role of encryption in securing IoT device communications?
- A . To enhance device performance during use.
- B . To protect data from interception during transmission.
- C . To enable automatic updates for devices.
- D . To allow unrestricted access to device settings.
Question #6
What is the purpose of regular testing of backup data?
- A . To delete unused backup files.
- B . To ensure backups are accurate and recoverable.
- C . To increase storage space.
- D . To enhance the speed of backups.
Question #7
What is the main advantage of using cloud backups?
- A . Offline access during network outages.
- B . Automated backups and remote accessibility.
- C . Reduced encryption requirements.
- D . Faster performance compared to local drives.
Question #8
What is a common online threat associated with instant messaging (IM)?
- A . Brute force attacks
- B . Phishing attempts through malicious links
- C . SQL injection
- D . Distributed Denial of Service (DDoS)
Question #9
What should users do if they suspect their social networking account is compromised?
- A . Change their password immediately and enable two-factor authentication.
- B . Ignore unusual activity and continue using the account.
- C . Disable login alerts to avoid notifications.
- D . Share their new password with trusted contacts.
Question #10
What is the purpose of configuring static IP addresses on a home network?
- A . To enhance encryption protocols.
- B . To reduce the likelihood of unauthorized devices connecting.
- C . To improve internet speed during downloads.
- D . To enable automatic updates for network devices.