EC-Council 112-12 Certified Secure Computer User Online Training
EC-Council 112-12 Online Training
The questions for 112-12 were last updated at Apr 03,2025.
- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Apr 03,2025
What is an example of a loss of integrity?
- A . Inaccessible systems due to a DDoS attack
- B . Tampered financial transaction records
- C . Exposure of encrypted data
- D . Unauthorized file downloads
Which attack is an example of compromising availability?
- A . Phishing
- B . Denial-of-service
- C . Malware installation
- D . Credential theft
What is the goal of a security policy?
- A . To enforce organizational structure
- B . To outline measures for protecting assets
- C . To identify potential attackers
- D . To ensure software usability
Which of the following is a characteristic of effective data encryption?
- A . Publicly available encryption keys
- B . Limited application to sensitive data
- C . Protection against unauthorized access during transmission
- D . Reduced performance of network systems
Why is regular security training important?
- A . To avoid compliance penalties
- B . To keep employees informed about evolving threats
- C . To reduce encryption overhead
- D . To maintain software licensing requirements
Which component is essential for mitigating phishing attacks?
- A . Spam filters
- B . Advanced encryption methods
- C . Physical security measures
- D . Hardware-based firewalls
What is the primary purpose of access control?
- A . Securing physical server locations
- B . Ensuring users can view all organizational data
- C . Limiting data access based on roles or permissions
- D . Backing up sensitive information
An organization’s online store becomes unavailable due to a cyberattack.
What loss does this represent?
- A . Loss of integrity
- B . Loss of availability
- C . Loss of confidentiality
- D . Financial gain
Which of the following best reduces the risk of unauthorized data access?
- A . Implementing strong password policies
- B . Regularly updating hardware devices
- C . Limiting network bandwidth
- D . Performing frequent hardware audits
Which two security measures address both confidentiality and integrity?
- A . Access control and encryption
- B . Multi-factor authentication and redundancy
- C . Firewall implementation and monitoring
- D . Backups and disaster recovery plans