EC-Council 112-12 Certified Secure Computer User Online Training
EC-Council 112-12 Online Training
The questions for 112-12 were last updated at Apr 06,2025.
- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Apr 06,2025
Which of the following is a primary objective of data classification?
- A . Enhance system performance
- B . Reduce storage requirements
- C . Prioritize security measures based on data sensitivity
- D . Enable universal data sharing across departments
What is a potential impact of a successful social engineering attack?
- A . Unauthorized data access
- B . Network hardware failure
- C . System performance optimization
- D . Improved compliance policies
Which type of data is typically most at risk during transit?
- A . Encrypted data
- B . Redundant backup files
- C . Unencrypted sensitive data
- D . Archived files
Which of these is an example of a technical control in data security?
- A . Security policies
- B . User awareness training
- C . Firewalls
- D . Incident response planning
What is the primary purpose of multi-factor authentication (MFA)?
- A . To reduce password reset requests
- B . To enhance user convenience
- C . To strengthen access security by requiring multiple verification methods
- D . To eliminate the need for strong passwords
Which are the key advantages of encryption? (Choose two)
- A . Protects data integrity
- B . Simplifies compliance requirements
- C . Ensures data confidentiality
- D . Reduces the need for backups
Which of the following can result in data availability loss?
- A . Unauthorized data encryption by attackers
- B . Accidental deletion of critical files
- C . Prolonged hardware failure
- D . All of the above
What is the most effective way to prevent brute-force attacks on passwords?
- A . Use firewalls to block traffic
- B . Require strong password policies and lockout mechanisms
- C . Encrypt all password files
- D . Implement biometric authentication
What kind of attack involves overwhelming a server with traffic to make it unavailable?
- A . Phishing attack
- B . Denial-of-service attack
- C . Malware injection
- D . Social engineering attack
What is the role of a firewall in data security?
- A . Encrypt sensitive information
- B . Monitor and control incoming and outgoing network traffic
- C . Authenticate users before granting system access
- D . Prevent physical access to servers