EC-Council 112-12 Certified Secure Computer User Online Training
EC-Council 112-12 Online Training
The questions for 112-12 were last updated at Jul 27,2025.
- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Jul 27,2025
What is the best way to minimize insider threats?
- A . Monitor network traffic continuously
- B . Restrict employee access to only necessary data
- C . Implement network segmentation
- D . Encrypt all communications
Which two are common causes of data breaches?
- A . Poor password management
- B . Hardware malfunctions
- C . Social engineering attacks
- D . Lack of data backups
Which of the following best describes a zero-day vulnerability?
- A . A known security flaw with no existing patches
- B . A flaw exploited after a patch is released
- C . An outdated security protocol
- D . A misconfigured firewall setting
What is a key benefit of using network segmentation?
- A . Improved system performance
- B . Reduced impact of breaches on critical systems
- C . Faster data backups
- D . Enhanced physical security
What is the primary objective of a vulnerability assessment?
- A . Identify and prioritize system vulnerabilities
- B . Replace outdated software
- C . Implement disaster recovery plans
- D . Encrypt sensitive data
Which are potential impacts of a loss of confidentiality? (Choose two)
- A . Identity theft
- B . Data corruption
- C . Financial losses
- D . Service unavailability
Which type of malware encrypts files and demands payment for access?
- A . Spyware
- B . Ransomware
- C . Worms
- D . Adware
Why is regular patch management critical?
- A . To ensure hardware longevity
- B . To reduce downtime during updates
- C . To fix known vulnerabilities and prevent exploits
- D . To simplify system configurations
What is the best practice for securing sensitive data stored in the cloud?
- A . Storing it in unstructured formats
- B . Using strong encryption methods
- C . Avoiding access control mechanisms
- D . Reducing the number of backups
Which two measures can enhance both data integrity and availability?
- A . Regular data backups and hash verification
- B . Firewalls and intrusion detection systems
- C . Biometric authentication and monitoring
- D . Security awareness training and disaster recovery plans