EC-Council 112-12 Certified Secure Computer User Online Training
EC-Council 112-12 Online Training
The questions for 112-12 were last updated at Jul 28,2025.
- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Jul 28,2025
Which of the following defines data security?
- A . A method of ensuring physical protection of data.
- B . Measures to safeguard data from unauthorized access or corruption.
- C . Techniques for data duplication and storage.
- D . Ensuring all systems are interconnected.
Which are the main components of the CIA triad in security?
- A . Authentication, Integrity, Availability
- B . Confidentiality, Integrity, Availability
- C . Confidentiality, Accessibility, Authentication
- D . Authorization, Authentication, Access
What is the primary goal of confidentiality in the CIA triad?
- A . To restrict unauthorized access to sensitive data.
- B . To ensure all data is backed up.
- C . To protect systems from malware.
- D . To provide 24/7 access to systems.
A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?
- A . Integrity
- B . Confidentiality
- C . Availability
- D . Authentication
Which of the following are considered potential losses due to security attacks? (Choose two)
- A . Financial losses
- B . Improved system performance
- C . Loss of customer trust
- D . Reduction in data redundancy
What is a key purpose of encryption in data security?
- A . To make data readily accessible.
- B . To ensure data is transmitted securely.
- C . To reduce the need for firewalls.
- D . To optimize system performance.
An employee accidentally deletes critical files.
What type of loss does this represent?
- A . Loss of confidentiality
- B . Loss of availability
- C . Loss of integrity
- D . Regulatory non-compliance
What is the role of authentication in data security?
- A . To protect against phishing attacks.
- B . To verify the identity of users accessing a system.
- C . To enable encryption of sensitive data.
- D . To prevent hardware malfunctions.
Which of the following ensures data availability?
- A . Frequent data backups and redundancy measures
- B . Strong passwords and encryption methods
- C . Firewalls and intrusion detection systems
- D . Regular software updates
Which two actions can protect the integrity of data?
- A . Implementing strong access controls
- B . Performing regular data backups
- C . Encrypting data during transmission
- D . Using hashing techniques for data validation