EC-Council 112-12 Certified Secure Computer User Online Training
EC-Council 112-12 Online Training
The questions for 112-12 were last updated at Jul 28,2025.
- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Jul 28,2025
Which term refers to an unauthorized entity gaining access to sensitive data?
- A . Data breach
- B . Data masking
- C . Data redundancy
- D . Data audit
Which element of security prevents unauthorized data modification?
- A . Availability
- B . Confidentiality
- C . Integrity
- D . Scalability
A ransomware attack primarily affects which security element?
- A . Confidentiality
- B . Availability
- C . Integrity
- D . Scalability
What is the first step in a robust data security strategy?
- A . Encrypting all sensitive files
- B . Identifying and classifying sensitive data
- C . Deploying a firewall
- D . Implementing multi-factor authentication
Which two practices enhance confidentiality in data security?
- A . Encryption and access controls
- B . Firewalls and disaster recovery plans
- C . Data redundancy and hashing
- D . Incident response plans and backups
What is the key benefit of multi-factor authentication (MFA)?
- A . Simplifies password management
- B . Enhances system performance
- C . Increases security by requiring multiple credentials
- D . Eliminates the need for strong passwords
Which of the following are potential impacts of a phishing attack? (Choose two)
- A . Unauthorized data access
- B . System hardware damage
- C . Credential theft
- D . Improved network speed
What is the purpose of access control in security?
- A . To secure physical servers
- B . To restrict unauthorized access to data and systems
- C . To create user accounts
- D . To prevent phishing emails
Which type of attack often leads to identity theft?
- A . Phishing
- B . Man-in-the-middle
- C . Denial-of-service
- D . Malware
What is a potential consequence of unpatched software vulnerabilities?
- A . Reduced encryption strength
- B . Unauthorized system access by attackers
- C . Improved system speed
- D . Increased network redundancy