EC-Council 112-12 Certified Secure Computer User Online Training
EC-Council 112-12 Online Training
The questions for 112-12 were last updated at Jul 29,2025.
- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Jul 29,2025
What is the purpose of data masking in data security?
- A . Encrypt data during transmission.
- B . Obscure sensitive data for non-production environments.
- C . Improve data availability in redundant systems.
- D . Facilitate faster data recovery.
Which attack method is specifically designed to compromise the availability of a system?
- A . Phishing
- B . Denial-of-service (DoS)
- C . Man-in-the-middle
- D . Ransomware
What is a key element of ensuring data integrity?
- A . Implementing strict access controls
- B . Using hashing algorithms for data validation
- C . Encrypting data during transmission
- D . Restricting physical access to servers
Which two measures help maintain the availability of data during an attack?
- A . Data redundancy and failover systems
- B . Strong passwords and encryption
- C . Multi-factor authentication and hashing
- D . Firewalls and intrusion detection systems
Which of the following best describes a man-in-the-middle attack?
- A . Exploiting software vulnerabilities to gain access.
- B . Intercepting and altering communications between two parties.
- C . Overloading systems with traffic to deny service.
- D . Distributing malware to gain system control.
What is the main purpose of disaster recovery plans in data security?
- A . Prevent phishing attacks.
- B . Ensure rapid recovery after a security incident.
- C . Enhance system performance.
- D . Monitor and log system activity.
Which two factors contribute to the loss of confidentiality in a system?
- A . Weak password policies
- B . Data encryption during transmission
- C . Lack of access controls
- D . Hashing techniques for validation
What is the key characteristic of ransomware attacks?
- A . Encrypting data to restrict access until a ransom is paid.
- B . Infecting systems with malicious spyware.
- C . Overloading systems with fake traffic.
- D . Intercepting communication between devices.
What is the role of intrusion detection systems (IDS) in security?
- A . Prevent unauthorized access.
- B . Detect and alert administrators of potential breaches.
- C . Encrypt sensitive communications.
- D . Enhance physical security measures.
Which security measure best prevents phishing attacks?
- A . Regular employee awareness training
- B . Strong encryption algorithms
- C . Redundant backups of sensitive data
- D . Biometric access controls