EC-Council 112-12 Certified Secure Computer User Online Training
EC-Council 112-12 Online Training
The questions for 112-12 were last updated at Jul 30,2025.
- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Jul 30,2025
Which of the following contributes to a loss of data availability?
- A . Unauthorized encryption by ransomware
- B . Weak password policies
- C . Secure data backups
- D . Strong access control mechanisms
What is a primary function of encryption in data security?
- A . Improve system performance.
- B . Prevent unauthorized access to data.
- C . Enable seamless data sharing.
- D . Reduce storage requirements.
Which are common potential losses from a data breach? (Choose two)
- A . Financial penalties
- B . Enhanced system performance
- C . Loss of customer trust
- D . Increased data redundancy
What is the primary advantage of implementing access controls?
- A . To speed up system processes.
- B . To restrict unauthorized access to sensitive information.
- C . To simplify data encryption.
- D . To reduce the need for system audits.
Which of the following best describes a zero-day attack?
- A . Exploiting a known vulnerability without a patch.
- B . Attacking systems after a vulnerability is patched.
- C . Using outdated software for malicious purposes.
- D . Monitoring network traffic for suspicious activity.
What is a key characteristic of hashing in security?
- A . Converts data into unreadable encrypted formats.
- B . Verifies data integrity by detecting unauthorized changes.
- C . Ensures uninterrupted access to sensitive information.
- D . Enhances data redundancy for recovery purposes.
Which of the following reduces the impact of insider threats?
- A . Encrypting data at rest.
- B . Implementing role-based access controls.
- C . Using redundant storage systems.
- D . Regularly updating antivirus software.
What is the most effective way to mitigate risks associated with unpatched vulnerabilities?
- A . Encrypting sensitive data.
- B . Implementing a regular patch management process.
- C . Conducting monthly data audits.
- D . Limiting network bandwidth.
Which security measure protects data in transit?
- A . Firewalls
- B . Encryption protocols
- C . Multi-factor authentication
- D . Data backups
Which two actions enhance both confidentiality and availability?
- A . Data encryption and failover systems
- B . Role-based access controls and redundant backups
- C . Regular data audits and physical security
- D . Disaster recovery plans and hashing techniques