EC-Council 112-12 Certified Secure Computer User Online Training
EC-Council 112-12 Online Training
The questions for 112-12 were last updated at Jul 31,2025.
- Exam Code: 112-12
- Exam Name: Certified Secure Computer User
- Certification Provider: EC-Council
- Latest update: Jul 31,2025
Which of the following is the primary characteristic of malware?
- A . Software designed to enhance system performance.
- B . Software intended to disrupt, damage, or gain unauthorized access.
- C . Software that prevents unauthorized access.
- D . Software that only affects outdated operating systems.
Which type of malware encrypts user data and demands payment for its release?
- A . Spyware
- B . Ransomware
- C . Worms
- D . Adware
Which type of malware records user activities without their consent?
- A . Trojans
- B . Adware
- C . Spyware
- D . Worms
What is the main purpose of antivirus software?
- A . To enhance system performance.
- B . To prevent and remove malware infections.
- C . To encrypt sensitive data.
- D . To reduce the need for system backups.
Which of the following is a characteristic of worms?
- A . Requires user intervention to spread.
- B . Replicates itself to spread across networks.
- C . Disguises itself as legitimate software.
- D . Steals personal information via phishing.
What is a Trojan horse in the context of malware?
- A . A type of malware that spreads without user interaction.
- B . Malware disguised as legitimate software.
- C . A malicious program that targets network hardware.
- D . A virus embedded in hardware devices.
Which two features are commonly found in antivirus software?
- A . Real-time scanning and scheduled scans
- B . Data encryption and physical security
- C . Intrusion detection and firewall settings
- D . Multi-factor authentication and password management
What should be done after installing antivirus software?
- A . Disconnect the system from the internet.
- B . Update the software and run a full system scan.
- C . Disable real-time scanning to improve performance.
- D . Perform a factory reset on the system.
Which type of malware modifies its code to avoid detection?
- A . Polymorphic malware
- B . Spyware
- C . Adware
- D . Keylogger
Which of the following is a step to prevent malware infections? (Choose two)
- A . Regularly update operating systems and software.
- B . Avoid using antivirus software to reduce system overhead.
- C . Open email attachments from unknown senders.
- D . Download software only from trusted sources.