Practice Free 112-52 Exam Online Questions
Question #1
Which of the following significantly reduces the risk of password cracking?
- A . Implementing multi-factor authentication
- B . Reusing passwords across systems
- C . Using predictable password patterns
- D . Using predictable password patterns
Correct Answer: A
Question #2
What is a primary feature of the Ophcrack tool?
- A . Network sniffing
- B . Password cracking using rainbow tables
- C . Exploiting web application vulnerabilities
- D . Intrusion detection
Correct Answer: B
Question #3
In web application security, what does the term vulnerability stack refer to?
- A . A hierarchy of database permissions
- B . The layered structure of software vulnerabilities within an application
- C . A stack data structure used in memory management
- D . A browser-side scripting framework
Correct Answer: B
Question #4
Which of the following best defines a ‘threat actor’?
- A . A software that poses a threat to information security
- B . An entity that has the potential to cause harm by exploiting a vulnerability
- C . The method by which a threat is delivered
- D . A tool used to assess the level of threat on a network
Correct Answer: B
Question #5
Which of the following is typically identified during a vulnerability assessment?
- A . Employee susceptibility to phishing
- B . Outdated software versions
- C . Security awareness training gaps
- D . Encryption standards in use
Correct Answer: B
Question #6
Which measure significantly improves wireless network security?
- A . Using WPA3 encryption
- B . Allowing unrestricted guest access
- C . Allowing unrestricted guest access
- D . Disabling firewall protections
Correct Answer: A
Question #7
What is an effective countermeasure against pretexting?
- A . Employee awareness training
- B . Using strong passwords
- C . Installing antivirus software
- D . Regularly updating software
Correct Answer: A
Question #8
What is the outcome of a successful vulnerability exploitation?
- A . An increase in system performance
- B . Unauthorized access or damage to systems or data
- C . Improved user awareness of security issues
- D . Enhanced encryption of sensitive data
Correct Answer: B
Question #9
What is a common vulnerability in OT systems that can be exploited in cyber-physical attacks?
- A . The use of proprietary protocols
- B . Lack of real-time data analysis
- C . Interconnectivity with IT networks
- D . Absence of physical security controls
Correct Answer: C
Question #10
Which technique allows an attacker to see data in transit over a network?
- A . Social engineering
- B . Phishing
- C . Sniffing
- D . Pharming
Correct Answer: C
