Practice Free 112-52 Exam Online Questions
Question #11
Which of the following is an effective countermeasure against password cracking?
- A . Using long, complex passwords
- B . Using the same password across systems
- C . Disabling account lockout policies
- D . Storing passwords in plaintext
Correct Answer: A
Question #12
Which countermeasure can help in reducing the risk of tailgating?
- A . Implementing biometric security measures
- B . Conducting regular security audits
- C . Using complex passwords
- D . Enforcing strict login timeouts
Correct Answer: A
Question #13
Which activity is part of a vulnerability assessment process?
- A . Identifying vulnerabilities
- B . Exploiting vulnerabilities for access
- C . Encrypting databases
- D . Installing operating systems
Correct Answer: A
Question #14
Which is the MOST effective countermeasure against social engineering attacks?
- A . Employee security awareness training
- B . Strong encryption algorithms
- C . Network traffic monitoring
- D . Port hardening
Correct Answer: A
Question #15
Which of the following is a common method used in identity theft?
- A . Dumpster diving
- B . SQL injection
- C . Cross-site scripting
- D . Port scanning
Correct Answer: A
Question #16
Which statement BEST describes a limitation of ethical hacking?
- A . Ethical hacking guarantees complete security
- B . Ethical hacking cannot guarantee 100% security
- C . Ethical hackers can test any system without approval
- D . Ethical hacking ignores legal boundaries
Correct Answer: B
Question #17
Which of the following is an example of a social engineering technique?
- A . SQL injection
- B . Pretexting
- C . Malware injection
- D . Code obfuscation
Correct Answer: B
Question #18
In the context of information security, what does the ‘CIA triad’ stand for?
- A . Confidentiality, Integrity, Availability
- B . Certification, Identification, Authorization
- C . Confidentiality, Insurance, Accountability
- D . Control, Isolation, Authentication
Correct Answer: A
Question #19
Which of the following is a common cloud computing threat?
- A . Data breaches
- B . Improved fault tolerance
- C . Increased scalability
- D . Open access to private servers
Correct Answer: A
Question #20
Which wireless encryption method is currently considered the most secure?
- A . WEP
- B . WPA
- C . WPA3
- D . TKIP
Correct Answer: C
