Practice Free 112-52 Exam Online Questions
Which type of attack specifically targets the safety mechanisms of industrial control systems to cause physical damage?
- A . Ransomware attack
- B . Logic bomb
- C . Stuxnet-like attack
- D . Trojan horse
Containers offer a lightweight alternative to virtual machines by sharing the host OS’s kernel.
What is a key security practice for containers?
- A . Running containers with default settings
- B . Using containers to run multiple different applications on a single host
- C . Regularly scanning containers and images for vulnerabilities
- D . Ensuring containers use as much host resource as possible
What is the primary function of a vulnerability assessment?
- A . To exploit identified weaknesses
- B . To identify potential security weaknesses in a system
- C . To install security patches
- D . To monitor user activity
In which phase of penetration testing is information gathered to identify potential targets and their vulnerabilities?
- A . Planning
- B . Discovery
- C . Attack
- D . Reporting
What is the purpose of the Health Insurance Portability and Accountability Act (HIPAA)?
- A . To regulate financial institutions
- B . To secure electronic health records
- C . To enforce banking compliance standards
- D . To oversee manufacturing quality control
What best defines risk in the context of information security?
- A . The potential that a threat will exploit a vulnerability
- B . A method of safeguarding against script kiddies
- C . The process of transferring data over the internet
- D . The implementation of a firewall
Which countermeasure can mitigate the risk of a rogue access point?
- A . Implementing WPS
- B . Conducting regular wireless network audits
- C . Using VPNs over wireless networks
- D . Disabling DHCP on the router
Which of the following is NOT a type of hacker?
- A . Black Hat
- B . Grey Hat
- C . Green Hat
- D . White Hat
Which security measure MOST effectively reduces unauthorized access in cloud environments?
- A . Enforcing strong access control policies
- B . Disabling encryption for performance
- C . Allowing unrestricted access
- D . Using shared administrator accounts
What is a crucial guideline to follow when conducting penetration testing?
- A . Testing systems without permission
- B . Obtaining proper authorization before testing
- C . Ignoring business impact
- D . Avoiding documentation of findings
