Practice Free 112-52 Exam Online Questions
Question #41
Which type of malware is specifically designed to remain hidden while providing attackers persistent privileged access?
- A . Rootkit
- B . Ransomware
- C . Adware
- D . Worm
Correct Answer: A
Question #42
Which of the following is a type of malware?
- A . Virus
- B . Firewall
- C . Proxy server
- D . VPN
Correct Answer: A
Question #43
Phishing attacks typically occur through which medium?
- A . In-person conversations
- B . Physical mail
- C . Telephone calls
- D . Electronic communications
Correct Answer: D
Question #44
Which of the following is a strong indicator of a potential insider threat?
- A . Increased data usage
- B . Consistent adherence to security policies
- C . Prompt reporting of suspicious activity
- D . Regular participation in security training
Correct Answer: A
Question #45
Which is a security challenge unique to IoT environments?
- A . Infrequent firmware updates
- B . Infrequent firmware updates
- C . Strong authentication mechanisms
- D . Abundant computing resources
Correct Answer: A
Question #46
Which technique involves trying all possible combinations of characters until the correct password is found?
- A . Phishing
- B . Brute force attack
- C . Dictionary attack
- D . Social engineering
Correct Answer: B
Question #47
What mechanism is typically exploited in a Cross-Site Request Forgery (CSRF) attack?
- A . The user’s trust in their browser’s security
- B . The server’s trust in user input
- C . The server’s trust in that the user has authenticated
- D . The application’s trust in dynamic script execution
Correct Answer: C
Question #48
Which of the following is a key element of information security laws and regulations?
- A . Marketing compliance
- B . Security through obscurity
- C . Compliance with privacy acts
- D . Network hardware performance
Correct Answer: C
Question #49
Which method involves guessing passwords through an automated process of trial and error?
- A . Social engineering
- B . Phishing
- C . Brute force attack
- D . Spoofing
Correct Answer: C
