BASE
EXAM DUMPS
EC-COUNCIL
112-12
28% OFF Automatically For You
Certified Secure Computer User
,1.Which of the following best describes data security?
A. Measures to protect data from unauthorized access.
B. The process of ensuring data is stored in physical locations only.
C. Backup and recovery techniques for cloud data.
D. Procedures to duplicate data across multiple locations.
Answer: A
Explanation:
Data security encompasses practices, policies, and technologies aimed at protecting
data from unauthorized access, breaches, and theft.
2.Which is NOT a core element of security?
A. Confidentiality
on
ti
B. Data auditing
ra
pa
C. Integrity
re
P
D. Availability
m
xa
E
Answer: B
2
-1
Explanation:
12
1
Core elements of security include confidentiality, integrity, and availability (CIA triad).
il
nc
ou
Auditing supports security but is not a core element.
-C
C
E
r
fo
ls
ia
3.What does the CIA triad aim to achieve?
er
at
M
A. Regulatory compliance
dy
tu
B. Comprehensive data security
S
id
C. Data processing efficiency
al
-V
D. Encryption protocols
)
02
8.
Answer: B
(V
ps
Explanation:
um
The CIA triad?confidentiality, integrity, and availability?forms the foundation of a
D
12
comprehensive approach to protecting information assets.
2-
11
ht
ig
R
4.Data breaches primarily threaten which aspect of the CIA triad?
A. Integrity
B. Confidentiality
C. Availability
D. All of the above
Answer: B
Explanation:
Data breaches most directly threaten confidentiality by exposing sensitive information
to unauthorized parties.
, 5.Which of the following can compromise data integrity? (Choose two)
A. Unauthorized modifications
B. Man-in-the-middle attacks
C. User authentication failures
D. Distributed denial-of-service attacks
Answer: A, B
Explanation:
Unauthorized modifications and interception during transmission (e.g., man-in-the-
middle attacks) jeopardize data integrity.
6.What is the first step in establishing a secure computing environment?
on
ti
A. Regular software updates
ra
pa
B. Identifying and classifying assets
re
P
C. Encrypting all data
m
xa
E
D. Installing a firewall
2
-1
Answer: B
12
1
Explanation:
il
nc
ou
Identifying and classifying assets helps organizations understand what needs
-C
C
protection and prioritize
E
r
fo
security measures effectively.
ls
ia
er
at
M
dy
tu
7.Which type of security loss occurs due to a ransomware attack?
S
id
A. Loss of availability
al
-V
B. Loss of confidentiality
)
02
8.
C. Loss of integrity
(V
ps
D. Regulatory penalties
um
Answer: A
D
12
Explanation:
2-
11
Ransomware attacks primarily affect availability by restricting access to systems and
ht
ig
data until a ransom is paid.
R
8.An insider threat can compromise which elements of the CIA triad?
A. Confidentiality only
B. Integrity and availability only
C. Confidentiality, integrity, and availability
D. None of the above
Answer: C
Explanation:
Insider threats can affect all elements of the CIA triad by stealing, altering, or