EC-Council 112-51 Network Defense Essentials Exam (NDE) Online Training
EC-Council 112-51 Online Training
The questions for 112-51 were last updated at Nov 19,2024.
- Exam Code: 112-51
- Exam Name: Network Defense Essentials Exam (NDE)
- Certification Provider: EC-Council
- Latest update: Nov 19,2024
Alice was working on her major project; she saved all her confidential files and locked her laptop. Bob wanted to access Alice’s laptop for his personal use but was unable to access the laptop due to biometric authentication.
Which of the following network defense approaches was employed by Alice on her laptop?
- A . Retrospective approach
- B . Preventive approach
- C . Reactive approach
- D . Proactive approach
Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?
- A . Reconnaissance signatures
- B . Unauthorized access signatures
- C . Denial-of-service (DoS) signatures
- D . Informational signatures
Finch, a security auditor, was assigned the task of providing devices to all the employees to enable work from remote locations. Finch restricted the devices to work only for organization-related tasks, and not for personal use.
Which of the following mobile usage policies has Finch implemented in the above scenario?
- A . CYOD
- B . COBO
- C . COPE
- D . BYOD
In an organization, employees are restricted from using their own storage devices, and only the company’s portable storage devices are allowed. As employees are carrying the company’s portable device outside their premises, the data should be protected from unauthorized access.
Which of the following techniques can be used to protect the data in a portable storage device?
- A . Data retention
- B . Data encryption
- C . Data resilience
- D . Disk mirroring
Which of the following algorithms uses a sponge construction where message blocks are XORed into the initial bits of the state that the algorithm then invertible permutes?
- A . MD5
- B . SHA-2
- C . SHA-3
- D . MD6
Which of the following algorithms uses a sponge construction where message blocks are XORed into the initial bits of the state that the algorithm then invertible permutes?
- A . MD5
- B . SHA-2
- C . SHA-3
- D . MD6
ldentify and classify the data to be included in the data retention policy 5.Develop the data retention policy
Identify the correct sequence of steps involved.
- A . 3 — >2 — >5 — >4 — >1
- B . 3 — >1 — >4 — >5 — >2
- C . 1 — >3 — >4 — >2 — >5
- D . 1 — >5 — >4 — >2 — >3
Cibel.org, an organization, wanted to develop a web application for marketing its products to the public. In this process, they consulted a cloud service provider and requested provision of development tools, configuration management, and deployment platforms for developing customized applications.
Identify the type of cloud service requested by Cibel.org in the above scenario.
- A . Security-as-a-service (SECaaS)
- B . Platform-as-a-service
- C . Infrastructure-as-a-service {laaS)
- D . ldentity-as-a-service {IDaaS)
Ben, a computer user, applied for a digital certificate. A component of PKI verifies Ben’s identity using the credentials provided and passes that request on behalf of Ben to grant the digital certificate.
Which of the following PKI components verified Ben as being legitimate to receive the certificate?
- A . Certificate authority (CA)
- B . Registration authority {RA)
- C . Certificate directory
- D . Validation authority (VA)
George, a certified security professional, was hired by an organization to ensure that the server accurately responds to customer requests. In this process, George employed a security solution to monitor the network traffic toward the server. While monitoring the traffic, he identified attack signatures such as SYN flood and ping of death attempts on the server.
Which of the following categories of suspicious traffic signature has George identified in the above scenario?
- A . Informational
- B . Reconnaissance
- C . Unauthorized access
- D . Denial-of-service (DoS)