EC-Council 112-51 Network Defense Essentials Exam (NDE) Online Training
EC-Council 112-51 Online Training
The questions for 112-51 were last updated at Nov 20,2024.
- Exam Code: 112-51
- Exam Name: Network Defense Essentials Exam (NDE)
- Certification Provider: EC-Council
- Latest update: Nov 20,2024
Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.
In which of the following states has Steve encrypted the data in the above scenario?
- A . Data in use
- B . Data in transit
- C . Data inactive
- D . Data in rest
Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults, overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.
Identify the type of attack initiated by Jacob in the above scenario.
- A . Cross-container attack
- B . Docker registry attack
- C . Container escaping attack
- D . Replay attack
Which of the following ISO standards provides guidance to ensure that cloud service providers offer
appropriate information security controls to protect the privacy of their customer’s clients by securing personally identifiable information entrusted to them?
- A . ISO/IEC 27001
- B . ISO/IEC 27018
- C . ISO/IEC 27011
- D . ISO/IEC 27007
John has recently joined an organization and completed his security training. The organization conducted a security campaign on their employees by sending a fake email stating the urgency of password reset. John identified that it was an illegitimate mail and reported it as spam.
Identify the type of attack initiated by the organization as part of the security campaign discussed in the above scenario.
- A . Phishing
- B . Tailgating
- C . Dumpster diving
- D . Shoulder surfing
Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.
Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.
- A . WPA
- B . WPA3
- C . EAP
- D . WEP
Jamie wants to send a confidential file to her friend Alice. For this purpose, they installed an application for securely sharing the file. The application employs an encryption algorithm that uses the same shared secret key for encryption and decryption of data.
Identify the type of cryptography employed by the application used by Alice and Jamie for file sharing.
- A . Symmetric cryptography
- B . Public-key cryptography
- C . RSA cryptosystem
- D . Asymmetric cryptography
James was recruited as security personnel in an organization and was instructed to secure the organization’s infrastructure from physical threats. To achieve this, James installed CCTV systems near gates, reception, hallways, and workplaces to capture illicit activities inside the premises, identify activities that need attention, collect images as evidence, and aid in an alarm system.
Identify the type of physical security control implemented by James in the above scenario.
- A . Video surveillance
- B . Fire-fighting systems
- C . Lighting system
- D . Physical barriers
James was recruited as security personnel in an organization and was instructed to secure the organization’s infrastructure from physical threats. To achieve this, James installed CCTV systems near gates, reception, hallways, and workplaces to capture illicit activities inside the premises, identify activities that need attention, collect images as evidence, and aid in an alarm system.
Identify the type of physical security control implemented by James in the above scenario.
- A . Video surveillance
- B . Fire-fighting systems
- C . Lighting system
- D . Physical barriers
James was recruited as security personnel in an organization and was instructed to secure the organization’s infrastructure from physical threats. To achieve this, James installed CCTV systems near gates, reception, hallways, and workplaces to capture illicit activities inside the premises, identify activities that need attention, collect images as evidence, and aid in an alarm system.
Identify the type of physical security control implemented by James in the above scenario.
- A . Video surveillance
- B . Fire-fighting systems
- C . Lighting system
- D . Physical barriers
James was recruited as security personnel in an organization and was instructed to secure the organization’s infrastructure from physical threats. To achieve this, James installed CCTV systems near gates, reception, hallways, and workplaces to capture illicit activities inside the premises, identify activities that need attention, collect images as evidence, and aid in an alarm system.
Identify the type of physical security control implemented by James in the above scenario.
- A . Video surveillance
- B . Fire-fighting systems
- C . Lighting system
- D . Physical barriers