Pass the ECCouncil NDE 112-51 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

George, a professional hacker, targeted a bank employee and tried to crack his password while he was attempting to log on to the remote server to perform his regular banking operations. In thisprocess, George used sniffing tools to capture the password pairwise master key (PMK) associated with the handshake authentication process. Then, using the PMK, he gained unauthorized access to the server to perform malicious activities.

Identify the encryption technology on which George performed password cracking.

Options:

A.

WPA3


B.

WPA


C.

WPA2


D.

WEP


Questions # 2:

Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults,overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.

Identify the type of attack initiated by Jacob in the above scenario.

Options:

A.

Cross-container attack


B.

Docker registry attack


C.

Container escaping attack


D.

Replay attack


Questions # 3:

Daniel, a networking specialist, identifies a glitch in a networking tool and fixes it on a priority using a system. Daniel was authorized to make a copy of computers programs while maintaining or repairing the system.

Which of the following acts was demonstrated in the above scenario?

Options:

A.

Sarbanes-Oxley Act (SOX)


B.

The Digital Millennium Copyright Act (DMCA)


C.

Data Protection Act 2018 (DPA)


D.

Gramm-Leach-Bliley Act (GLBA)


Questions # 4:

Which of the following environmental controls options saves the hardware from humidity and heat,

increases hardware performance, and maintains consistent room temperature?

Options:

A.

Hot and cold aisles


B.

Lighting systern


C.

Temperature indicator


D.

EMI shielding


Questions # 5:

Alice purchased a new zip-based document bag and placed white papers related to the academic project.

As it contains confidential information, she locked it with a physical security control that requires a

sequence of numbers and letters to unlock.

Identify the type of physical locking system used by Alice in the above scenario.

Options:

A.

Combination lock


B.

Mechanical lock


C.

Electromagnetic lock


D.

Digital lock


Questions # 6:

Below are various authentication techniques.

1.Retina scanner

2.One-time password

3.DNA

4.Voice recognition

Identify the techniques that fall under biometric authentication.

Options:

A.

1, 3, and 4


B.

1, 2, and 3


C.

2, 3, and 4


D.

1, 2, and 4


Questions # 7:

James was recruited as security personnel in an organization and was instructed to secure the organization's infrastructure from physical threats. To achieve this, James installed CCTV systems near gates, reception, hallways, and workplaces to capture illicit activities inside the premises, identify activities that need attention, collect images as evidence, and aid in an alarm system.

Identify the type of physical security control implemented by James in the above scenario.

Options:

A.

Video surveillance


B.

Fire-fighting systems


C.

Lighting system


D.

Physical barriers


Questions # 8:

John has recently joined an organization and completed his security training. The organization conducted a security campaign on their employees by sending a fake email stating the urgency of password reset. John identified that it was an illegitimate mail and reported it as spam.

Identify the type of attack initiated by the organization as part of the security campaign discussed in the above scenario.

Options:

A.

Phishing


B.

Tailgating


C.

Dumpster diving


D.

Shoulder surfing


Questions # 9:

A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.

Identify the type of fire-fighting system used by the rescue team in the above scenario.

Options:

A.

Wet chemical suppressant


B.

Sprinkler system


C.

Fire extinguisher


D.

Standpipe system


Questions # 10:

Which of the following algorithms uses a sponge construction where message blocks are XORed into the initial bits of the state that the algorithm then invertible permutes?

Options:

A.

MD5


B.

SHA-2


C.

SHA-3


D.

MD6


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions