Pass the ECCouncil NDE 112-51 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following IDS components analyzes the traffic and reports if any suspicious activity is

detected?

Options:

A.

Command console


B.

Network sensor


C.

Database of attack signatures


D.

Response system


Expert Solution
Questions # 12:

John, from a remote location, was monitoring his bedridden grandfather's health condition at his home. John has placed a smart wearable ECG on his grandfather's wrist so that he can receive alerts to his mobile phone and can keep a track over his grandfather's health condition periodically.

Which of the following types of loT communication model was demonstrated in the above scenario?

Options:

A.

Device-to-gateway model


B.

Device-to-cloud model


C.

Cloud-to-cloud communication model


D.

Device-to-device model


Expert Solution
Questions # 13:

Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In

this process, he employed a computer system on the Internet intended to attract and trap those who

attempt unauthorized host system utilization to penetrate the organization's network.

Identify the type of security solution employed by Stephen in the above scenario.

Options:

A.

Firewall


B.

Honeypot


C.

IDS


D.

Proxy server


Expert Solution
Questions # 14:

Alice was working on her major project; she saved all her confidential files and locked her laptop. Bob wanted to access Alice's laptop for his personal use but was unable to access the laptop due to biometric authentication.

Which of the following network defense approaches was employed by Alice on her laptop?

Options:

A.

Retrospective approach


B.

Preventive approach


C.

Reactive approach


D.

Proactive approach


Expert Solution
Questions # 15:

Below are the various steps involved in the creation of a data retention policy.

1.Understand and determine the applicable legal requirements of the organization

2.Ensure that all employees understand the organization's data retention policy

3.Build a data retention policy development team

4.ldentify and classify the data to be included in the data retention policy

5.Develop the data retention policy

Identify the correct sequence of steps involved.

Options:

A.

3 -- >2 -- >5 -- >4 -- >1


B.

3 -- >1 -- >4 -- >5 -- >2


C.

1 -- >3 -- >4 -- >2 -- >5


D.

1 -- >5 -- >4 -- >2 -- >3


Expert Solution
Questions # 16:

Which of the following practices helps security professionals protect mobile applications from various attacks?

Options:

A.

Always cache app data


B.

Use containerization for critical corporate data


C.

Use query string while handling sensitive data


D.

Allow apps to save passwords to avoid multiple logins


Expert Solution
Questions # 17:

Steve was sharing his confidential file with John via an email that was digitally signed and encrypted. The digital signature was made using the "Diffie-Hellman (X9.42) with DSS" algorithm, and the email was encrypted using triple DES.

Which of the following protocols employs the above features to encrypt an email message?

Options:

A.

S/MIME


B.

EAP


C.

RADIUS


D.

TACACS+


Expert Solution
Questions # 18:

Which of the following techniques is referred to as a messaging feature that originates from a server and enables the delivery of data or a message from an application to a mobile device without any explicit request from the user?

Options:

A.

Push notification


B.

PIN feature


C.

Geofencing


D.

Containerization


Expert Solution
Questions # 19:

George, a certified security professional, was hired by an organization to ensure that the server accurately responds to customer requests. In this process, George employed a security solution to monitor the network traffic toward the server. While monitoring the traffic, he identified attack signatures such as SYN flood and ping of death attempts on the server.

Which of the following categories of suspicious traffic signature has George identified in the above scenario?

Options:

A.

Informational


B.

Reconnaissance


C.

Unauthorized access


D.

Denial-of-service (DoS)


Expert Solution
Questions # 20:

Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.

Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.

Options:

A.

WPA


B.

WPA3


C.

EAP


D.

WEP


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions