Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 112-51 - Network Defense Essentials (NDE) Exam

Page: 2 / 3
Total 75 questions

Which of the following practices helps security professionals protect mobile applications from various attacks?

A.

Always cache app data

B.

Use containerization for critical corporate data

C.

Use query string while handling sensitive data

D.

Allow apps to save passwords to avoid multiple logins

Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.

Identify the type of IDS employed by Messy in the above scenario.

A.

Signature-based

B.

Stateful protocol analysis

C.

Anomaly-based

D.

Application proxy

Which of the following techniques is referred to as a messaging feature that originates from a server and enables the delivery of data or a message from an application to a mobile device without any explicit request from the user?

A.

Push notification

B.

PIN feature

C.

Geofencing

D.

Containerization

Jessica, a user, wanted to access the Internet from her laptop and therefore sends a connection request to the access point. To identify the wireless client, the access point forwarded that request to a RADIUS server.

The RADIUS server transmitted authentication keys to both the access point and Jessica's laptop. This key helps the access point identify a particular wireless client.

Identify the authentication method demonstrated in the above scenario.

A.

Shared key authentication

B.

Null authentication

C.

Open system authentication

D.

Centralized authentication

Joseph, a security professional, was instructed to secure the organization's network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.

Identify the attack signature analysis technique performed by Joseph in the above scenario.

A.

Composite-signature-based analysis

B.

Context-based signature analysis

C.

Content-based signature analysis

D.

Atomic-signature-based analysis

John, from a remote location, was monitoring his bedridden grandfather's health condition at his home. John has placed a smart wearable ECG on his grandfather's wrist so that he can receive alerts to his mobile phone and can keep a track over his grandfather's health condition periodically.

Which of the following types of loT communication model was demonstrated in the above scenario?

A.

Device-to-gateway model

B.

Device-to-cloud model

C.

Cloud-to-cloud communication model

D.

Device-to-device model

Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.

Identify the type of cipher employed by Kevin in the above scenario.

A.

Substitution cipher

B.

Streamn cipher

C.

Transposition cipher

D.

Block cipher

Steve was sharing his confidential file with John via an email that was digitally signed and encrypted. The digital signature was made using the "Diffie-Hellman (X9.42) with DSS" algorithm, and the email was encrypted using triple DES.

Which of the following protocols employs the above features to encrypt an email message?

A.

S/MIME

B.

EAP

C.

RADIUS

D.

TACACS+

Finch, a security auditor, was assigned the task of providing devices to all the employees to enable work from remote locations. Finch restricted the devices to work only for organization-relatedtasks, and not for personal use.

Which of the following mobile usage policies has Finch implemented in the above scenario?

A.

CYOD

B.

COBO

C.

COPE

D.

BYOD

Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults,overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.

Identify the type of attack initiated by Jacob in the above scenario.

A.

Cross-container attack

B.

Docker registry attack

C.

Container escaping attack

D.

Replay attack