Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 112-51 - Network Defense Essentials (NDE) Exam

Page: 3 / 3
Total 75 questions

Which of the following objects of the container network model (CNM) contains the configuration files of a container's network stack, such as routing table, container's interfaces, and DNS settings?

A.

Endpoint

B.

Sandbox

C.

Network drivers

D.

IPAM drivers

Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.

Identify the mobile device security risk raised on Stella's device in the above scenario.

A.

Application-based risk

B.

System-based risk

C.

Network-based risk

D.

Physical security risks