Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 112-51 - Network Defense Essentials (NDE) Exam

Page: 1 / 3
Total 75 questions

Kevin logged into a banking application with his registered credentials and tried to transfer someamount from his account to Flora's account. Before transferring the amount to Flora's account, the application sent an OTP to Kevin's mobile for confirmation.

Which of the following authentication mechanisms is employed by the banking application in the above scenario?

A.

Biometric authentication

B.

Smart card authentication

C.

Single sign-on (SSO) authentication

D.

Two-factor authentication

Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In

this process, he employed a computer system on the Internet intended to attract and trap those who

attempt unauthorized host system utilization to penetrate the organization's network.

Identify the type of security solution employed by Stephen in the above scenario.

A.

Firewall

B.

Honeypot

C.

IDS

D.

Proxy server

Which of the following solutions is a software or a hardware device on a network or host that filters the incoming and outgoing traffic to prevent unauthorized access to private networks?

A.

Firewall

B.

Router

C.

Hub

D.

Switch

Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?

A.

Reconnaissance signatures

B.

Unauthorized access signatures

C.

Denial-of-service (DoS) signatures

D.

Informational signatures

Which of the following actors in the NIST cloud deployment reference architecture acts as an intermediary for providing connectivity and transport services between cloud consumers and providers?

A.

Cloud provider

B.

Cloud auditor

C.

Cloud consumer

D.

Cloud carrier

Alice purchased a new zip-based document bag and placed white papers related to the academic project.

As it contains confidential information, she locked it with a physical security control that requires a

sequence of numbers and letters to unlock.

Identify the type of physical locking system used by Alice in the above scenario.

A.

Combination lock

B.

Mechanical lock

C.

Electromagnetic lock

D.

Digital lock

Below are the various steps involved in establishing a network connection using the shared key

authentication process.

1.The AP sends a challenge text to the station.

2.The station connects to the network.

3.The station encrypts the challenge text using its configured 128-bit key and sends the encrypted text to the AP.

4.The station sends an authentication frame to the AP.

5.The AP uses its configured WEP key to decrypt the encrypted text and compares it with the original challenge text.

What is the correct sequence of steps involved in establishing a network connection using the shared key authentication process?

A.

4 -- >2 -- >1 -- >3 -- >5

B.

4 -- >1 -- >3 -- >5 -- >2

C.

2 -- >4 -- >5 -- >1 -- >3

D.

4 -- >5 -- >3 -- >2 -- >1

Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.

Which of the following algorithms was employed by Peter in the above scenario?

A.

RSA

B.

MD6

C.

DSA

D.

SHA-2

Bob has secretly installed smart CCTV devices (loT devices) outside his home and wants to access the recorded data from a remote location. These smart CCTV devices send sensed data to an intermediate device that carries out pre-processing of data online before transmitting it to the cloud for storage and analysis. The analyzed data is then sent to Bob for initiating actions.

Identify the component of loT architecture that collects data from loT devices and performs data pre-processing.

A.

Streaming data processor

B.

Gateway

C.

Data lakes

D.

Machine learning

Below are various authentication techniques.

1.Retina scanner

2.One-time password

3.DNA

4.Voice recognition

Identify the techniques that fall under biometric authentication.

A.

1, 3, and 4

B.

1, 2, and 3

C.

2, 3, and 4

D.

1, 2, and 4