Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

112-51 Sample Questions Answers

Questions 4

Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?

Options:

A.

Reconnaissance signatures

B.

Unauthorized access signatures

C.

Denial-of-service (DoS) signatures

D.

Informational signatures

Buy Now
Questions 5

Below are the various steps involved in the creation of a data retention policy.

1.Understand and determine the applicable legal requirements of the organization

2.Ensure that all employees understand the organization's data retention policy

3.Build a data retention policy development team

4.ldentify and classify the data to be included in the data retention policy

5.Develop the data retention policy

Identify the correct sequence of steps involved.

Options:

A.

3 -- >2 -- >5 -- >4 -- >1

B.

3 -- >1 -- >4 -- >5 -- >2

C.

1 -- >3 -- >4 -- >2 -- >5

D.

1 -- >5 -- >4 -- >2 -- >3

Buy Now
Questions 6

Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web. She employed a proxy tool that makes his online activity untraceable.

Identify the type of proxy employed by John in the above scenario.

Options:

A.

SOCKS proxy

B.

Anonymous proxy

C.

Reverse proxy

D.

Explicit proxy

Buy Now
Questions 7

George, a professional hacker, targeted a bank employee and tried to crack his password while he was attempting to log on to the remote server to perform his regular banking operations. In thisprocess, George used sniffing tools to capture the password pairwise master key (PMK) associated with the handshake authentication process. Then, using the PMK, he gained unauthorized access to the server to perform malicious activities.

Identify the encryption technology on which George performed password cracking.

Options:

A.

WPA3

B.

WPA

C.

WPA2

D.

WEP

Buy Now
Questions 8

Which of the following access control models refers to assigning permissions to a user role based on the rules defined for each user role by the administrator?

Options:

A.

Discretionary rule access control

B.

Mandatory rule access control

C.

Rule-based access control

D.

Role-based access control

Buy Now
Questions 9

Joseph, a security professional, was instructed to secure the organization's network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.

Identify the attack signature analysis technique performed by Joseph in the above scenario.

Options:

A.

Composite-signature-based analysis

B.

Context-based signature analysis

C.

Content-based signature analysis

D.

Atomic-signature-based analysis

Buy Now
Questions 10

Joseph, a cloud administrator, was recruited for the management and deployment of the software

containers. As part of his job, Joseph employed an automated solution that converts images into containers, deploys them to the hosts, and further monitors container workflow from a single location.

Identify the solution employed by Joseph in the above scenario.

Options:

A.

Port scanners

B.

Orchestrators

C.

Network monitors

D.

Sniffers

Buy Now
Questions 11

Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults,overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.

Identify the type of attack initiated by Jacob in the above scenario.

Options:

A.

Cross-container attack

B.

Docker registry attack

C.

Container escaping attack

D.

Replay attack

Buy Now
Questions 12

Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.

In which of the following states has Steve encrypted the data in the above scenario?

Options:

A.

Data in use

B.

Data in transit

C.

Data inactive

D.

Data in rest

Buy Now
Questions 13

Clark, a security team member of an organization, was instructed to secure the premises from unauthorized entries. In this process, Clark implemented security controls that allow employees to enter the office only after scanning their badges or fingerprints.

Which of the following security controls has Clark implemented in the above scenario?

Options:

A.

Administrative security controls

B.

Technical security controls

C.

Physical security controls

D.

System access controls

Buy Now
Questions 14

Which of the following objects of the container network model (CNM) contains the configuration files of a container's network stack, such as routing table, container's interfaces, and DNS settings?

Options:

A.

Endpoint

B.

Sandbox

C.

Network drivers

D.

IPAM drivers

Buy Now
Questions 15

Which of the following tools is designed to identify and prevent malicious Trojans or malware from infecting computer systems or electronic devices?

Options:

A.

HOIC

B.

HitmanPro

C.

Hulk

D.

Hashcat

Buy Now
Questions 16

Finch, a security auditor, was assigned the task of providing devices to all the employees to enable work from remote locations. Finch restricted the devices to work only for organization-relatedtasks, and not for personal use.

Which of the following mobile usage policies has Finch implemented in the above scenario?

Options:

A.

CYOD

B.

COBO

C.

COPE

D.

BYOD

Buy Now
Questions 17

Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.

Which of the following algorithms was employed by Peter in the above scenario?

Options:

A.

RSA

B.

MD6

C.

DSA

D.

SHA-2

Buy Now
Questions 18

Which of the following techniques protects sensitive data by obscuring specific areas with random

characters or codes?

Options:

A.

Data retention

B.

Data resilience

C.

Data backup

D.

Data masking

Buy Now
Questions 19

Below are various authentication techniques.

1.Retina scanner

2.One-time password

3.DNA

4.Voice recognition

Identify the techniques that fall under biometric authentication.

Options:

A.

1, 3, and 4

B.

1, 2, and 3

C.

2, 3, and 4

D.

1, 2, and 4

Buy Now
Questions 20

John is working as a security professional in FinCorp Ltd. He was instructed to deploy a security solution on their corporate network that provides real-time monitoring, correlation of events, threat detection, and security incident response activities.

Which of the following security solutions helps John in the above scenario?

Options:

A.

SIEM

B.

VPN

C.

SOCKS

D.

MDM

Buy Now
Questions 21

Identify the loT communication model that serves as an analyzer for a company to track monthly or yearly energy consumption. Using this analysis, companies can reduce the expenditure on energy.

Options:

A.

Device-to-device model

B.

Cloud-to-cloud model

C.

Device-to-cloud model

D.

Device-to-gateway model

Buy Now
Questions 22

Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In

this process, he employed a computer system on the Internet intended to attract and trap those who

attempt unauthorized host system utilization to penetrate the organization's network.

Identify the type of security solution employed by Stephen in the above scenario.

Options:

A.

Firewall

B.

Honeypot

C.

IDS

D.

Proxy server

Buy Now
Exam Code: 112-51
Exam Name: Network Defense Essentials (NDE) Exam
Last Update: May 21, 2024
Questions: 75
$64  $159.99
$48  $119.99
$40  $99.99
buy now 112-51