ExamGecko
Home Home / ECCouncil / 112-51

ECCouncil 112-51 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?

A.
Reconnaissance signatures
A.
Reconnaissance signatures
Answers
B.
Unauthorized access signatures
B.
Unauthorized access signatures
Answers
C.
Denial-of-service (DoS) signatures
C.
Denial-of-service (DoS) signatures
Answers
D.
Informational signatures
D.
Informational signatures
Answers
Suggested answer: B

Explanation:

Unauthorized access signatures were identified by Kalley through the installed monitoring system. Unauthorized access signatures are designed to detect attempts to gain unauthorized access to a system or network by exploiting vulnerabilities, misconfigurations, or weak credentials. Password cracking, sniffing, and brute-forcing are common techniques used by attackers to obtain or guess the passwords of legitimate users or administrators and gain access to their accounts or privileges. These techniques generate suspicious traffic patterns that can be detected by traffic monitoring systems, such as Snort, using signature-based detection. Signature-based detection is based on the premise that abnormal or malicious network traffic fits a distinct pattern, whereas normal or benign traffic does not. Therefore, by installing a traffic monitoring system and capturing and reporting suspicious traffic signatures, Kalley can identify and prevent unauthorized access attempts and protect the security of her organization's network.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-33 to 3-34

Detecting Suspicious Traffic via Signatures - Intrusion Detection with Snort, O'Reilly, 2003

Threat Signature Categories - Palo Alto Networks, Palo Alto Networks, 2020

Finch, a security auditor, was assigned the task of providing devices to all the employees to enable work from remote locations. Finch restricted the devices to work only for organization-related tasks, and not for personal use.

Which of the following mobile usage policies has Finch implemented in the above scenario?

A.
CYOD
A.
CYOD
Answers
B.
COBO
B.
COBO
Answers
C.
COPE
C.
COPE
Answers
D.
BYOD
D.
BYOD
Answers
Suggested answer: B

Explanation:

Finch has implemented the COBO (Corporate-Owned, Business-Only) mobile usage policy in the above scenario. COBO is a policy where the organization provides mobile devices to the employees and restricts them to use the devices only for work-related purposes. The organization has full control over the devices and can enforce security measures, such as encryption, password protection, remote wipe, and application whitelisting or blacklisting. The employees are not allowed to use the devices for personal use, such as browsing the internet, making personal calls, or installing personal apps. COBO is a policy that aims to maximize security and minimize distractions and risks for the organization and the employees.

Reference:

Mobile usage policy in office - sample, cell phone policy in companies and organization, HR Help Board, 2020

Employee Cell Phone Policy Template, Workable, 2020

How Employers Enforce Cell Phone Policies in the Workplace, Indeed, 2022

In an organization, employees are restricted from using their own storage devices, and only the company's portable storage devices are allowed. As employees are carrying the company's portable device outside their premises, the data should be protected from unauthorized access.

Which of the following techniques can be used to protect the data in a portable storage device?

A.
Data retention
A.
Data retention
Answers
B.
Data encryption
B.
Data encryption
Answers
C.
Data resilience
C.
Data resilience
Answers
D.
Disk mirroring
D.
Disk mirroring
Answers
Suggested answer: B

Explanation:

Data encryption is the technique that can be used to protect the data in a portable storage device. Data encryption is the process of transforming data into an unreadable format using a secret key or algorithm. Only authorized parties who have the correct key or algorithm can decrypt and access the data. Data encryption provides security and privacy for the data stored on a portable storage device, such as a USB flash drive or an external hard drive, by preventing unauthorized access, modification, or disclosure. If the device is lost or stolen, the data will remain protected and inaccessible to the unauthorized user. Data encryption can be implemented using software or hardware solutions, such as BitLocker, VeraCrypt, or encrypted USB drives. Data encryption is one of the best practices for securely storing data on portable devices123.

Reference:

7 Ways to Secure Sensitive Data on a USB Flash Drive, UpGuard, August 17, 2022

How to Protect Data on Portable Drives, PCWorld, January 10, 2011

Securely Storing Data, Security.org, December 20, 2022

Finch, a security professional, was instructed to strengthen the security at the entrance. At the doorway, he implemented a security mechanism that allows employees to register their retina scan and a unique six- digit code, using which they can enter the office at any time.

Which of the following combinations of authentication mechanisms is implemented in the above scenario?

A.
Biornetric and password authentication
A.
Biornetric and password authentication
Answers
B.
Password and two-factor authentication
B.
Password and two-factor authentication
Answers
C.
Two-factor and smart card authentication
C.
Two-factor and smart card authentication
Answers
D.
Smart card and password authentication
D.
Smart card and password authentication
Answers
Suggested answer: A

Explanation:

The combination of authentication mechanisms that is implemented in the above scenario is biometric and password authentication. Biometric authentication is a type of authentication that uses an inherent factor, such as a retina scan, to verify the identity of the user. Password authentication is a type of authentication that uses a knowledge factor, such as a six-digit code, to verify the identity of the user. By combining biometric and password authentication, Finch has implemented a two-factor authentication (2FA) system that requires the user to provide two different types of authentication factors to gain access to the office. 2FA is a more secure way of authentication than using a single factor, as it reduces the risk of unauthorized access due to stolen or compromised credentials. Biometric and password authentication is a common 2FA method that is used in many applications, such as banking, e-commerce, or health care123.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-28 to 3-29

What is Biometric Authentication?, Norton, July 29, 2020

What is Two-Factor Authentication (2FA)?, Authy, 2020

Identify the UBA tool that collects user activity details from multiple sources and uses artificial intelligence and machine learning algorithms to perform user behavior analysis to prevent and detect various threats before the fraud is perpetrated.

A.
Nmap
A.
Nmap
Answers
B.
ClamWin
B.
ClamWin
Answers
C.
Dtex systems
C.
Dtex systems
Answers
D.
Wireshark
D.
Wireshark
Answers
Suggested answer: C

Explanation:

Dtex Systems is the UBA tool that collects user activity details from multiple sources and uses artificial intelligence and machine learning algorithms to perform user behavior analysis to prevent and detect various threats before the fraud is perpetrated. Dtex Systems is a user and entity behavior analytics (UEBA) platform that provides visibility, detection, and response capabilities for insider threats, compromised accounts, data loss, and fraud. Dtex Systems collects user activity data from endpoints, servers, cloud applications, and network traffic, and applies advanced analytics and machine learning to establish baselines of normal user behavior, identify anomalies, and assign risk scores. Dtex Systems also provides contextual information, such as user intent, motivation, and sentiment, to help security teams understand and respond to the threats. Dtex Systems can integrate with other security tools, such as SIEM, DLP, or IAM, to enhance the security posture of the organization123.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-35 to 3-36

Dtex Systems - Wikipedia, Wikipedia, March 16, 2021

Dtex Systems - User and Entity Behavior Analytics (UEBA), Dtex Systems, 2020

Below is the list of encryption modes used in a wireless network.

1.WPA2 Enterprise with RADIUS

2.WPA3

3.WPA2 PSK

4.WPA2 Enterprise

Identify the correct order of wireless encryption modes in terms of security from high to low.

A.
2 -- >1 -- >4 -- >3
A.
2 -- >1 -- >4 -- >3
Answers
B.
3 -- >1 -- >4 -- >2
B.
3 -- >1 -- >4 -- >2
Answers
C.
4 -- >2 -- >3 -- >1
C.
4 -- >2 -- >3 -- >1
Answers
D.
4 -- >3 -- >2 -- >1
D.
4 -- >3 -- >2 -- >1
Answers
Suggested answer: A

Explanation:

Explore

The correct order of wireless encryption modes in terms of security from high to low is 2 -> 1 -> 4 -> 3. This is based on the following comparison of the wireless encryption modes:

WPA3: WPA3 is the latest and most secure wireless encryption mode, introduced in 2018 as a successor to WPA2. WPA3 uses the AES encryption protocol and provides several security enhancements, such as stronger password protection, individualized encryption, forward secrecy, and protection against brute-force and dictionary attacks. WPA3 also supports two modes: WPA3-Personal and WPA3-Enterprise, which offer different levels of security for home and business networks. WPA3-Personal uses Simultaneous Authentication of Equals (SAE) to replace the Pre-Shared Key (PSK) method and provide more robust password-based authentication. WPA3-Enterprise uses 192-bit cryptographic strength to provide additional protection for sensitive data and networks123.

WPA2 Enterprise with RADIUS: WPA2 Enterprise with RADIUS is a wireless encryption mode that combines the security features of WPA2 Enterprise and the authentication features of RADIUS. WPA2 Enterprise is a mode of WPA2 that uses the AES encryption protocol and provides stronger security than WPA2 Personal, which uses the PSK method. WPA2 Enterprise uses the 802.1X standard to implement Extensible Authentication Protocol (EAP) methods, such as EAP-TLS, EAP-TTLS, or PEAP, to authenticate users and devices before granting access to the network. RADIUS is a protocol that allows a central server to manage authentication, authorization, and accounting for network access. RADIUS can integrate with WPA2 Enterprise to provide centralized and scalable authentication for large and complex networks, such as corporate or campus networks .

WPA2 Enterprise: WPA2 Enterprise is a wireless encryption mode that uses the AES encryption protocol and provides stronger security than WPA2 Personal, which uses the PSK method. WPA2 Enterprise uses the 802.1X standard to implement Extensible Authentication Protocol (EAP) methods, such as EAP-TLS, EAP-TTLS, or PEAP, to authenticate users and devices before granting access to the network. WPA2 Enterprise is suitable for business or public networks that require individual and secure authentication for each user or device .

WPA2 PSK: WPA2 PSK is a wireless encryption mode that uses the AES encryption protocol and provides better security than WEP or WPA, which use the TKIP encryption protocol. WPA2 PSK uses the Pre-Shared Key (PSK) method, which means that all users and devices share the same password or passphrase to join the network. WPA2 PSK is easy to set up and use, but it has some security drawbacks, such as being vulnerable to brute-force and dictionary attacks, or having the password compromised by a rogue user or device. WPA2 PSK is suitable for home or small networks that do not require individual authentication or advanced security features .

Wi-Fi Security: Should You Use WPA2-AES, WPA2-TKIP, or Both? - How-To Geek, How-To Geek, March 12, 2023

WiFi Security: WEP, WPA, WPA2, WPA3 And Their Differences - NetSpot, NetSpot, February 8, 2024

What is WPA3? And some gotchas to watch out for in this Wi-Fi security upgrade - CSO Online, CSO Online, November 18, 2020

[Types of Wireless Security Encryption - GeeksforGeeks], GeeksforGeeks, 2020

[Wireless Security Protocols: WEP, WPA, and WPA2 - Lifewire], Lifewire, February 17, 2021

[WPA vs. WPA2 vs. WPA3: Wi-Fi Security Explained - MakeUseOf], MakeUseOf, January 13, 2021

Which of the following IDS components analyzes the traffic and reports if any suspicious activity is detected?

A.
Command console
A.
Command console
Answers
B.
Network sensor
B.
Network sensor
Answers
C.
Database of attack signatures
C.
Database of attack signatures
Answers
D.
Response system
D.
Response system
Answers
Suggested answer: B

Explanation:

The IDS component that analyzes the traffic and reports if any suspicious activity is detected is the network sensor. A network sensor is a device or software application that is deployed at a strategic point or points within the network to monitor and capture the network traffic to and from all devices on the network. A network sensor can operate in one of two modes: promiscuous or inline. In promiscuous mode, the network sensor passively listens to the network traffic and copies the packets for analysis. In inline mode, the network sensor actively intercepts and filters the network traffic and can block or modify the packets based on predefined rules. A network sensor analyzes the network traffic using various detection methods, such as signature-based, anomaly-based, or reputation-based, and compares the traffic patterns with a database of attack signatures or a model of normal behavior. If the network sensor detects any suspicious or malicious activity, such as a reconnaissance scan, an unauthorized access attempt, or a denial-of-service attack, it generates an alert and reports it to the IDS manager or the operator. A network sensor can also integrate with a response system to take appropriate actions, such as logging, notifying, or blocking, in response to the detected activity123.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-33 to 3-34

Intrusion Detection System (IDS) - GeeksforGeeks, GeeksforGeeks, 2020

Intrusion detection system - Wikipedia, Wikipedia, March 16, 2021

Which of the following objects of the container network model (CNM) contains the configuration files of a container's network stack, such as routing table, container's interfaces, and DNS settings?

A.
Endpoint
A.
Endpoint
Answers
B.
Sandbox
B.
Sandbox
Answers
C.
Network drivers
C.
Network drivers
Answers
D.
IPAM drivers
D.
IPAM drivers
Answers
Suggested answer: B

Explanation:

The object of the container network model (CNM) that contains the configuration files of a container's network stack, such as routing table, container's interfaces, and DNS settings, is the Sandbox. A Sandbox is a logical entity that encapsulates the network configuration and state of a container. A Sandbox can contain one or more endpoints from different networks, and provides isolation and security for the container's network stack. A Sandbox can be implemented using various technologies, such as Linux network namespaces, FreeBSD jails, or Windows compartments. A Sandbox allows the container to have its own view and control of the network resources, such as interfaces, addresses, routes, and DNS settings123.

Reference:

The Container Networking Model | Training, Training, 2020

A Comprehensive Guide To Docker Networking - KnowledgeHut, KnowledgeHut, September 27, 2023

Design - GitHub: Let's build from here, GitHub, 2020

Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.

In which of the following states has Steve encrypted the data in the above scenario?

A.
Data in use
A.
Data in use
Answers
B.
Data in transit
B.
Data in transit
Answers
C.
Data inactive
C.
Data inactive
Answers
D.
Data in rest
D.
Data in rest
Answers
Suggested answer: A

Explanation:

The state in which Mark encrypted the data in the above scenario is data in use. Data in use refers to data that is being processed or manipulated by an application or a system, such as data stored on RAM or CPU registers. Data in use is the most vulnerable state of data, as it is exposed to various threats, such as memory scraping, buffer overflow, or side-channel attacks, that can compromise the confidentiality, integrity, or availability of the data. Data in use encryption is a technique that protects the data while it is being processed by encrypting it in memory using hardware or software solutions. Data in use encryption prevents unauthorized access or modification of the data, even if the system is compromised or the memory is dumped. Data in use encryption is one of the three types of data encryption, along with data at rest encryption and data in transit encryption123.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-23 to 3-24

Encryption: Data at Rest, Data in Motion and Data in Use, Jatheon, 2020

Data in Use Encryption: What It Is and Why You Need It, Fortanix, 2020

Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults, overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.

Identify the type of attack initiated by Jacob in the above scenario.

A.
Cross-container attack
A.
Cross-container attack
Answers
B.
Docker registry attack
B.
Docker registry attack
Answers
C.
Container escaping attack
C.
Container escaping attack
Answers
D.
Replay attack
D.
Replay attack
Answers
Suggested answer: A

Explanation:

The type of attack initiated by Jacob in the above scenario is a cross-container attack. A cross-container attack is a type of attack that targets container technology and exploits the shared resources and network connections between containers. A cross-container attack can compromise the security and availability of multiple containers and the underlying host by performing actions such as stealing data, executing commands, consuming resources, or spreading malware. A cross-container attack can be launched by an external attacker who gains access to a container through a network vulnerability, or by a malicious insider who runs a rogue container on the same host or cluster. A cross-container attack can be prevented or mitigated by implementing security best practices for container technology, such as isolating containers, limiting privileges, enforcing policies, scanning images, and monitoring network traffic123.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-37 to 3-38

6 Common Kubernetes and Container Attack Techniques and How to Prevent Them - Palo Alto Networks, Palo Alto Networks, March 2, 2022

The evolution of a matrix: How ATT&CK for Containers was built - Microsoft, Microsoft, July 21, 2021

Total 75 questions
Go to page: of 8