ExamGecko
Home / ECCouncil / 112-51 / List of questions
Ask Question

ECCouncil 112-51 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?

Become a Premium Member for full access
  Unlock Premium Member

Question 22

Report Export Collapse

Finch, a security auditor, was assigned the task of providing devices to all the employees to enable work from remote locations. Finch restricted the devices to work only for organization-related tasks, and not for personal use.

Which of the following mobile usage policies has Finch implemented in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 23

Report Export Collapse

In an organization, employees are restricted from using their own storage devices, and only the company's portable storage devices are allowed. As employees are carrying the company's portable device outside their premises, the data should be protected from unauthorized access.

Which of the following techniques can be used to protect the data in a portable storage device?

Become a Premium Member for full access
  Unlock Premium Member

Question 24

Report Export Collapse

Finch, a security professional, was instructed to strengthen the security at the entrance. At the doorway, he implemented a security mechanism that allows employees to register their retina scan and a unique six- digit code, using which they can enter the office at any time.

Which of the following combinations of authentication mechanisms is implemented in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 25

Report Export Collapse

Identify the UBA tool that collects user activity details from multiple sources and uses artificial intelligence and machine learning algorithms to perform user behavior analysis to prevent and detect various threats before the fraud is perpetrated.

Become a Premium Member for full access
  Unlock Premium Member

Question 26

Report Export Collapse

Below is the list of encryption modes used in a wireless network.

1.WPA2 Enterprise with RADIUS

2.WPA3

3.WPA2 PSK

4.WPA2 Enterprise

Identify the correct order of wireless encryption modes in terms of security from high to low.

Become a Premium Member for full access
  Unlock Premium Member

Question 27

Report Export Collapse

Which of the following IDS components analyzes the traffic and reports if any suspicious activity is detected?

Become a Premium Member for full access
  Unlock Premium Member

Question 28

Report Export Collapse

Which of the following objects of the container network model (CNM) contains the configuration files of a container's network stack, such as routing table, container's interfaces, and DNS settings?

Become a Premium Member for full access
  Unlock Premium Member

Question 29

Report Export Collapse

Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.

In which of the following states has Steve encrypted the data in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 30

Report Export Collapse

Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults, overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.

Identify the type of attack initiated by Jacob in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8
Search

Related questions