ExamGecko
Home Home / ECCouncil / 112-51

ECCouncil 112-51 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











Which of the following ISO standards provides guidance to ensure that cloud service providers offer appropriate information security controls to protect the privacy of their customer's clients by securing personally identifiable information entrusted to them?

A.
ISO/IEC 27001
A.
ISO/IEC 27001
Answers
B.
ISO/IEC 27018
B.
ISO/IEC 27018
Answers
C.
ISO/IEC 27011
C.
ISO/IEC 27011
Answers
D.
ISO/IEC 27007
D.
ISO/IEC 27007
Answers
Suggested answer: B

Explanation:

ISO/IEC 27018 is the ISO standard that provides guidance to ensure that cloud service providers offer appropriate information security controls to protect the privacy of their customer's clients by securing personally identifiable information entrusted to them. ISO/IEC 27018 is a code of practice for protecting personal information in cloud storage. The term for the personal data it covers is Personally Identifiable Information or PII. ISO/IEC 27018 is an addendum to ISO/IEC 27001, the first international code of practice for cloud privacy. It helps cloud service providers who process PII to assess risk and implement controls for protecting PII. ISO/IEC 27018 was created in 2014 and updated in 2019. It has the following objectives:

Help the public cloud service provider to comply with applicable obligations when acting as a PII processor, whether such obligations fall on the PII processor directly or through contract.

Enable the public cloud PII processor to be transparent in relevant matters so that cloud service customers can select well-governed cloud-based PII processing services.

Assist the cloud service customer and the public cloud PII processor in entering into a contractual agreement.

Provide cloud service customers with a mechanism for exercising audit and compliance rights and responsibilities in cases where individual cloud service customer audits of data hosted in a multiparty, virtualized server (cloud) environment can be impractical technically and can increase risks to those physical and logical network security controls in place123.

ISO/IEC 27018: Protecting PII in Public Clouds - ISMS.online, ISMS.online, 2019

ISO/IEC 27018 - Wikipedia, Wikipedia, 2021

ISO/IEC 27018:2019 - Information technology --- Security techniques --- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors, ISO, 2019

John has recently joined an organization and completed his security training. The organization conducted a security campaign on their employees by sending a fake email stating the urgency of password reset. John identified that it was an illegitimate mail and reported it as spam.

Identify the type of attack initiated by the organization as part of the security campaign discussed in the above scenario.

A.
Phishing
A.
Phishing
Answers
B.
Tailgating
B.
Tailgating
Answers
C.
Dumpster diving
C.
Dumpster diving
Answers
D.
Shoulder surfing
D.
Shoulder surfing
Answers
Suggested answer: A

Explanation:

The type of attack initiated by the organization as part of the security campaign discussed in the above scenario is phishing. Phishing is a form of fraud where cybercriminals use email, instant messaging, or other social media to try to gather information such as login credentials by masquerading as a reputable person or organization. Phishing occurs when a malicious party sends a fraudulent email disguised as being from an authorized, trusted source, and tries to persuade the recipient to click on a link, open an attachment, or provide personal information. The link or attachment may lead to a fake website or install malware on the recipient's device, while the personal information may be used for identity theft, account takeover, or other malicious purposes. Phishing is one of the most common and effective cyberattacks, as it exploits the human factor and relies on social engineering techniques to manipulate the victim's emotions, such as urgency, fear, or curiosity.Phishing can be prevented or mitigated by educating the users on how to recognize and report phishing emails, using strong and unique passwords, enabling multi-factor authentication, and installing security software123.Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-30 to 3-31

20 types of phishing attacks + phishing examples - Norton, Norton, October 03, 2022

Types of Email Attacks - GeeksforGeeks, GeeksforGeeks, May 30, 2023

Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.

Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.

A.
WPA
A.
WPA
Answers
B.
WPA3
B.
WPA3
Answers
C.
EAP
C.
EAP
Answers
D.
WEP
D.
WEP
Answers
Suggested answer: B

Explanation:

WPA3 is the latest standard of Wi-Fi Protected Access, which was released in 2018 by the Wi-Fi Alliance. WPA3 uses a new handshake protocol called Simultaneous Authentication of Equals (SAE), which is based on a zero-knowledge proof known as dragonfly. Dragonfly is a key exchange algorithm that uses discrete logarithm cryptography to derive a shared secret between two parties, without revealing any information about their passwords or keys. Dragonfly is resistant to offline dictionary attacks, where an attacker tries to guess the password by capturing the handshake and testing different combinations. Dragonfly is also resistant to key recovery attacks, where an attacker tries to recover the encryption key by exploiting weaknesses in the algorithm or implementation. Dragonfly provides forward secrecy, which means that even if an attacker manages to compromise the password or key in the future, they cannot decrypt the past communication. WPA3 also supports other features such as increased key sizes, opportunistic wireless encryption, and protected management frames, which enhance the security and privacy of wireless networks.

Reference:

WPA3 Dragonfly Handshake

WPA3 Encryption and Configuration Guide

Dragon Fly - Zero Knowledge Proof

What is SAE (Simultaneous Authentication of Equals)?

Dragonfly - people.scs.carleton.ca

Jamie wants to send a confidential file to her friend Alice. For this purpose, they installed an application for securely sharing the file. The application employs an encryption algorithm that uses the same shared secret key for encryption and decryption of data.

Identify the type of cryptography employed by the application used by Alice and Jamie for file sharing.

A.
Symmetric cryptography
A.
Symmetric cryptography
Answers
B.
Public-key cryptography
B.
Public-key cryptography
Answers
C.
RSA cryptosystem
C.
RSA cryptosystem
Answers
D.
Asymmetric cryptography
D.
Asymmetric cryptography
Answers
Suggested answer: A

James was recruited as security personnel in an organization and was instructed to secure the organization's infrastructure from physical threats. To achieve this, James installed CCTV systems near gates, reception, hallways, and workplaces to capture illicit activities inside the premises, identify activities that need attention, collect images as evidence, and aid in an alarm system.

Identify the type of physical security control implemented by James in the above scenario.

A.
Video surveillance
A.
Video surveillance
Answers
B.
Fire-fighting systems
B.
Fire-fighting systems
Answers
C.
Lighting system
C.
Lighting system
Answers
D.
Physical barriers
D.
Physical barriers
Answers
Suggested answer: A

Below are various authentication techniques.

1.Retina scanner

2.One-time password

3.DNA

4.Voice recognition

Identify the techniques that fall under biometric authentication.

A.
1, 3, and 4
A.
1, 3, and 4
Answers
B.
1, 2, and 3
B.
1, 2, and 3
Answers
C.
2, 3, and 4
C.
2, 3, and 4
Answers
D.
1, 2, and 4
D.
1, 2, and 4
Answers
Suggested answer: A

Explanation:

Biometric authentication is a type of authentication that uses the physical or behavioral characteristics of a person to verify their identity. Biometric authentication is more secure and convenient than other methods such as passwords or tokens, as biometric traits are unique, hard to forge, and easy to use. Some examples of biometric authentication techniques are retina scanner, DNA, and voice recognition. Retina scanner uses a low-intensity light beam to scan the pattern of blood vessels at the back of the eye, which is unique for each individual. DNA uses the genetic code of a person to match their identity, which is the most accurate and reliable biometric technique. Voice recognition uses the sound and pitch of a person's voice to verify their identity, which is influenced by factors such as anatomy, physiology, and psychology. These techniques fall under biometric authentication, as they use the physical or behavioral traits of a person to authenticate them.

Reference:

Biometric Authentication - Week 2: Identification, Authentication, and Authorization

Biometric Authentication: What You Need To Know

Biometric Authentication Techniques

Kelly, a cloud administrator at TechSol Inc., was instructed to select a cloud deployment model to secure the corporate data and retain full control over the data.

Which of the following cloud deployment models helps Kelly in the above scenario?

A.
Public cloud
A.
Public cloud
Answers
B.
Multi cloud
B.
Multi cloud
Answers
C.
Community cloud
C.
Community cloud
Answers
D.
Private cloud
D.
Private cloud
Answers
Suggested answer: D

Explanation:

A private cloud is a cloud deployment model that is exclusively used by a single organization and is hosted either on-premises or off-premises by a third-party provider. A private cloud offers the highest level of security and control over the data and resources, as the organization can customize the cloud infrastructure and services according to its needs and policies. A private cloud also ensures better performance and availability, as the organization does not share the cloud resources with other users. A private cloud is suitable for organizations that have sensitive or confidential data, strict compliance requirements, or high demand for scalability and flexibility. A private cloud can help Kelly secure the corporate data and retain full control over the data in the above scenario.

Reference:

Private Cloud - Week 6: Virtualization and Cloud Computing

Private Cloud vs Public Cloud vs Hybrid Cloud

Private Cloud Security: Challenges and Best Practices

Steve was sharing his confidential file with John via an email that was digitally signed and encrypted. The digital signature was made using the 'Diffie-Hellman (X9.42) with DSS' algorithm, and the email was encrypted using triple DES.

Which of the following protocols employs the above features to encrypt an email message?

A.
S/MIME
A.
S/MIME
Answers
B.
EAP
B.
EAP
Answers
C.
RADIUS
C.
RADIUS
Answers
D.
TACACS+
D.
TACACS+
Answers
Suggested answer: A

Explanation:

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol that provides security services for email messages, such as encryption, digital signature, authentication, and integrity. S/MIME is based on the MIME standard, which defines the format and structure of email messages. S/MIME uses public-key cryptography to encrypt and decrypt the message content and to sign and verify the message sender. S/MIME supports various algorithms for encryption and digital signature, such as Diffie-Hellman, DSS, RSA, and triple DES. S/MIME is widely used for secure email communication in various applications and platforms, such as Outlook, Gmail, and Thunderbird. S/MIME is the protocol that employs the features mentioned in the question, namely Diffie-Hellman (X9.42) with DSS for digital signature and triple DES for encryption.

Reference:

S/MIME - Week 7: Email Security

S/MIME - Wikipedia

S/MIME Version 3.2 Message Specification

Joseph, a security professional, was instructed to secure the organization's network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.

Identify the attack signature analysis technique performed by Joseph in the above scenario.

A.
Composite-signature-based analysis
A.
Composite-signature-based analysis
Answers
B.
Context-based signature analysis
B.
Context-based signature analysis
Answers
C.
Content-based signature analysis
C.
Content-based signature analysis
Answers
D.
Atomic-signature-based analysis
D.
Atomic-signature-based analysis
Answers
Suggested answer: D

Explanation:

Atomic-signature-based analysis is a type of attack signature analysis technique that uses a single characteristic or attribute of a packet header to identify malicious traffic. Atomic signatures are simple and fast to match, but they can also generate false positives or miss some attacks. Some examples of atomic signatures are source and destination IP addresses, port numbers, protocol types, and TCP flags. Atomic-signature-based analysis is the technique performed by Joseph in the above scenario, as he analyzed packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.

Reference:

[Understanding the Network Traffic Signatures] - Module 12: Network Traffic Monitoring

Network Defense Essentials (NDE) | Coursera - Week 12: Network Traffic Monitoring

[Network Defense Essentials Module 12 (Network Traffic Monitoring) - Quizlet] - Flashcards: What are Network Traffic Signatures?

Kevin logged into a banking application with his registered credentials and tried to transfer some amount from his account to Flora's account. Before transferring the amount to Flora's account, the application sent an OTP to Kevin's mobile for confirmation.

Which of the following authentication mechanisms is employed by the banking application in the above scenario?

A.
Biometric authentication
A.
Biometric authentication
Answers
B.
Smart card authentication
B.
Smart card authentication
Answers
C.
Single sign-on (SSO) authentication
C.
Single sign-on (SSO) authentication
Answers
D.
Two-factor authentication
D.
Two-factor authentication
Answers
Suggested answer: D

Explanation:

Two-factor authentication (2FA) is a type of authentication that requires users to provide two or more forms of verification to access an online account. 2FA is a multi-layered security measure designed to prevent hackers from accessing user accounts using stolen or shared credentials. 2FA typically combines something the user knows (such as a password or PIN), something the user has (such as a phone or a token), and/or something the user is (such as a fingerprint or a face scan). In the above scenario, the banking application employs 2FA by asking Kevin to enter his registered credentials (something he knows) and an OTP sent to his mobile (something he has) before transferring the amount to Flora's account.

Reference:

Improve Your Cybersecurity with Password MFA - Defense.com

What Is Two-Factor Authentication (2FA)? | Microsoft Security

Selecting Secure Multi-factor Authentication Solutions

Total 75 questions
Go to page: of 8