ExamGecko
Home / ECCouncil / 112-51 / List of questions
Ask Question

ECCouncil 112-51 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.

Identify the type of IDS employed by Messy in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 42

Report Export Collapse

Joseph, a cloud administrator, was recruited for the management and deployment of the software containers. As part of his job, Joseph employed an automated solution that converts images into containers, deploys them to the hosts, and further monitors container workflow from a single location.

Identify the solution employed by Joseph in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 43

Report Export Collapse

Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web. She employed a proxy tool that makes his online activity untraceable.

Identify the type of proxy employed by John in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 44

Report Export Collapse

Which of the following actors in the NIST cloud deployment reference architecture acts as an intermediary for providing connectivity and transport services between cloud consumers and providers?

Become a Premium Member for full access
  Unlock Premium Member

Question 45

Report Export Collapse

Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.

Identify the mobile device security risk raised on Stella's device in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 46

Report Export Collapse

Which of the following protocols uses TLS/SSL to ensure secure transmission of data over the Internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 47

Report Export Collapse

Which of the following environmental controls options saves the hardware from humidity and heat, increases hardware performance, and maintains consistent room temperature?

Become a Premium Member for full access
  Unlock Premium Member

Question 48

Report Export Collapse

Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.

Identify the type of cipher employed by Kevin in the above scenario.

Become a Premium Member for full access
  Unlock Premium Member

Question 49

Report Export Collapse

George, a professional hacker, targeted a bank employee and tried to crack his password while he was attempting to log on to the remote server to perform his regular banking operations. In this process, George used sniffing tools to capture the password pairwise master key (PMK) associated with the handshake authentication process. Then, using the PMK, he gained unauthorized access to the server to perform malicious activities.

Identify the encryption technology on which George performed password cracking.

Become a Premium Member for full access
  Unlock Premium Member

Question 50

Report Export Collapse

John, from a remote location, was monitoring his bedridden grandfather's health condition at his home. John has placed a smart wearable ECG on his grandfather's wrist so that he can receive alerts to his mobile phone and can keep a track over his grandfather's health condition periodically.

Which of the following types of loT communication model was demonstrated in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8
Search

Related questions