ExamGecko
Home Home / ECCouncil / 112-51

ECCouncil 112-51 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Which of the following algorithms is an iterated block cipher that works by repeating the defined steps multiple times and has a 128-bit block size, having key sizes of 128, 192, and 256 bits?

A.
DSA
A.
DSA
Answers
B.
MD5
B.
MD5
Answers
C.
SHA
C.
SHA
Answers
D.
AES
D.
AES
Answers
Suggested answer: D

Explanation:

AES (Advanced Encryption Standard) is an iterated block cipher that works by repeating the defined steps multiple times and has a 128-bit block size, having key sizes of 128, 192, and 256 bits. AES is a symmetric-key algorithm that encrypts and decrypts data using the same secret key. AES operates on a 4x4 matrix of bytes called the state, which undergoes 10, 12, or 14 rounds of transformation depending on the key size. Each round consists of four steps: sub-bytes, shift-rows, mix-columns, and add-round-key. AES is widely used for securing data in various applications and platforms, such as web browsers, VPNs, wireless networks, and smart grids. AES is the algorithm that matches the description given in the question.

Reference:

AES - Week 4: Cryptography Techniques

Advanced Encryption Standard (AES) - NIST

AES Encryption and Decryption Online Tool - Code Beautify

Johana was working on a confidential project on her laptop. After working for long hours, she wanted to have a coffee break. Johana left the system active with the project file open and went for a coffee break. Soon after Johana left the place, Bob accessed Johana's system and modified the project file.

Which of the following security guidelines did Johana fail to comply with?

A.
Always log off or lock the system when unattended
A.
Always log off or lock the system when unattended
Answers
B.
Do not share your computer user account details
B.
Do not share your computer user account details
Answers
C.
Keep different passwords for the OS and frequently used applications
C.
Keep different passwords for the OS and frequently used applications
Answers
D.
Do not keep a common password for all accounts
D.
Do not keep a common password for all accounts
Answers
Suggested answer: A

Explanation:

One of the most basic and important security guidelines for laptop users is to always log off or lock the system when unattended. This prevents unauthorized access to the system and the data stored on it by anyone who might have physical access to the laptop. Logging off or locking the system requires a password or other authentication method to resume the session, which adds a layer of protection to the laptop. Johana failed to comply with this security guideline, as she left the system active with the project file open and went for a coffee break, allowing Bob to access her system and modify the project file.

Reference:

Ten simple steps for keeping your laptop secure - Step 1: Require a password when logging in

6 Steps to Practice Strong Laptop Security - Step #1: Set complex passwords where it counts

A Practical Guide to Securing Your Windows PC - Section: Lock your computer when you step away

Jay, a network administrator, was monitoring traffic flowing through an IDS. Unexpectedly, he received an event triggered as an alarm, although there is no active attack in progress.

Identify the type of IDS alert Jay has received in the above scenario.

A.
True negative alert
A.
True negative alert
Answers
B.
False positive alert
B.
False positive alert
Answers
C.
True positive alert
C.
True positive alert
Answers
D.
False negative alert
D.
False negative alert
Answers
Suggested answer: B

Explanation:

A false positive alert is a type of IDS alert that occurs when the IDS mistakenly identifies benign or normal traffic as malicious or suspicious, and triggers an alarm, although there is no active attack in progress. A false positive alert can be caused by various factors, such as misconfigured IDS rules, outdated signatures, network anomalies, or legitimate traffic that resembles attack patterns. A false positive alert can waste the time and resources of the security team, as they have to investigate and verify the alert, and also reduce the trust and confidence in the IDS. A false positive alert can be reduced by tuning and updating the IDS, filtering out irrelevant traffic, and using multiple detection methods. A false positive alert is the type of IDS alert Jay has received in the above scenario, as he received an event triggered as an alarm, although there is no active attack in progress.

Reference:

False Positive Alert - Week 10: Intrusion Detection and Prevention Systems

What is a False Positive in Cybersecurity?

How to Reduce False Positives in Intrusion Detection Systems

Fernandez, a computer user, initiated an action to access a file located on a remote server. In this process, his account went through certain security constraints to check for any restrictions on his account with regard to access to the file.

Which of the following terms is referred to as a file in the above scenario?

A.
Operation
A.
Operation
Answers
B.
Subject
B.
Subject
Answers
C.
Reference monitor
C.
Reference monitor
Answers
D.
Object
D.
Object
Answers
Suggested answer: D

Clark, a security team member of an organization, was instructed to secure the premises from unauthorized entries. In this process, Clark implemented security controls that allow employees to enter the office only after scanning their badges or fingerprints.

Which of the following security controls has Clark implemented in the above scenario?

A.
Administrative security controls
A.
Administrative security controls
Answers
B.
Technical security controls
B.
Technical security controls
Answers
C.
Physical security controls
C.
Physical security controls
Answers
D.
System access controls
D.
System access controls
Answers
Suggested answer: C

Explanation:

Physical security controls are security measures that prevent or deter unauthorized physical access to a facility, resource, or information. Physical security controls include locks, doors, gates, fences, guards, cameras, alarms, sensors, biometrics, and badges. Physical security controls protect the network and its components from theft, damage, sabotage, or natural disasters. Clark implemented physical security controls in the above scenario, as he installed security controls that allow employees to enter the office only after scanning their badges or fingerprints.

Reference:

Understanding the Various Types of Physical Security Controls - Week 4: Network Security Controls: Physical Controls

The Role of Physical Security in Maintaining Network Security

Physical Security: Planning, Measures & Examples + PDF

Bob has secretly installed smart CCTV devices (loT devices) outside his home and wants to access the recorded data from a remote location. These smart CCTV devices send sensed data to an intermediate device that carries out pre-processing of data online before transmitting it to the cloud for storage and analysis. The analyzed data is then sent to Bob for initiating actions.

Identify the component of loT architecture that collects data from loT devices and performs data pre-processing.

A.
Streaming data processor
A.
Streaming data processor
Answers
B.
Gateway
B.
Gateway
Answers
C.
Data lakes
C.
Data lakes
Answers
D.
Machine learning
D.
Machine learning
Answers
Suggested answer: B

Explanation:

A gateway is a component of IoT architecture that collects data from IoT devices and performs data pre-processing. A gateway acts as a bridge between the IoT devices and the cloud platform, and it can filter, aggregate, compress, encrypt, or transform the data before sending it to the cloud for storage and analysis. A gateway can also perform edge computing, which means processing the data locally and providing real-time feedback or actions. A gateway can support various communication protocols, such as WiFi, Bluetooth, Zigbee, or cellular, and it can enhance the security and reliability of the IoT system. A gateway is the component that matches the description given in the question123

Clark, a security professional, was instructed to monitor and continue the backup functions without interrupting the system or application services. In this process, Clark implemented a backup mechanism that dynamically backups the data even if the system or application resources are being used.

Which of the following types of backup mechanisms has Clark implemented in the above scenario?

A.
Full backup
A.
Full backup
Answers
B.
Offline backup
B.
Offline backup
Answers
C.
Cold backup
C.
Cold backup
Answers
D.
Hot backup
D.
Hot backup
Answers
Suggested answer: D

Explanation:

A hot backup is a type of backup mechanism that dynamically backs up the data even if the system or application resources are being used. A hot backup does not require the system or application to be shut down or paused during the backup process, and it allows the users to access the data while the backup is in progress. A hot backup ensures that the backup is always up to date and consistent with the current state of the data, and it minimizes the downtime and disruption of the system or application services. A hot backup is suitable for systems or applications that have high availability and performance requirements, such as databases, web servers, or email servers. A hot backup is the type of backup mechanism that Clark implemented in the above scenario, as he performed a backup that dynamically backs up the data even if the system or application resources are being used.

Reference:

Hot Backup - Week 5: Data Security

Hot Backup vs. Cold Backup: What's the Difference?

Network Defense Essentials (NDE) | Coursera - Module 5: Data Security

Which of the following techniques is referred to as a messaging feature that originates from a server and enables the delivery of data or a message from an application to a mobile device without any explicit request from the user?

A.
Push notification
A.
Push notification
Answers
B.
PIN feature
B.
PIN feature
Answers
C.
Geofencing
C.
Geofencing
Answers
D.
Containerization
D.
Containerization
Answers
Suggested answer: A

Bob, a security professional, was recruited by an organization to ensure that application services are being delivered as expected without any delay. To achieve this, Bob decided to maintain different backup servers for the same resources so that if one backup system fails, another will serve the purpose.

Identify the IA principle employed by Bob in the above scenario.

A.
Authentication
A.
Authentication
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Integrity
C.
Integrity
Answers
D.
Availability
D.
Availability
Answers
Suggested answer: D

Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.

Identify the type of security solution employed by Stephen in the above scenario.

A.
Firewall
A.
Firewall
Answers
B.
Honeypot
B.
Honeypot
Answers
C.
IDS
C.
IDS
Answers
D.
Proxy server
D.
Proxy server
Answers
Suggested answer: B
Total 75 questions
Go to page: of 8