ExamGecko
Home Home / ECCouncil / 112-51

ECCouncil 112-51 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Carol is a new employee at ApTech Sol Inc., and she has been allocated a laptop to fulfill his job activities.

Carol tried to install certain applications on the company's laptop but could not complete the installation as she requires administrator privileges to initiate the installation process. The administrator imposed an access policy on the company's laptop that only users with administrator privileges have installation rights.

Identify the access control model demonstrated in the above scenario.

A.
Rule-based access control {RB-RBAC)
A.
Rule-based access control {RB-RBAC)
Answers
B.
Mandatory access control {MAC)
B.
Mandatory access control {MAC)
Answers
C.
Role-based access control (RBAC)
C.
Role-based access control (RBAC)
Answers
D.
Discretionary access control (DAC)
D.
Discretionary access control (DAC)
Answers
Suggested answer: C

Explanation:

Role-based access control (RBAC) is a model that assigns permissions and privileges to users based on their roles in an organization. In RBAC, the administrator defines the roles and the access rights for each role, and then assigns users to those roles. This way, the administrator can control the access of users to the resources without having to manage each user individually. In the scenario, Carol is assigned a role that does not have the installation rights, while the administrator has a role that does. Therefore, the access control model demonstrated in the scenario is RBAC.

Reference: Network Defense Essentials - EC-Council Learning, Network Defense Essentials (NDE) | Coursera, EC-Council Network Defense Essentials | NDE Certification

Which of the following types of network segmentation is an easy approach to divide a network but can be expensive as it occupies more space?

A.
VLAN segmentation
A.
VLAN segmentation
Answers
B.
Logical segmentation
B.
Logical segmentation
Answers
C.
Network virtualization
C.
Network virtualization
Answers
D.
Physical segmentation
D.
Physical segmentation
Answers
Suggested answer: D

An loT sensor in an organization generated an emergency alarm indicating a security breach. The servers hosted in an loT layer accepted, stored, and processed the sensor data received from loT gateways and created dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue.

Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?

A.
Device layer
A.
Device layer
Answers
B.
Cloud layer
B.
Cloud layer
Answers
C.
Process layer
C.
Process layer
Answers
D.
Communication Layer
D.
Communication Layer
Answers
Suggested answer: B

Explanation:

The cloud layer of IoT architecture is the layer that hosts the servers that accept, store, and process the sensor data received from IoT gateways. The cloud layer also creates dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue. The cloud layer provides scalability, reliability, and security for the IoT system. The cloud layer can use various cloud computing models, such as public, private, hybrid, or community clouds12.

Reference: Network Defense Essentials - EC-Council Learning, IoT Architecture: The 4 Layers of an IoT System

John is working as a network administrator in an MNC company. He was instructed to connect all the remote offices with the corporate office but at the same time deny communication between the remote offices. In this process, he configured a central hub at the corporate head office, through which all branch offices can communicate.

Identify the type of VPN topology implemented by John in the above scenario.

A.
Star topology
A.
Star topology
Answers
B.
Hub-and-spoke topology
B.
Hub-and-spoke topology
Answers
C.
Point-to-point topology
C.
Point-to-point topology
Answers
D.
Mesh topology
D.
Mesh topology
Answers
Suggested answer: B

Explanation:

A hub-and-spoke topology is a type of VPN topology that connects multiple remote offices to a central hub, usually the corporate head office, through VPN tunnels. The hub acts as a gateway for the remote offices to access the corporate network resources. However, the remote offices cannot communicate with each other directly, and have to go through the hub. This topology reduces the number of VPN tunnels required, but also increases the load and latency on the hub. In the scenario, John configured a central hub at the corporate head office, through which all branch offices can communicate, but denied communication between the remote offices. Therefore, the type of VPN topology implemented by John is hub-and-spoke12.

Reference: Network Defense Essentials - EC-Council Learning, Network Design Scenario #3: Remote Access VPN Design - Network Defense Blog

John is working as a security professional in FinCorp Ltd. He was instructed to deploy a security solution on their corporate network that provides real-time monitoring, correlation of events, threat detection, and security incident response activities.

Which of the following security solutions helps John in the above scenario?

A.
SIEM
A.
SIEM
Answers
B.
VPN
B.
VPN
Answers
C.
SOCKS
C.
SOCKS
Answers
D.
MDM
D.
MDM
Answers
Suggested answer: A

Explanation:

SIEM stands for Security Information and Event Management. It is a security solution that collects, analyzes, and correlates data from various sources, such as logs, network devices, applications, and security tools. SIEM provides real-time monitoring, threat detection, and security incident response activities. SIEM can help security professionals identify and mitigate security risks, comply with regulations, and improve the overall security posture of the organization12.

Reference: Network Defense Essentials - EC-Council Learning, What is SIEM? Security Information and Event Management Explained

Which of the following tools is designed to identify and prevent malicious Trojans or malware from infecting computer systems or electronic devices?

A.
HOIC
A.
HOIC
Answers
B.
HitmanPro
B.
HitmanPro
Answers
C.
Hulk
C.
Hulk
Answers
D.
Hashcat
D.
Hashcat
Answers
Suggested answer: B

Explanation:

HitmanPro is a tool that is designed to identify and prevent malicious Trojans or malware from infecting computer systems or electronic devices. HitmanPro is a cloud-based malware scanner that can detect and remove various types of malware, such as viruses, ransomware, spyware, rootkits, etc. HitmanPro can also work alongside other antivirus programs and provide a second opinion on the security status of the system12.

Reference: Network Defense Essentials - EC-Council Learning, HitmanPro - Malware Removal Tool | Sophos

Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.

Which of the following algorithms was employed by Peter in the above scenario?

A.
RSA
A.
RSA
Answers
B.
MD6
B.
MD6
Answers
C.
DSA
C.
DSA
Answers
D.
SHA-2
D.
SHA-2
Answers
Suggested answer: A

Explanation:

RSA is a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication. RSA stands for Rivest-Shamir-Adleman, the names of the inventors of the algorithm. RSA allows users to generate a pair of keys, one public and one private, that are mathematically related. The public key can be used to encrypt messages or verify digital signatures, while the private key can be used to decrypt messages or create digital signatures. RSA is based on the difficulty of factoring large numbers, which makes it secure and widely used12.

Reference: What is Public-Key Cryptosystem in Information Security?, Network Defense Essentials (NDE) | Coursera

Jacob, a network defender in an organization, was instructed to improve the physical security measures to prevent unauthorized intrusion attempts. In this process, Jacob implemented certain physical security controls by using warning messages and signs that notify legal consequences to discourage hackers from making intrusion attempts.

Which of the following type of physical security controls has Jacob implemented in the above scenario?

A.
Recovery controls
A.
Recovery controls
Answers
B.
Detective control
B.
Detective control
Answers
C.
Preventive controls
C.
Preventive controls
Answers
D.
Deterrent controls
D.
Deterrent controls
Answers
Suggested answer: D

Explanation:

Deterrent controls are a type of physical security controls that use warning messages and signs to notify legal consequences and discourage hackers from making intrusion attempts. Deterrent controls aim to reduce the likelihood of an attack by creating a perception of risk or fear in the potential attackers. Deterrent controls can include fences, locks, alarms, cameras, guards, or security policies12.

Reference: Network Defense Essentials - EC-Council Learning, Understanding the Various Types of Physical Security Controls

Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah's computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions.

Identify the Internet access policy demonstrated in the above scenario.

A.
Permissive policy
A.
Permissive policy
Answers
B.
Promiscuous policy
B.
Promiscuous policy
Answers
C.
Paranoid policy
C.
Paranoid policy
Answers
D.
Prudent policy
D.
Prudent policy
Answers
Suggested answer: A

Explanation:

A permissive policy is a type of Internet access policy that allows users to access the Internet from any device and any location, without any restrictions or security measures. A permissive policy provides convenience and flexibility for the users, but also exposes them to various risks, such as malware infection, data leakage, or cyberattacks. In the scenario, Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet, and accidentally downloaded a malicious file onto her computer. This indicates that the organization had a permissive policy for Internet access12.

Reference: Network Defense Essentials - EC-Council Learning, Internet Access Policy: Definition and Best Practices

Which of the following access control models refers to assigning permissions to a user role based on the rules defined for each user role by the administrator?

A.
Discretionary rule access control
A.
Discretionary rule access control
Answers
B.
Mandatory rule access control
B.
Mandatory rule access control
Answers
C.
Rule-based access control
C.
Rule-based access control
Answers
D.
Role-based access control
D.
Role-based access control
Answers
Suggested answer: D

Explanation:

Role-based access control (RBAC) is a type of access control model that refers to assigning permissions to a user role based on the rules defined for each user role by the administrator. In RBAC, the administrator creates different roles and assigns them the appropriate access rights to the resources. The administrator then assigns users to those roles based on their job functions. This way, the administrator can manage the access of users to the resources without having to deal with each user individually. RBAC can simplify the administration, enhance the security, and improve the scalability of the access control system12.

Reference: Network Defense Essentials - EC-Council Learning, Role-Based Access Control (RBAC) and Role-Based Security


Total 75 questions
Go to page: of 8