Curious about Actual Eccouncil Network Defense Essentials (112-51) Exam Questions?
Here are sample Eccouncil Network Defense Essentials (112-51) Exam questions from real exam. You can get more Eccouncil Network Defense Essentials (112-51) Exam premium practice questions at TestInsights.
Johana was working on a confidential project on her laptop. After working for long hours, she wanted to have a coffee break. Johana left the system active with the project file open and went for a coffee break. Soon after Johana left the place, Bob accessed Johana's system and modified the project file.
Which of the following security guidelines did Johana fail to comply with?
Correct : A
One of the most basic and important security guidelines for laptop users is to always log off or lock the system when unattended. This prevents unauthorized access to the system and the data stored on it by anyone who might have physical access to the laptop. Logging off or locking the system requires a password or other authentication method to resume the session, which adds a layer of protection to the laptop. Johana failed to comply with this security guideline, as she left the system active with the project file open and went for a coffee break, allowing Bob to access her system and modify the project file. Reference:
Ten simple steps for keeping your laptop secure - Step 1: Require a password when logging in
6 Steps to Practice Strong Laptop Security - Step #1: Set complex passwords where it counts
A Practical Guide to Securing Your Windows PC - Section: Lock your computer when you step away
Start a Discussions
A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.
Identify the type of fire-fighting system used by the rescue team in the above scenario.
Start a Discussions
Which of the following types of network segmentation is an easy approach to divide a network but can be expensive as it occupies more space?
Correct : D
Start a Discussions
An loT sensor in an organization generated an emergency alarm indicating a security breach. The servers hosted in an loT layer accepted, stored, and processed the sensor data received from loT gateways and created dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue.
Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?
Start a Discussions
Jacob, a network defender in an organization, was instructed to improve the physical security measures to prevent unauthorized intrusion attempts. In this process, Jacob implemented certain physical security controls by using warning messages and signs that notify legal consequences to discourage hackers from making intrusion attempts.
Which of the following type of physical security controls has Jacob implemented in the above scenario?
Start a Discussions
Total 75 questions