Curious about Actual Eccouncil Network Defense Essentials (112-51) Exam Questions?

Here are sample Eccouncil Network Defense Essentials (112-51) Exam questions from real exam. You can get more Eccouncil Network Defense Essentials (112-51) Exam premium practice questions at TestInsights.

Page: 1 /
Total 75 questions
Question 1

Johana was working on a confidential project on her laptop. After working for long hours, she wanted to have a coffee break. Johana left the system active with the project file open and went for a coffee break. Soon after Johana left the place, Bob accessed Johana's system and modified the project file.

Which of the following security guidelines did Johana fail to comply with?


Correct : A

One of the most basic and important security guidelines for laptop users is to always log off or lock the system when unattended. This prevents unauthorized access to the system and the data stored on it by anyone who might have physical access to the laptop. Logging off or locking the system requires a password or other authentication method to resume the session, which adds a layer of protection to the laptop. Johana failed to comply with this security guideline, as she left the system active with the project file open and went for a coffee break, allowing Bob to access her system and modify the project file. Reference:

Ten simple steps for keeping your laptop secure - Step 1: Require a password when logging in

6 Steps to Practice Strong Laptop Security - Step #1: Set complex passwords where it counts

A Practical Guide to Securing Your Windows PC - Section: Lock your computer when you step away


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.

Identify the type of fire-fighting system used by the rescue team in the above scenario.


Correct : B

A sprinkler system is a type of fire-fighting system that uses a distribution piping system to suppress the fire. A sprinkler system consists of sprinkler heads that are connected to a water supply and activated by heat or smoke detectors. When a fire is detected, the sprinkler heads release water to extinguish the fire and prevent it from spreading. A sprinkler system can be wet, dry, pre-action, or deluge, depending on the type of water supply and activation mechanism12. Reference: Network Defense Essentials - EC-Council Learning, Essentials Of Fire Fighting, 7th Edition, Product Suite - IFSTA


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

Which of the following types of network segmentation is an easy approach to divide a network but can be expensive as it occupies more space?


Correct : D


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

An loT sensor in an organization generated an emergency alarm indicating a security breach. The servers hosted in an loT layer accepted, stored, and processed the sensor data received from loT gateways and created dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue.

Which of the following layers in the loT architecture performed the above activities after receiving an alert from the loT sensor?


Correct : B

The cloud layer of IoT architecture is the layer that hosts the servers that accept, store, and process the sensor data received from IoT gateways. The cloud layer also creates dashboards for monitoring, analyzing, and implementing proactive decisions to tackle the issue. The cloud layer provides scalability, reliability, and security for the IoT system. The cloud layer can use various cloud computing models, such as public, private, hybrid, or community clouds12. Reference: Network Defense Essentials - EC-Council Learning, IoT Architecture: The 4 Layers of an IoT System


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

Jacob, a network defender in an organization, was instructed to improve the physical security measures to prevent unauthorized intrusion attempts. In this process, Jacob implemented certain physical security controls by using warning messages and signs that notify legal consequences to discourage hackers from making intrusion attempts.

Which of the following type of physical security controls has Jacob implemented in the above scenario?


Correct : D

Deterrent controls are a type of physical security controls that use warning messages and signs to notify legal consequences and discourage hackers from making intrusion attempts. Deterrent controls aim to reduce the likelihood of an attack by creating a perception of risk or fear in the potential attackers. Deterrent controls can include fences, locks, alarms, cameras, guards, or security policies12. Reference: Network Defense Essentials - EC-Council Learning, Understanding the Various Types of Physical Security Controls


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 15   
Total 75 questions