EC-Council 112-51 Real Exam Questions
The questions for 112-51 were last updated at Dec 19,2024.
- Exam Code: 112-51
- Exam Name: Network Defense Essentials Exam (NDE)
- Certification Provider: EC-Council
- Latest update: Dec 19,2024
WPA2 Enterprise
Identify the correct order of wireless encryption modes in terms of security from high to low.
- A . 2 — >1 — >4 — >3
- B . 3 — >1 — >4 — >2
- C . 4 — >2 — >3 — >1
- D . 4 — >3 — >2 — >1
WPA2 Enterprise
Identify the correct order of wireless encryption modes in terms of security from high to low.
- A . 2 — >1 — >4 — >3
- B . 3 — >1 — >4 — >2
- C . 4 — >2 — >3 — >1
- D . 4 — >3 — >2 — >1
WPA2 Enterprise
Identify the correct order of wireless encryption modes in terms of security from high to low.
- A . 2 — >1 — >4 — >3
- B . 3 — >1 — >4 — >2
- C . 4 — >2 — >3 — >1
- D . 4 — >3 — >2 — >1
WPA2 Enterprise
Identify the correct order of wireless encryption modes in terms of security from high to low.
- A . 2 — >1 — >4 — >3
- B . 3 — >1 — >4 — >2
- C . 4 — >2 — >3 — >1
- D . 4 — >3 — >2 — >1
Alice was working on her major project; she saved all her confidential files and locked her laptop. Bob wanted to access Alice’s laptop for his personal use but was unable to access the laptop due to biometric authentication.
Which of the following network defense approaches was employed by Alice on her laptop?
- A . Retrospective approach
- B . Preventive approach
- C . Reactive approach
- D . Proactive approach
ldentify and classify the data to be included in the data retention policy 5.Develop the data retention policy
Identify the correct sequence of steps involved.
- A . 3 — >2 — >5 — >4 — >1
- B . 3 — >1 — >4 — >5 — >2
- C . 1 — >3 — >4 — >2 — >5
- D . 1 — >5 — >4 — >2 — >3
ldentify and classify the data to be included in the data retention policy 5.Develop the data retention policy
Identify the correct sequence of steps involved.
- A . 3 — >2 — >5 — >4 — >1
- B . 3 — >1 — >4 — >5 — >2
- C . 1 — >3 — >4 — >2 — >5
- D . 1 — >5 — >4 — >2 — >3
In an organization, employees are restricted from using their own storage devices, and only the company’s portable storage devices are allowed. As employees are carrying the company’s portable device outside their premises, the data should be protected from unauthorized access.
Which of the following techniques can be used to protect the data in a portable storage device?
- A . Data retention
- B . Data encryption
- C . Data resilience
- D . Disk mirroring
Identify the backup mechanism that is performed within the organization using external devices such as hard disks and requires human interaction to perform the backup operations, thus, making it suspectable to theft or natural disasters.
- A . Cloud data backup
- B . Onsite data backup
- C . Offsite data backup
- D . Online data backup
Which of the following ISO standards provides guidance to ensure that cloud service providers offer
appropriate information security controls to protect the privacy of their customer’s clients by securing personally identifiable information entrusted to them?
- A . ISO/IEC 27001
- B . ISO/IEC 27018
- C . ISO/IEC 27011
- D . ISO/IEC 27007