Free 112-51 Exam Braindumps (page: 2)

Page 2 of 19

Which of the following types of network traffic flow does not provide encryption in the data transfer process, and the data transfer between the sender and receiver is in plain text?

  1. SSL traffic
  2. HTTPS traffic
  3. SSH traffic
  4. FTP traffic

Answer(s): D

Explanation:

FTP traffic does not provide encryption in the data transfer process, and the data transfer between the sender and receiver is in plain text. FTP stands for File Transfer Protocol, and it is a standard network protocol for transferring files between a client and a server over a TCP/IP network. FTP uses two separate channels for communication: a control channel for sending commands and receiving responses, and a data channel for transferring files. However, FTP does not encrypt any of the data that is sent or received over these channels, which means that anyone who can intercept the network traffic can read or modify the contents of the files, as well as the usernames and passwords used for authentication. This poses a serious security risk for the confidentiality, integrity, and availability of the data and the systems involved in the file transfer. Therefore, FTP is not a secure way to transfer sensitive or confidential data over the network.


Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-31 to 3-32 What is FTP, and Why Does It Matter in 2021?, Kinsta, January 4, 2021 FTP Security, Wikipedia, February 9, 2021



Alice was working on her major project; she saved all her confidential files and locked her laptop. Bob wanted to access Alice's laptop for his personal use but was unable to access the laptop due to biometric authentication.
Which of the following network defense approaches was employed by Alice on her laptop?

  1. Retrospective approach
  2. Preventive approach
  3. Reactive approach
  4. Proactive approach

Answer(s): B

Explanation:

The network defense approach that was employed by Alice on her laptop was the preventive approach. The preventive approach aims to stop or deter potential attacks before they happen by implementing security measures that reduce the attack surface and increase the difficulty of exploitation. Biometric authentication is an example of a preventive measure that uses a physical characteristic, such as a fingerprint, iris, or face, to verify the identity of the user and grant access to the device or system. Biometric authentication is more secure than traditional methods, such as passwords or PINs, because it is harder to forge, guess, or steal. By locking her laptop and using biometric authentication, Alice prevented Bob from accessing her laptop and her confidential files without her permission.


Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 1-7 to 1-8 What is Biometric Authentication?, Norton, July 29, 2020 An introduction to network defense basics, Enable Sysadmin, November 26, 2019



Kalley, a network administrator of an organization, has installed a traffic monitoring system to capture and report suspicious traffic signatures. In this process, she detects traffic containing password cracking, sniffing, and brute-forcing attempts.Which of the following categories of suspicious traffic signature were identified by Kalley through the installed monitoring system?

  1. Reconnaissance signatures
  2. Unauthorized access signatures
  3. Denial-of-service (DoS) signatures
  4. Informational signatures

Answer(s): B

Explanation:

Unauthorized access signatures were identified by Kalley through the installed monitoring system. Unauthorized access signatures are designed to detect attempts to gain unauthorized access to a system or network by exploiting vulnerabilities, misconfigurations, or weak credentials. Password cracking, sniffing, and brute-forcing are common techniques used by attackers to obtain or guess the passwords of legitimate users or administrators and gain access to their accounts or privileges. These techniques generate suspicious traffic patterns that can be detected by traffic monitoring systems, such as Snort, using signature-based detection. Signature-based detection is based on the premise that abnormal or malicious network traffic fits a distinct pattern, whereas normal or benign traffic does not. Therefore, by installing a traffic monitoring system and capturing and reporting suspicious traffic signatures, Kalley can identify and prevent unauthorized access attempts and protect the security of her organization's network.


Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-33 to 3-34 Detecting Suspicious Traffic via Signatures - Intrusion Detection with Snort, O'Reilly, 2003 Threat Signature Categories - Palo Alto Networks, Palo Alto Networks, 2020



Finch, a security auditor, was assigned the task of providing devices to all the employees to enable work from remote locations. Finch restricted the devices to work only for organization-related tasks, and not for personal use.
Which of the following mobile usage policies has Finch implemented in the above scenario?

  1. CYOD
  2. COBO
  3. COPE
  4. BYOD

Answer(s): B

Explanation:

Finch has implemented the COBO (Corporate-Owned, Business-Only) mobile usage policy in the above scenario. COBO is a policy where the organization provides mobile devices to the employees and restricts them to use the devices only for work-related purposes. The organization has full control over the devices and can enforce security measures, such as encryption, password protection, remote wipe, and application whitelisting or blacklisting. The employees are not allowed to use the devices for personal use, such as browsing the internet, making personal calls, or installing personal apps. COBO is a policy that aims to maximize security and minimize distractions and risks for the organization and the employees.


Reference:

Mobile usage policy in office - sample, cell phone policy in companies and organization, HR Help Board, 2020
Employee Cell Phone Policy Template, Workable, 2020
How Employers Enforce Cell Phone Policies in the Workplace, Indeed, 2022



Page 2 of 19



Post your Comments and Discuss EC-Council 112-51 exam with other Community members:

Chandara commented on October 24, 2024
I passed with ease, and now I have to explain to my friends how ‘studying’ got me through. hahah
INDIA
upvote

Jack commented on October 24, 2024
Muito bom as perguntas
Anonymous
upvote

Diogo Gomes commented on October 24, 2024
As Muhammad Saleem comented, question 20 is wrong. Entities are found in the Data layer and not in the Interface layer.
UNITED STATES
upvote

Neena commented on October 24, 2024
This dump PDF gets the job done
Anonymous
upvote

test commented on October 24, 2024
good one to go through
Anonymous
upvote

Kamal commented on October 24, 2024
I’m 90% sure I owe my new certification to these dumps, and 10% to coffee. LOL Questions are valid and same in the real exam.
Netherlands
upvote

Maseh commented on October 24, 2024
Who knew cramming could be so effective? These dumps saved me from a meltdown!
EUROPEAN UNION
upvote

Drew commented on October 24, 2024
Used these dumps, nailed the exam—now I’m basically a genius (or close enough).
Australia
upvote

Shawn commented on October 24, 2024
As you must know by now the exam is extremely hard. The only way to pass is to know the questions and answers and I found these dump questions very relevant to actual exam.
Canada
upvote

Vidhi Mishra commented on October 24, 2024
Huge set of Cloud Dital leader exam
Anonymous
upvote

jakir commented on October 24, 2024
its really more help full.
BANGLADESH
upvote

TheUser commented on October 23, 2024
So far seems good
Anonymous
upvote

John commented on October 23, 2024
great insight
BOTSWANA
upvote

nigga commented on October 23, 2024
niggaaaaaaaaaa
CANADA
upvote

Chris commented on October 23, 2024
Is this site currently valid for the AZ-900 exam as of October 23, 2024?
Anonymous
upvote

Rian commented on October 23, 2024
Good night comment
Anonymous
upvote

K commented on October 23, 2024
Good Questions
UNITED STATES
upvote

Jayson commented on October 23, 2024
Can someone confirm if this is for the 7th edition or not?
AUSTRALIA
upvote

anonymus commented on October 23, 2024
master database differential backup is not supported in sql server
EUROPEAN UNION
upvote

Arun commented on October 23, 2024
Very useful for cert
GERMANY
upvote

Brian commented on October 23, 2024
Good questions
Anonymous
upvote

TiVO commented on October 22, 2024
Out of curiosity (I thought the 1101 had 90 questions and the 1102 has 90 questions) which questions exactly on this test rotation or is it random?
Anonymous
upvote

Manish commented on October 22, 2024
This is created a very professional manner with 100% correct answer
Anonymous
upvote

Nikhil commented on October 22, 2024
Nice Dump with good questions!
Anonymous
upvote

Halisi commented on October 22, 2024
Good Questions
KENYA
upvote

Bilal28 commented on October 22, 2024
The dump still valid please ?
FRANCE
upvote

Folarin Ibukun commented on October 22, 2024
The dump is helpful, excellent
Anonymous
upvote

Luxmy commented on October 22, 2024
Thanks to these dumps, I spent more time celebrating than studying—totally worth it!
New Zealand
upvote

Fatoosh commented on October 22, 2024
I passed my exam with in fist sit-down and with a bit of panic... but mostly these dumps questions were all in the exam.
INDIA
upvote

Lax commented on October 22, 2024
Helpful to practice and prepare for the exam.
Anonymous
upvote

Dilsha commented on October 22, 2024
Thank you the website owner for making these exam questions available for free. It helped me clear my paper.
INDIA
upvote

Tommy commented on October 22, 2024
Passed the exam today with this dump. Very happy. Now Go Trump Go. Make this country great again.
UNITED STATES
upvote

Tubby commented on October 22, 2024
Asked by my employee to pass this exam. So I bought the full version of this exam dump to quickly prepare and pass the exam. I did not want to waste my out of office time to prepare for this.
UNITED STATES
upvote

SSSR commented on October 22, 2024
Great stuff and nicely formatted content. PDF is version is what I highly recommend as it has double the amount of questions.
UNITED KINGDOM
upvote