Free 112-51 Exam Braindumps (page: 8)

Page 7 of 19

Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.
Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.

  1. WPA
  2. WPA3
  3. EAP
  4. WEP

Answer(s): B

Explanation:

WPA3 is the latest standard of Wi-Fi Protected Access, which was released in 2018 by the Wi-Fi Alliance. WPA3 uses a new handshake protocol called Simultaneous Authentication of Equals (SAE),

which is based on a zero-knowledge proof known as dragonfly. Dragonfly is a key exchange algorithm that uses discrete logarithm cryptography to derive a shared secret between two parties, without revealing any information about their passwords or keys. Dragonfly is resistant to offline dictionary attacks, where an attacker tries to guess the password by capturing the handshake and testing different combinations. Dragonfly is also resistant to key recovery attacks, where an attacker tries to recover the encryption key by exploiting weaknesses in the algorithm or implementation. Dragonfly provides forward secrecy, which means that even if an attacker manages to compromise the password or key in the future, they cannot decrypt the past communication. WPA3 also supports other features such as increased key sizes, opportunistic wireless encryption, and protected management frames, which enhance the security and privacy of wireless networks.


Reference:

WPA3 Dragonfly Handshake
WPA3 Encryption and Configuration Guide

Dragon Fly - Zero Knowledge Proof
What is SAE (Simultaneous Authentication of Equals)?
Dragonfly - people.scs.carleton.ca



Jamie wants to send a confidential file to her friend Alice. For this purpose, they installed an application for securely sharing the file. The application employs an encryption algorithm that uses the same shared secret key for encryption and decryption of data. Identify the type of cryptography employed by the application used by Alice and Jamie for file sharing.

  1. Symmetric cryptography
  2. Public-key cryptography
  3. RSA cryptosystem
  4. Asymmetric cryptography

Answer(s): A



James was recruited as security personnel in an organization and was instructed to secure the organization's infrastructure from physical threats. To achieve this, James installed CCTV systems near gates, reception, hallways, and workplaces to capture illicit activities inside the premises, identify activities that need attention, collect images as evidence, and aid in an alarm system. Identify the type of physical security control implemented by James in the above scenario.

  1. Video surveillance
  2. Fire-fighting systems
  3. Lighting system
  4. Physical barriers

Answer(s): A



Below are various authentication techniques.
1.Retina scanner
2.One-time password
3.DNA
4.Voice recognition
Identify the techniques that fall under biometric authentication.

  1. 1, 3, and 4
  2. 1, 2, and 3
  3. 2, 3, and 4
  4. 1, 2, and 4

Answer(s): A

Explanation:

Biometric authentication is a type of authentication that uses the physical or behavioral characteristics of a person to verify their identity. Biometric authentication is more secure and convenient than other methods such as passwords or tokens, as biometric traits are unique, hard to forge, and easy to use. Some examples of biometric authentication techniques are retina scanner, DNA, and voice recognition. Retina scanner uses a low-intensity light beam to scan the pattern of blood vessels at the back of the eye, which is unique for each individual. DNA uses the genetic code of a person to match their identity, which is the most accurate and reliable biometric technique. Voice recognition uses the sound and pitch of a person's voice to verify their identity, which is influenced by factors such as anatomy, physiology, and psychology. These techniques fall under biometric authentication, as they use the physical or behavioral traits of a person to authenticate them.


Reference:

Biometric Authentication - Week 2: Identification, Authentication, and Authorization Biometric Authentication: What You Need To Know
Biometric Authentication Techniques






Post your Comments and Discuss EC-Council 112-51 exam with other Community members:

112-51 Discussions & Posts