Weekend Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

112-51 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

112-51 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Network Defense Essentials (NDE) Exam
  • Last Update: Dec 8, 2024
  • Questions and Answers: 75
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

112-51 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

112-51 Practice Exam Questions with Answers Network Defense Essentials (NDE) Exam Certification

Question # 6

Identify the loT communication model that serves as an analyzer for a company to track monthly or yearly energy consumption. Using this analysis, companies can reduce the expenditure on energy.

A.

Device-to-device model

B.

Cloud-to-cloud model

C.

Device-to-cloud model

D.

Device-to-gateway model

Full Access
Question # 7

Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults,overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.

Identify the type of attack initiated by Jacob in the above scenario.

A.

Cross-container attack

B.

Docker registry attack

C.

Container escaping attack

D.

Replay attack

Full Access
Question # 8

Bob has secretly installed smart CCTV devices (loT devices) outside his home and wants to access the recorded data from a remote location. These smart CCTV devices send sensed data to an intermediate device that carries out pre-processing of data online before transmitting it to the cloud for storage and analysis. The analyzed data is then sent to Bob for initiating actions.

Identify the component of loT architecture that collects data from loT devices and performs data pre-processing.

A.

Streaming data processor

B.

Gateway

C.

Data lakes

D.

Machine learning

Full Access
Question # 9

Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web. She employed a proxy tool that makes his online activity untraceable.

Identify the type of proxy employed by John in the above scenario.

A.

SOCKS proxy

B.

Anonymous proxy

C.

Reverse proxy

D.

Explicit proxy

Full Access
Question # 10

Carol is a new employee at ApTech Sol Inc., and she has been allocated a laptop to fulfill his job activities.

Carol tried to install certain applications on the company's laptop but could not complete the installation as she requires administrator privileges to initiate the installation process. The administrator imposed an access policy on the company's laptop that only users with administrator privileges have installation rights.

Identify the access control model demonstrated in the above scenario.

A.

Rule-based access control {RB-RBAC)

B.

Mandatory access control {MAC)

C.

Role-based access control (RBAC)

D.

Discretionary access control (DAC)

Full Access
Question # 11

Amber is working as a team lead in an organization. She was instructed to share a policy document with all the employees working from remote locations and collect them after filling. She shared the files from her mobile device to the concerned employees through the public Internet. An unauthorized user accessed the file in transit, modified the file, and forwarded it to the remote employees.

Based on the above scenario, identify the security risk associated with mobile usage policies.

A.

Lost or stolen devices

B.

Infrastructure issues

C.

Improperly disposing of devices

D.

Sharing confidential data on an unsecured network

Full Access
Question # 12

A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.

Identify the type of fire-fighting system used by the rescue team in the above scenario.

A.

Wet chemical suppressant

B.

Sprinkler system

C.

Fire extinguisher

D.

Standpipe system

Full Access
Question # 13

Which of the following layers of loT architecture employs protocols and networks for connecting, sending, and receiving data between devices and network?

A.

Device layer

B.

Cloud layer

C.

Communication layer

D.

Process layer

Full Access
Question # 14

Which of the following techniques protects sensitive data by obscuring specific areas with random

characters or codes?

A.

Data retention

B.

Data resilience

C.

Data backup

D.

Data masking

Full Access
Question # 15

Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.

Identify the mobile device security risk raised on Stella's device in the above scenario.

A.

Application-based risk

B.

System-based risk

C.

Network-based risk

D.

Physical security risks

Full Access
Question # 16

Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah's computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions.

Identify the Internet access policy demonstrated in the above scenario.

A.

Permissive policy

B.

Promiscuous policy

C.

Paranoid policy

D.

Prudent policy

Full Access
Question # 17

Which of the following algorithms is an iterated block cipher that works by repeating the defined steps multiple times and has a 128-bit block size, having key sizes of 128, 192, and 256 bits?

A.

DSA

B.

MD5

C.

SHA

D.

AES

Full Access
Question # 18

Which of the following acts was enacted in 2002 and aims to protect the public and investors by increasing the accuracy and reliability of corporate disclosures?

A.

Sarbanes-Oxley Act (SOX)

B.

Digital Millennium Copyright Act (DMCA)

C.

Gramm-Leach-Bliley Act

D.

Payment Card Industry-Data Security Standard (PCI-DSS)

Full Access
Question # 19

Which of the following actors in the NIST cloud deployment reference architecture acts as an intermediary for providing connectivity and transport services between cloud consumers and providers?

A.

Cloud provider

B.

Cloud auditor

C.

Cloud consumer

D.

Cloud carrier

Full Access
Question # 20

John, from a remote location, was monitoring his bedridden grandfather's health condition at his home. John has placed a smart wearable ECG on his grandfather's wrist so that he can receive alerts to his mobile phone and can keep a track over his grandfather's health condition periodically.

Which of the following types of loT communication model was demonstrated in the above scenario?

A.

Device-to-gateway model

B.

Device-to-cloud model

C.

Cloud-to-cloud communication model

D.

Device-to-device model

Full Access
Question # 21

Which of the following types of network cable is made up of a single copper conductor at its center and a plastic layer that provides an insulated center conductor with a braided metal shield?

A.

Unshielded twisted pair

B.

Coaxial

C.

Fiber optic

D.

Shielded twisted pair

Full Access
Question # 22

Alice was working on her major project; she saved all her confidential files and locked her laptop. Bob wanted to access Alice's laptop for his personal use but was unable to access the laptop due to biometric authentication.

Which of the following network defense approaches was employed by Alice on her laptop?

A.

Retrospective approach

B.

Preventive approach

C.

Reactive approach

D.

Proactive approach

Full Access