Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 112-51 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following tools is designed to identify and prevent malicious Trojans or malware from infecting computer systems or electronic devices?

Options:
A.

HOIC

B.

HitmanPro

C.

Hulk

D.

Hashcat

ECCouncil 112-51 Premium Access
Questions 12

Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web. She employed a proxy tool that makes his online activity untraceable.

Identify the type of proxy employed by John in the above scenario.

Options:
A.

SOCKS proxy

B.

Anonymous proxy

C.

Reverse proxy

D.

Explicit proxy

Questions 13

Kevin logged into a banking application with his registered credentials and tried to transfer someamount from his account to Flora's account. Before transferring the amount to Flora's account, the application sent an OTP to Kevin's mobile for confirmation.

Which of the following authentication mechanisms is employed by the banking application in the above scenario?

Options:
A.

Biometric authentication

B.

Smart card authentication

C.

Single sign-on (SSO) authentication

D.

Two-factor authentication

Questions 14

Stella, a mobile user, often ignores the messages received from the manufacturer for updates. One day, she found that files in her device are being replaced, she immediately rushed to the nearest service center for inquiry. They tested the device and identified vulnerabilities in it as it ran with an obsolete OS version.

Identify the mobile device security risk raised on Stella's device in the above scenario.

Options:
A.

Application-based risk

B.

System-based risk

C.

Network-based risk

D.

Physical security risks

Questions 15

Kelly, a cloud administrator at TechSol Inc., was instructed to select a cloud deployment model to secure the corporate data and retain full control over the data.

Which of the following cloud deployment models helps Kelly in the above scenario?

Options:
A.

Public cloud

B.

Multi cloud

C.

Community cloud

D.

Private cloud

Questions 16

Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah's computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions.

Identify the Internet access policy demonstrated in the above scenario.

Options:
A.

Permissive policy

B.

Promiscuous policy

C.

Paranoid policy

D.

Prudent policy

Questions 17

Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.

Identify the type of cipher employed by Kevin in the above scenario.

Options:
A.

Substitution cipher

B.

Streamn cipher

C.

Transposition cipher

D.

Block cipher

Questions 18

Which of the following types of network cable is made up of a single copper conductor at its center and a plastic layer that provides an insulated center conductor with a braided metal shield?

Options:
A.

Unshielded twisted pair

B.

Coaxial

C.

Fiber optic

D.

Shielded twisted pair

Questions 19

Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.

Which of the following algorithms was employed by Peter in the above scenario?

Options:
A.

RSA

B.

MD6

C.

DSA

D.

SHA-2

Questions 20

Which of the following algorithms uses a sponge construction where message blocks are XORed into the initial bits of the state that the algorithm then invertible permutes?

Options:
A.

MD5

B.

SHA-2

C.

SHA-3

D.

MD6