Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

112-51 Questions and Answers

Question # 6

Which of the following solutions is a software or a hardware device on a network or host that filters the incoming and outgoing traffic to prevent unauthorized access to private networks?

A.

Firewall

B.

Router

C.

Hub

D.

Switch

Full Access
Question # 7

Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web. She employed a proxy tool that makes his online activity untraceable.

Identify the type of proxy employed by John in the above scenario.

A.

SOCKS proxy

B.

Anonymous proxy

C.

Reverse proxy

D.

Explicit proxy

Full Access
Question # 8

Kevin logged into a banking application with his registered credentials and tried to transfer someamount from his account to Flora's account. Before transferring the amount to Flora's account, the application sent an OTP to Kevin's mobile for confirmation.

Which of the following authentication mechanisms is employed by the banking application in the above scenario?

A.

Biometric authentication

B.

Smart card authentication

C.

Single sign-on (SSO) authentication

D.

Two-factor authentication

Full Access
Question # 9

Which of the following IDS components analyzes the traffic and reports if any suspicious activity is

detected?

A.

Command console

B.

Network sensor

C.

Database of attack signatures

D.

Response system

Full Access
Question # 10

Kelly, a cloud administrator at TechSol Inc., was instructed to select a cloud deployment model to secure the corporate data and retain full control over the data.

Which of the following cloud deployment models helps Kelly in the above scenario?

A.

Public cloud

B.

Multi cloud

C.

Community cloud

D.

Private cloud

Full Access
Question # 11

Which of the following algorithms is an iterated block cipher that works by repeating the defined steps multiple times and has a 128-bit block size, having key sizes of 128, 192, and 256 bits?

A.

DSA

B.

MD5

C.

SHA

D.

AES

Full Access
Question # 12

Bob has secretly installed smart CCTV devices (loT devices) outside his home and wants to access the recorded data from a remote location. These smart CCTV devices send sensed data to an intermediate device that carries out pre-processing of data online before transmitting it to the cloud for storage and analysis. The analyzed data is then sent to Bob for initiating actions.

Identify the component of loT architecture that collects data from loT devices and performs data pre-processing.

A.

Streaming data processor

B.

Gateway

C.

Data lakes

D.

Machine learning

Full Access
Question # 13

Johana was working on a confidential project on her laptop. After working for long hours, she wanted to have a coffee break. Johana left the system active with the project file open and went for a coffee break. Soon after Johana left the place, Bob accessed Johana's system and modified the project file.

Which of the following security guidelines did Johana fail to comply with?

A.

Always log off or lock the system when unattended

B.

Do not share your computer user account details

C.

Keep different passwords for the OS and frequently used applications

D.

Do not keep a common password for all accounts

Full Access
Question # 14

Joseph, a security professional, was instructed to secure the organization's network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.

Identify the attack signature analysis technique performed by Joseph in the above scenario.

A.

Composite-signature-based analysis

B.

Context-based signature analysis

C.

Content-based signature analysis

D.

Atomic-signature-based analysis

Full Access
Question # 15

Which of the following acts was enacted in 2002 and aims to protect the public and investors by increasing the accuracy and reliability of corporate disclosures?

A.

Sarbanes-Oxley Act (SOX)

B.

Digital Millennium Copyright Act (DMCA)

C.

Gramm-Leach-Bliley Act

D.

Payment Card Industry-Data Security Standard (PCI-DSS)

Full Access
Question # 16

Cibel.org, an organization, wanted to develop a web application for marketing its products to the public. In this process, they consulted a cloud service provider and requested provision of development tools, configuration management, and deployment platforms for developing customized applications.

Identify the type of cloud service requested by Cibel.org in the above scenario.

A.

Security-as-a-service (SECaaS)

B.

Platform-as-a-service

C.

Infrastructure-as-a-service {laaS)

D.

ldentity-as-a-service {IDaaS)

Full Access
Question # 17

A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.

Identify the type of fire-fighting system used by the rescue team in the above scenario.

A.

Wet chemical suppressant

B.

Sprinkler system

C.

Fire extinguisher

D.

Standpipe system

Full Access
Question # 18

Robert, an ISP, was instructed to provide network connectivity to all areas even if some locations are inaccessible to capture direct signals from wireless access points. In this process, Robert used a wireless network component that takes a signal from one access point and boosts its signal strength to create a new network.

Identify the component of the wireless network employed by Robert in the above scenario.

A.

Mobile hotspot

B.

Wireless bridge

C.

Wireless NIC

D.

Wireless repeater

Full Access
Question # 19

John, from a remote location, was monitoring his bedridden grandfather's health condition at his home. John has placed a smart wearable ECG on his grandfather's wrist so that he can receive alerts to his mobile phone and can keep a track over his grandfather's health condition periodically.

Which of the following types of loT communication model was demonstrated in the above scenario?

A.

Device-to-gateway model

B.

Device-to-cloud model

C.

Cloud-to-cloud communication model

D.

Device-to-device model

Full Access
Question # 20

Joseph, a cloud administrator, was recruited for the management and deployment of the software

containers. As part of his job, Joseph employed an automated solution that converts images into containers, deploys them to the hosts, and further monitors container workflow from a single location.

Identify the solution employed by Joseph in the above scenario.

A.

Port scanners

B.

Orchestrators

C.

Network monitors

D.

Sniffers

Full Access
Question # 21

George, a professional hacker, targeted a bank employee and tried to crack his password while he was attempting to log on to the remote server to perform his regular banking operations. In thisprocess, George used sniffing tools to capture the password pairwise master key (PMK) associated with the handshake authentication process. Then, using the PMK, he gained unauthorized access to the server to perform malicious activities.

Identify the encryption technology on which George performed password cracking.

A.

WPA3

B.

WPA

C.

WPA2

D.

WEP

Full Access
Question # 22

Which of the following techniques protects sensitive data by obscuring specific areas with random

characters or codes?

A.

Data retention

B.

Data resilience

C.

Data backup

D.

Data masking

Full Access