Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

NDE 112-51 Dumps PDF

Page: 5 / 5
Question 20

Amber is working as a team lead in an organization. She was instructed to share a policy document with all the employees working from remote locations and collect them after filling. She shared the files from her mobile device to the concerned employees through the public Internet. An unauthorized user accessed the file in transit, modified the file, and forwarded it to the remote employees.

Based on the above scenario, identify the security risk associated with mobile usage policies.

Options:

A.

Lost or stolen devices

B.

Infrastructure issues

C.

Improperly disposing of devices

D.

Sharing confidential data on an unsecured network

Question 21

George, a professional hacker, targeted a bank employee and tried to crack his password while he was attempting to log on to the remote server to perform his regular banking operations. In thisprocess, George used sniffing tools to capture the password pairwise master key (PMK) associated with the handshake authentication process. Then, using the PMK, he gained unauthorized access to the server to perform malicious activities.

Identify the encryption technology on which George performed password cracking.

Options:

A.

WPA3

B.

WPA

C.

WPA2

D.

WEP

Question 22

Below is the list of encryption modes used in a wireless network.

1.WPA2 Enterprise with RADIUS

2.WPA3

3.WPA2 PSK

4.WPA2 Enterprise

Identify the correct order of wireless encryption modes in terms of security from high to low.

Options:

A.

2 -- >1 -- >4 -- >3

B.

3 -- >1 -- >4 -- >2

C.

4 -- >2 -- >3 -- >1

D.

4 -- >3 -- >2 -- >1

Page: 5 / 5
Exam Code: 112-51
Exam Name: Network Defense Essentials (NDE) Exam
Last Update: May 8, 2024
Questions: 75
112-51 pdf

112-51 PDF

$28  $80
112-51 Engine

112-51 Testing Engine

$33.25  $95
112-51 PDF + Engine

112-51 PDF + Testing Engine

$45.5  $130