New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

NDE 112-51 Syllabus Exam Questions Answers

Page: 2 / 6
Total 75 questions

Network Defense Essentials (NDE) Exam Questions and Answers

Question 5

Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.

In which of the following states has Steve encrypted the data in the above scenario?

Options:

A.

Data in use

B.

Data in transit

C.

Data inactive

D.

Data in rest

Question 6

Jamie wants to send a confidential file to her friend Alice. For this purpose, they installed an application for securely sharing the file. The application employs an encryption algorithm that usesthe same shared secret key for encryption and decryption of data.

Identify the type of cryptography employed by the application used by Alice and Jamie for file sharing.

Options:

A.

Symmetric cryptography

B.

Public-key cryptography

C.

RSA cryptosystem

D.

Asymmetric cryptography

Question 7

Which of the following tools is designed to identify and prevent malicious Trojans or malware from infecting computer systems or electronic devices?

Options:

A.

HOIC

B.

HitmanPro

C.

Hulk

D.

Hashcat

Question 8

Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.

Identify the type of cipher employed by Kevin in the above scenario.

Options:

A.

Substitution cipher

B.

Streamn cipher

C.

Transposition cipher

D.

Block cipher

Page: 2 / 6
Total 75 questions