Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :Certified Network Defender (CND)
  • Certification
    :Certified Ethical Hacker
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :Nov 13, 2024

EC-COUNCIL Certified Ethical Hacker 312-38 Questions & Answers

  • Question 1:

    In _______ mechanism, the system or application sends log records either on the local disk or over the network.

    A. Network-based

    B. Pull-based

    C. Push-based

    D. Host-based

  • Question 2:

    Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?

    A. Application sandboxing

    B. Deployment of WAFS

    C. Application whitelisting

    D. Application blacklisting

  • Question 3:

    Who is an IR custodian?

    A. An individual responsible for conveying company details after an incident

    B. An individual who receives the initial IR alerts and leads the IR team in all the IR activities

    C. An individual who makes a decision on the classifications and the severity of the incident identified

    D. An individual responsible for the remediation and resolution of the incident that occurred

  • Question 4:

    Which of the following attack surface increase when you keep USB ports enabled on your laptop unnecessarily?

    A. Human attack surface

    B. Network attack surface

    C. Physical attack surface

    D. Software attack surface

  • Question 5:

    Which of the following is not part of the recommended first response steps for network defenders?

    A. Restrict yourself from doing the investigation

    B. Extract relevant data from the suspected devices as early as possible

    C. Disable virus protection

    D. Do not change the state of the suspected device

  • Question 6:

    Which among the following tools can help in identifying IoEs to evaluate human attack surface?

    A. securiCAD

    B. Amass

    C. Skybox

    D. SET

  • Question 7:

    In ______ method, event logs are arranged in the form of a circular buffer.

    A. Non-wrapping method

    B. LIFO method

    C. Wrapping method

    D. FIFO method

  • Question 8:

    Which of the following indicators refers to potential risk exposures that attackers can use to breach the security of an organization?

    A. Indicators of attack

    B. Key risk indicators

    C. Indicators of exposure

    D. Indicators of compromise

  • Question 9:

    Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?

    A. Hash rule

    B. Path rule

    C. Internet zone rule

    D. Certificate rule

  • Question 10:

    Richard has been working as a Linux system administrator at an MNC. He wants to maintain a productive and secure environment by improving the performance of the systems through Linux patch management. Richard is using Ubuntu and wants to patch the Linux systems manually. Which among the following command installs updates (new ones) for Debian-based Linux OSes?

    A. sudo apt-get upgrade

    B. sudo apt-get dist-update

    C. sudo apt-get dist-upgrade

    D. sudo apt-get update

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.