Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :EC-Council Certified Network Defender (CND)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-38 Questions & Answers

  • Question 121:

    Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely without being tied to a network cable. While Frank and his colleagues are familiar with wired Ethernet technologies, 802.3, they are not familiar with how to setup wireless in a business environment. What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?

    A. The IEEE standard covering wireless is 802.9 and they should follow this.

    B. 802.7 covers wireless standards and should be followed

    C. They should follow the 802.11 standard

    D. Frank and the other IT employees should follow the 802.1 standard.

  • Question 122:

    If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

    A. Water

    B. Wet chemical

    C. Dry chemical

    D. Raw chemical

  • Question 123:

    What is the name of the authority that verifies the certificate authority in digital certificates?

    A. Directory management system

    B. Certificate authority

    C. Registration authority

    D. Certificate Management system

  • Question 124:

    Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching. Which type of network-based IDS is Sam implementing?

    A. Behavior-based IDS

    B. Anomaly-based IDS

    C. Stateful protocol analysis

    D. Signature-based IDS

  • Question 125:

    Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS. What type of detection is this network-based IDS system using?

    A. This network-based IDS system is using anomaly detection.

    B. This network-based IDS system is using dissimilarity algorithms.

    C. This system is using misuse detection.

    D. This network-based IDS is utilizing definition-based detection.

  • Question 126:

    Which of the information below can be gained through network sniffing? (Select all that apply)

    A. Telnet Passwords

    B. Syslog traffic

    C. DNS traffic

    D. Programming errors

  • Question 127:

    Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems are infected with a virus that forces systems to shut down automatically after period of time. What type of security incident are the employees a victim of?

    A. Scans and probes

    B. Malicious Code

    C. Denial of service

    D. Distributed denial of service

  • Question 128:

    Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.

    A. It uses a longer subnet masks as those used for IPv4.

    B. The interoperability, the IPv4 addresses using the last 32 bits of the IPv6 address.

    C. It provides enhanced authentication and security.

    D. It uses 128-bit addresses.

    E. It's more of available IP addresses.

  • Question 129:

    Which of the following types of coaxial cable used for cable television and cable modems?

    A. RG-8

    B. RG-59

    C. RG-58

    D. None

    E. RG-62

  • Question 130:

    Which of the following are valid steps to secure routers? Each correct answer represents a complete solution. Choose all that apply.

    A. Keep routers updated with the latest security updates.

    B. Use a password that is easy to remember the router's administrative console.

    C. Configure access list entries to prevent unauthorized connections and routing.

    D. Use a complex password of the router management console.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.