Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :EC-Council Certified Network Defender (CND)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-38 Questions & Answers

  • Question 11:

    Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?

    A. Southbound API

    B. Eastbound API

    C. Westbound API

    D. Northbound API

  • Question 12:

    Henry, head of network security at Gentech, has discovered a general report template that someone has reserved only for the CEO. Since the file has to be editable, viewable, and deletable by everyone, what permission value should he set?

    A. 700

    B. 777

    C. 755

    D. 600

  • Question 13:

    Which of the following provides a set of voluntary recommended cyber security features to include in network-capable IoT devices?

    A. FGMA

    B. GLBA

    C. GCMA

    D. NIST

  • Question 14:

    Which of the following is an example of MAC model?

    A. Chinese Waterfall model

    B. Clark-Beason integrity model

    C. Access control matrix model

    D. Bell-LaPadula model

  • Question 15:

    How can a WAF validate traffic before it reaches a web application?

    A. It uses a role-based filtering technique

    B. It uses an access-based filtering technique

    C. It uses a sandboxing filtering technique

    D. It uses a rule-based filtering technique

  • Question 16:

    Jason has set a firewall policy that allows only a specific list of network services and denies everything else. This strategy is known as a ____________.

    A. Default allow

    B. Default access

    C. Default accept

    D. Default deny

  • Question 17:

    Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the _________ authentication technique to satisfy the request.

    A. Single-sign-on

    B. Smart card authentication

    C. Two-factor authentication

    D. Biometric

  • Question 18:

    Which of the following things need to be identified during attack surface visualization?

    A. Attacker's tools, techniques, and procedures

    B. Authentication, authorization, and auditing in networks

    C. Regulatory frameworks, standards and, procedures for organizations

    D. Assets, topologies, and policies of the organization

  • Question 19:

    John is a senior network security administrator working at a multinational company. He wants to block specific syscalls from being used by container binaries. Which Linux kernel feature restricts actions within the container?

    A. Cgroups

    B. LSMs

    C. Seccomp

    D. Userns

  • Question 20:

    Which command is used to change the permissions of a file or directory?

    A. rmdir

    B. systemctl

    C. kill

    D. chmod

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.