Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :EC-Council Certified Network Defender (CND)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-38 Questions & Answers

  • Question 271:

    Adam, a malicious hacker, has just succeeded in stealing a secure cookie via a XSS attack. He is able to replay the cookie even while the session is valid on the server. Which of the following is the most likely reason of this cause?

    A. Encryption is performed at the network layer (layer 1 encryption).

    B. Encryption is performed at the application layer (single encryption key).

    C. No encryption is applied.

    D. Two way encryption is applied.

  • Question 272:

    Which of the following procedures is intended to provide security personnel to identify, mitigate, and recover from malware events, such as unauthorized access to systems or data, denial-of-service or unauthorized changes to the system hardware, software, or information?

    A. None

    B. disaster survival plan

    C. Cyber Incident Response Plan

    D. A resident of the emergency plan

    E. Crisis communications guidelines

  • Question 273:

    John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

    Original cookie values:

    ItemID1=2 ItemPrice1=900 ItemID2=1 ItemPrice2=200 Modified cookie values: ItemID1=2 ItemPrice1=1 ItemID2=1 ItemPrice2=1

    Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price. Which of the following hacking techniques is John performing?

    A. Computer-based social engineering

    B. Man-in-the-middle attack

    C. Cookie poisoning

    D. Cross site scripting

  • Question 274:

    Which of the following UTP cables uses four pairs of twisted cable and provides transmission speeds of up to 16 Mbps?

    A. Category 5e

    B. Category 5

    C. Category 3

    D. Category 6

  • Question 275:

    Which of the following policies is used to add additional information about the overall security posture and serves to protect employees and organizations from inefficiency or ambiguity?

    A. User policy

    B. Group policy

    C. Issue-Specific Security Policy

    D. IT policy

  • Question 276:

    Which of the following statements are true about volatile memory? Each correct answer represents a complete solution. Choose all that apply.

    A. The content is stored permanently and even the power supply is switched off.

    B. A volatile storage device is faster in reading and writing data.

    C. Read only memory (ROM) is an example of volatile memory.

    D. It is computer memory that requires power to maintain the stored information.

  • Question 277:

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

    ,,It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys."

    Which of the following tools is John using to crack the wireless encryption keys?

    A. Cain

    B. PsPasswd

    C. Kismet

    D. AirSnort

  • Question 278:

    You are a professional Computer Hacking forensic investigator. You have been called to collect evidences of buffer overflow and cookie snooping attacks. Which of the following logs will you review to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

    A. Program logs

    B. Web server logs

    C. Event logs

    D. System logs

  • Question 279:

    Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

    A. NetResident

    B. Wireshark

    C. Bridle

    D. NetWitness

    E. None

  • Question 280:

    John works as an Ethical Hacker for www.company.com Inc. He wants to find out the ports that are open in www.company.com's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

    A. TCP SYN

    B. Xmas tree

    C. TCP SYN/ACK

    D. TCP FIN

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.