Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :EC-Council Certified Network Defender (CND)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-38 Questions & Answers

  • Question 381:

    Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?

    A. High-interaction honeypot

    B. Medium-interaction honeypot

    C. Honeyd

    D. Low-interaction honeypot

  • Question 382:

    Which of the following is a standard protocol for interfacing external application software with an information server, commonly a Web server?

    A. DHCP

    B. IP

    C. CGI

    D. TCP

  • Question 383:

    Which of the following devices allows wireless communication devices to connect to a wireless network using Wi-Fi, Bluetooth, or related standards?

    A. Express card

    B. WAP

    C. WNIC

    D. Wireless repeater

    E. None

  • Question 384:

    Which of the following protocols uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets?

    A. PPTP

    B. ESP

    C. LWAPP

    D. SSTP

  • Question 385:

    Which of the following TCP commands are used to allocate a receiving buffer associated with the specified connection?

    A. Send

    B. Close

    C. None

    D. Receive

    E. Interrupt

  • Question 386:

    Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service, or unauthorized changes to system hardware, software, or data?

    A. Cyber Incident Response Plan

    B. Crisis Communication Plan

    C. Disaster Recovery Plan

    D. Occupant Emergency Plan

  • Question 387:

    Which of the following layers of the TCP/IP model maintains data integrity by ensuring that messages are delivered in the order in which they are sent and that there is no loss or duplication?

    A. Transport layer

    B. Link layer

    C. Internet layer

    D. Application layer

  • Question 388:

    You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

    A. History folder

    B. Temporary Internet Folder

    C. Cookies folder

    D. Download folder

  • Question 389:

    Which of the following policies is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly?

    A. Information protection policy

    B. Remote access policy

    C. Group policy

    D. Password policy

  • Question 390:

    Which of the following biometric devices is used to take impressions of the friction ridges of the skin on the underside of the tip of the fingers?

    A. Facial recognition device

    B. Iris camera

    C. Voice recognition voiceprint

    D. Fingerprint reader

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.