Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :EC-Council Certified Network Defender (CND)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-38 Questions & Answers

  • Question 461:

    Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?

    A. Analysis of Threats

    B. Analysis of Vulnerabilities

    C. Assessment of Risk

    D. Identification of Critical Information

    E. Application of Appropriate OPSEC Measures

  • Question 462:

    In which of the following attacks do computers act as zombies and work together to send out bogus messages, thereby increasing the amount of phony traffic?

    A. Smurf attack

    B. Buffer-overflow attack

    C. DDoS attack

    D. Bonk attack

  • Question 463:

    Which of the following is a communication protocol that multicasts messages and information among all member devices in an IP multicast group?

    A. ICMP

    B. IGMP

    C. BGP

    D. EGP

  • Question 464:

    Attacks are classified into which of the following? Each correct answer represents a complete solution. Choose all that apply.

    A. Active attack

    B. Session hijacking

    C. Passive attack

    D. Replay attack

  • Question 465:

    Which of the following is a technique for gathering information about a remote network protected by a firewall?

    A. Firewalking

    B. Warchalking

    C. Wardriving

    D. Wardialing

  • Question 466:

    Which of the following is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end-user client applications?

    A. NNTP

    B. BOOTP

    C. DCAP

    D. NTP

  • Question 467:

    Which of the following attacks is a class of brute force attacks that depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations?

    A. Phishing attack

    B. Replay attack

    C. Birthday attack

    D. Dictionary attack

  • Question 468:

    Which of the following is a digital telephone/telecommunication network that carries voice, data, and video over an existing telephone network infrastructure?

    A. PPP

    B. Frame relay

    C. ISDN

    D. X.25

  • Question 469:

    Which of the following policies to help define what users can and should do to use the network and organization of computer equipment?

    A. None

    B. IT policy

    C. user policy

    D. general policy

    E. remote access policy

  • Question 470:

    Which of the following is a class of attacks to break through, which depends on a greater probability of collisions between random attack was detected, and try to fixed rate permutations?

    A. Dictionary attack

    B. None

    C. birthday attack

    D. phishing attack

    E. replay attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.