Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :EC-Council Certified Network Defender (CND)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-38 Questions & Answers

  • Question 511:

    Jason works as a System Administrator for www.company.com Inc. The company has a Windows-based network. Sam, an employee of the company, accidentally changes some of the applications and system settings. He complains to Jason that his system is not working properly. To troubleshoot the problem, Jason diagnoses the internals of his computer and observes that some changes have been made in Sam's computer registry. To rectify the issue, Jason has to restore the registry. Which of the following utilities can Jason use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

    A. Reg.exe

    B. EventCombMT

    C. Regedit.exe

    D. Resplendent registrar

  • Question 512:

    Which of the following is the best way of protecting important data against virus attack?

    A. Implementing a firewall.

    B. Updating the anti-virus software regularly.

    C. Taking daily backup of data.

    D. Using strong passwords to log on to the network.

  • Question 513:

    Which of the following is a service discovery protocol that allows computers and other devices to find services in a local area network without prior configuration?

    A. NTP

    B. SLP

    C. NNTP

    D. DCAP

  • Question 514:

    Which of the following attacks are computer threats that try to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer? Each correct answer represents a complete solution. Choose all that apply.

    A. Buffer overflow

    B. Zero-day

    C. Spoofing

    D. Zero-hour

  • Question 515:

    Which of the following protocols permits users to enter a user-friendly computer name into the Windows browser and to map network drives and view shared folders?

    A. RADIUS

    B. NetBEUI

    C. VoIP

    D. ARP

  • Question 516:

    Which of the following is a network analysis tool that sends packets with nontraditional IP stack parameters?

    A. Nessus

    B. COPS

    C. SAINT

    D. HPing

  • Question 517:

    Which of the following protocols is a method of implementing virtual private networks?

    A. OSPF

    B. PPTP

    C. IRDP

    D. DHCP

  • Question 518:

    Adam works as a Professional Penetration Tester. A project has been assigned to him to test the vulnerabilities of the CISCO Router of Umbrella Inc. Adam finds out that HTTP Configuration Arbitrary Administrative Access Vulnerability exists in the router. By applying different password cracking tools, Adam gains access to the router. He analyzes the router config file and notices the following lines: logging buffered errors logging history critical logging trap warnings logging 10.0.1.103 By analyzing the above lines, Adam concludes that this router is logging at log level 4 to the syslog server 10.0.1.103. He decides to change the log level from 4 to 0. Which of the following is the most likely reason of changing the log level?

    A. Changing the log level from 4 to 0 will result in the logging of only emergencies. This way the modification in the router is not sent to the syslog server.

    B. By changing the log level, Adam can easily perform a SQL injection attack.

    C. Changing the log level grants access to the router as an Administrator.

    D. Changing the log level from 4 to 0 will result in the termination of logging. This way the modification in the router is not sent to the syslog server.

  • Question 519:

    Which of the following types of RAID offers no protection for the parity disk?

    A. RAID 2

    B. RAID 1

    C. RAID 5

    D. RAID 3

  • Question 520:

    Which of the following processes helps the business units to understand the impact of a disruptive event?

    A. Plan approval and implementation

    B. Business continuity plan development

    C. Scope and plan initiation

    D. Business impact assessment

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.