EC-Council 312-38 Certified Network Defender Online Training
EC-Council 312-38 Online Training
The questions for 312-38 were last updated at Nov 19,2024.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: Nov 19,2024
Management decides to implement a risk management system to reduce and maintain the organization’s risk at an acceptable level.
Which of the following is the correct order in the risk management phase?
- A . Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review
- B . Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk Assessment
- C . Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk Identification
- D . Risk Identification. Risk Assessment. Risk Monitoring & Review, Risk Treatment
John has implemented ________ in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.
- A . DMZ
- B . Proxies
- C . VPN
- D . NAT
What command is used to terminate certain processes in an Ubuntu system?
- A . #grep Kill [Target Process}
- B . #kill-9[PID]
- C . #ps ax Kill
- D . # netstat Kill [Target Process]
Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22.
What will happen if any one of the main nodes fail?
- A . Failure of the main node affects all other child nodes at the same level irrespective of the main node.
- B . Does not cause any disturbance to the child nodes or its tranmission
- C . Failure of the main node will affect all related child nodes connected to the main node
- D . Affects the root node only
Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user’s email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures.
What is Stephanie working on?
- A . Confidentiality
- B . Availability
- C . Data Integrity
- D . Usability
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours.
What is the best option to do this job?
- A . Install a CCTV with cameras pointing to the entrance doors and the street
- B . Use fences in the entrance doors
- C . Use lights in all the entrance doors and along the company’s perimeter
- D . Use an IDS in the entrance doors and install some of them near the corners
Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems are infected with a virus that forces systems to shut down automatically after period of time.
What type of security incident are the employees a victim of?
- A . Scans and probes
- B . Malicious Code
- C . Denial of service
- D . Distributed denial of service
———–is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)
- A . 802.15.4
- B . 802.15
- C . 802.12
- D . 802.16
The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.
- A . 255.255.255.0
- B . 18.12.4.1
- C . 172.168.12.4
- D . 169.254.254.254
Rick has implemented several firewalls and IDS systems across his enterprise network.
What should he do to effectively correlate all incidents that pass through these security controls?
- A . Use firewalls in Network Address Transition (NAT) mode
- B . Implement IPsec
- C . Implement Simple Network Management Protocol (SNMP)
- D . Use Network Time Protocol (NTP)