EC-Council 312-38 Certified Network Defender Online Training
EC-Council 312-38 Online Training
The questions for 312-38 were last updated at Nov 19,2024.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: Nov 19,2024
Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization’s need.
Which of the following factors will the administrator consider when deciding on the appropriate backup medium?
- A . Capability
- B . Accountability
- C . Extensibility
- D . Reliability
Which of the following network monitoring techniques requires extra monitoring software or hardware?
- A . Non-router based
- B . Switch based
- C . Hub based
- D . Router based
Steven’s company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them.
What should Steven implement on the firewall to ensure this happens?
- A . Steven should use a Demilitarized Zone (DMZ)
- B . Steven should use Open Shortest Path First (OSPF)
- C . Steven should use IPsec
- D . Steven should enabled Network Address Translation (NAT)
What is the name of the authority that verifies the certificate authority in digital certificates?
- A . Directory management system
- B . Certificate authority
- C . Registration authority
- D . Certificate Management system
Will is working as a Network Administrator. Management wants to maintain a backup of all the company data as soon as it starts operations. They decided to use a RAID backup storage technology for their data backup plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data written to one disk is copied automatically to the other disk as well. This maintains an additional copy of the data.
Which RAID level is used here?
- A . RAID 3
- B . RAID 1
- C . RAID 5
- D . RAID 0
You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the network.
What will be your first reaction as a first responder?
- A . Avoid Fear, Uncertainty and Doubt
- B . Communicate the incident
- C . Make an initial assessment
- D . Disable Virus Protection
If a network is at risk from unskilled individuals, what type of threat is this?
- A . External Threats
- B . Structured Threats
- C . Unstructured Threats
- D . Internal Threats
According to the company’s security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication.
What needs to happen to force this server to use Windows Authentication?
- A . Edit the ADLIN file.
- B . Edit the shadow file.
- C . Remove the /var/bin/localauth.conf file.
- D . Edit the PAM file to enforce Windows Authentication
Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files which are created or modified after the last backup.
What type of backup is Kelly using?
- A . Full backup
- B . Incremental backup
- C . Differential Backup
- D . Normal Backup
John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization’s network.
Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?
- A . Tcp.flags==0x2b
- B . Tcp.flags=0x00
- C . Tcp.options.mss_val<1460
- D . Tcp.options.wscale_val==20