EC-Council 312-38 Certified Network Defender Online Training
EC-Council 312-38 Online Training
The questions for 312-38 were last updated at Nov 19,2024.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: Nov 19,2024
A company has the right to monitor the activities of their employees on different information systems according to the _______policy.
- A . Information system
- B . User access control
- C . Internet usage
- D . Confidential data
Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office.
What layer of the OSI model do IPsec tunnels function on?
- A . The data link layer
- B . The session layer
- C . The network layer
- D . The application and physical layers
Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved.
What is the last step he should list?
- A . Assign eradication.
- B . Recovery
- C . Containment
- D . A follow-up.
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?
- A . Pipe Model
- B . AAA model
- C . Hub-and-Spoke VPN model
- D . Hose mode
James was inspecting ARP packets in his organization’s network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating.
Which type of attack is James analyzing?
- A . ARP Sweep
- B . ARP misconfiguration
- C . ARP spoofinq
- D . ARP Poisioning
Alex is administrating the firewall in the organization’s network.
What command will he use to check the ports applications open?
- A . Netstat -an
- B . Netstat -o
- C . Netstat -a
- D . Netstat -ao
The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank’s business is very high.
How should this risk be categorized in the risk matrix?
- A . High
- B . Medium
- C . Extreme
- D . Low
Identify the minimum number of drives required to setup RAID level 5.
- A . Multiple
- B . 3
- C . 4
- D . 2
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the servers and the user network.
- A . SAN
- B . SCSA
- C . NAS
- D . SAS
A local bank wants to protect their card holder data. The bank should comply with the________standard to ensure the security of card holder data.
- A . HIPAA
- B . ISEC
- C . PCI DSS
- D . SOAX