EC-Council 312-38 Certified Network Defender Online Training
EC-Council 312-38 Online Training
The questions for 312-38 were last updated at Apr 26,2025.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: Apr 26,2025
Should not be expensive.
The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements.
What RAID level will she suggest?
- A . RAID 0
- B . RAID 10
- C . RAID 3
- D . RAID 1
Which OSI layer does a Network Interface Card (NIC) work on?
- A . Physical layer
- B . Presentation layer
- C . Network layer
- D . Session layer
Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an ______for legal advice to defend them against this allegation.
- A . PR Specialist
- B . Attorney
- C . Incident Handler
- D . Evidence Manager
Brendan wants to implement a hardware based RAID system in his network. He is thinking of choosing a suitable RAM type for the architectural setup in the system. The type he is interested in provides access times of up to 20 ns.
Which type of RAM will he select for his RAID system?
- A . NVRAM
- B . SDRAM
- C . NAND flash memory
- D . SRAM
Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________implementation of a VPN.
- A . Full Mesh Mode
- B . Point-to-Point Mode
- C . Transport Mode
- D . Tunnel Mode
Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other.
How will they ensure the authenticity of their emails?
- A . Dan will use his public key to encrypt his mails while Alex will use Dan’s digital signature to verify the authenticity of the mails.
- B . Dan will use his private key to encrypt his mails while Alex will use his digital signature to verify the authenticity of the mails.
- C . Dan will use his digital signature to sign his mails while Alex will use his private key to verify the authenticity of the mails.
- D . Dan will use his digital signature to sign his mails while Alex will use Dan’s public key to verify the authencity of the mails.
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials.
Which of following physical security measures should the administrator use?
- A . Bollards
- B . Fence
- C . Video surveillance
- D . Mantrap
A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0.
What IP address class is the network range a part of?
- A . Class C
- B . Class A
- C . Class B
- D . Class D
Which of the information below can be gained through network sniffing? (Select all that apply)
- A . Telnet Passwords
- B . Syslog traffic
- C . DNS traffic
- D . Programming errors
Blake is working on the company’s updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan.
Unsuccessful scans and probes are at what severity level?
- A . Extreme severity level
- B . Low severity level
- C . Mid severity level
- D . High severity level