EC-Council 312-38 Certified Network Defender Online Training
EC-Council 312-38 Online Training
The questions for 312-38 were last updated at Apr 26,2025.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: Apr 26,2025
The————–protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.
- A . RARP
- B . ICMP
- C . DHCP
- D . ARP
Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities.
What type of network security approach is Daniel adopting?
- A . Preventative
- B . Reactive
- C . Retrospective
- D . Defense-in-depth
David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the______framework, as it provides a set of controls over IT and consolidates them to form a framework.
- A . RMIS
- B . ITIL
- C . ISO 27007
- D . COBIT
James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails.
What should James use?
- A . James could use PGP as a free option for encrypting the company’s emails.
- B . James should utilize the free OTP software package.
- C . James can use MD5 algorithm to encrypt all the emails
- D . James can enforce mandatory HTTPS in the email clients to encrypt emails
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works.
The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred’s supervisor wants to implement tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred’s boss wants a solution that will be placed on all computers throughout the company and monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic.
What type of solution does Fred’s boss want to implement?
- A . Fred’s boss wants a NIDS implementation.
- B . Fred’s boss wants Fred to monitor a NIPS system.
- C . Fred’s boss wants to implement a HIPS solution.
- D . Fred’s boss wants to implement a HIDS solution.
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices.
At what layer of the OSI model does an IPsec tunnel function on?
- A . They work on the session layer.
- B . They function on either the application or the physical layer.
- C . They function on the data link layer
- D . They work on the network layer
The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed.
What is/are the reason(s) Alex is suggesting that James use a differential backup? (Select all that apply)
- A . Less storage space is required
- B . Father restoration
- C . Slower than a full backup
- D . Faster than a full backup
- E . Less expensive than full backup
The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header.
What mode of ESP does Jacob need to use to encrypt the IP traffic?
- A . He should use ESP in transport mode.
- B . Jacob should utilize ESP in tunnel mode.
- C . Jacob should use ESP in pass-through mode.
- D . He should use ESP in gateway mode
Kyle, a front office executive, suspects that a Trojan has infected his computer.
What should be his first course of action to deal with the incident?
- A . Contain the damage
- B . Disconnect the five infected devices from the network
- C . Inform the IRT about the incident and wait for their response
- D . Inform everybody in the organization about the attack
Katie has implemented the RAID level that split data into blocks and evenly write the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of________in order to setup.
- A . Four drives
- B . Three drives
- C . Two drives
- D . Six drives