Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :Certified Network Defender (CND)
  • Certification
    :Certified Ethical Hacker
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :May 13, 2024

EC-COUNCIL Certified Ethical Hacker 312-38 Questions & Answers

  • Question 11:

    Which of the following is a protocol that describes an approach to providing "streamlined" support of OSI application services on top of TCP/IP-based networks for some constrained environments?

    A. Network News Transfer Protocol

    B. Lightweight Presentation Protocol

    C. Internet Relay Chat Protocol

    D. Dynamic Host Configuration Protocol

  • Question 12:

    You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?

    A. Implement a strong password policy.

    B. Implement a strong firewall.

    C. Implement a honeypot.

    D. Implement network based antivirus.

  • Question 13:

    Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? Each correct answer represents a complete solution. Choose all that apply.

    A. E-mail spam

    B. Junk mail

    C. Email spoofing

    D. Email jamming

  • Question 14:

    Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?

    A. Nmap

    B. Hping

    C. NetRanger

    D. PSAD

  • Question 15:

    Which of the following is a distributed multi-access network that helps in supporting integrated communications using a dual bus and distributed queuing?

    A. Logical Link Control

    B. Token Ring network

    C. Distributed-queue dual-bus

    D. CSMA/CA

  • Question 16:

    Which of the following is a distributed application architecture that partitions tasks or workloads between service providers and service requesters? Each correct answer represents a complete solution. Choose all that apply.

    A. Client-server computing

    B. Peer-to-peer (P2P) computing

    C. Client-server networking

    D. Peer-to-peer networking

  • Question 17:

    Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?

    A. Website defacement

    B. Zero-day attack

    C. Spoofing

    D. Buffer overflow

  • Question 18:

    Which of the following cables is made of glass or plastic and transmits signals in the form of light?

    A. Coaxial cable

    B. Twisted pair cable

    C. Plenum cable

    D. Fiber optic cable

  • Question 19:

    Which of the following is a network that supports mobile communications across an arbitrary number of wireless LANs and satellite coverage areas?

    A. LAN

    B. WAN

    C. GAN

    D. HAN

  • Question 20:

    Which of the following techniques is used for drawing symbols in public places for advertising an open Wi-Fi wireless network?

    A. Spamming

    B. War driving

    C. War dialing

    D. Warchalking

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.