Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :EC-Council Certified Network Defender (CND)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :May 06, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-38 Questions & Answers

  • Question 241:

    You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?

    A. A NIDS device would work best for the company.

    B. A HIPS device would best suite this company.

    C. The best solution to cover the needs of this company would be a HIDS device.

    D. You are suggesting a NIPS device.

  • Question 242:

    Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?

    A. The type of scan she is using is called a NULL scan.

    B. Cindy is attempting to find live hosts on her company's network by using a XMAS scan.

    C. Cindy is using a half-open scan to find live hosts on her network.

    D. She is utilizing a RST scan to find live hosts that are listening on her network.

  • Question 243:

    An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?

    A. Hybrid

    B. Rainbow table

    C. Dictionary

    D. Bruteforce

  • Question 244:

    The SOC manager is reviewing logs in AlienVault USM to investigate an intrusion on the network. Which CND approach is being used?

    A. Retrospective

    B. Reactive

    C. Deterrent

    D. Preventive

  • Question 245:

    Which of the following is a mechanism that helps in ensuring that only the intended and authorized recipients are able to read data?

    A. Integrity

    B. Data availability

    C. Confidentiality

    D. Authentication

  • Question 246:

    This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

    It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

    It is commonly used for the following purposes:

    A. War driving

    B. Detecting unauthorized access points

    C. Detecting causes of interference on a WLAN

    D. WEP ICV error tracking

    E. Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as __________.

    F. Kismet

    G. Absinthe

    H. THC-Scan

    I. NetStumbler

  • Question 247:

    Which of the following steps will NOT make a server fault tolerant? Each correct answer represents a complete solution. (Choose two.)

    A. Adding a second power supply unit

    B. Performing regular backup of the server

    C. Adding one more same sized disk as mirror on the server

    D. Implementing cluster servers' facility

    E. Encrypting confidential data stored on the server

  • Question 248:

    Which of the following help in estimating and totaling up the equivalent money value of the benefits and costs to the community of projects for establishing whether they are worthwhile? Each correct answer represents a complete solution. Choose all that apply.

    A. Business Continuity Planning

    B. Benefit-Cost Analysis

    C. Disaster recovery

    D. Cost-benefit analysis

  • Question 249:

    Which of the following are the common security problems involved in communications and email? Each correct answer represents a complete solution. Choose all that apply.

    A. False message

    B. Message digest

    C. Message replay

    D. Message repudiation

    E. Message modification

    F. Eavesdropping

    G. Identity theft

  • Question 250:

    Which of the following are the six different phases of the Incident handling process? Each correct answer represents a complete solution. Choose all that apply.

    A. Containment

    B. Identification

    C. Post mortem review

    D. Preparation

    E. Lessons learned

    F. Recovery

    G. Eradication

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.