Exam Details

  • Exam Code
    :312-38
  • Exam Name
    :Certified Network Defender (CND)
  • Certification
    :Certified Ethical Hacker
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :653 Q&As
  • Last Updated
    :May 13, 2024

EC-COUNCIL Certified Ethical Hacker 312-38 Questions & Answers

  • Question 41:

    Which of the following topologies is a type of physical network design where each computer in the network is connected to a central device through an unshielded twisted-pair (UTP) wire?

    A. Mesh topology

    B. Star topology

    C. Ring topology

    D. Bus topology

  • Question 42:

    Which of the following is a firewall that keeps track of the state of network connections traveling across it?

    A. Stateful firewall

    B. Stateless packet filter firewall

    C. Circuit-level proxy firewall

    D. Application gateway firewall

  • Question 43:

    In which of the following types of port scans does the scanner attempt to connect to all 65535 ports?

    A. UDP

    B. Strobe

    C. FTP bounce

    D. Vanilla

  • Question 44:

    Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?

    A. HIDS

    B. IPS

    C. DMZ

    D. NIDS

  • Question 45:

    Which of the following tools is a free laptop tracker that helps in tracking a user's laptop in case it gets stolen?

    A. SAINT

    B. Adeona

    C. Snort

    D. Nessus

  • Question 46:

    Which of the following can be performed with software or hardware devices in order to record everything a person types using his or her keyboard?

    A. Warchalking

    B. Keystroke logging

    C. War dialing

    D. IRC bot

  • Question 47:

    Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall? Each correct answer represents a complete solution. Choose all that apply.

    A. Circuit-level gateway

    B. Stateful

    C. Proxy server

    D. Dynamic packet-filtering

  • Question 48:

    Which of the following statements are true about volatile memory? Each correct answer represents a complete solution. Choose all that apply.

    A. Read-Only Memory (ROM) is an example of volatile memory.

    B. The content is stored permanently, and even the power supply is switched off.

    C. The volatile storage device is faster in reading and writing data.

    D. It is computer memory that requires power to maintain the stored information.

  • Question 49:

    Which of the following statements are NOT true about the FAT16 file system? Each correct answer represents a complete solution. Choose all that apply.

    A. It does not support file-level security.

    B. It works well with large disks because the cluster size increases as the disk partition size increases.

    C. It supports the Linux operating system.

    D. It supports file-level compression.

  • Question 50:

    Which of the following standards is an amendment to the original IEEE 802.11 and specifies security mechanisms for wireless networks?

    A. 802.11b

    B. 802.11e

    C. 802.11i

    D. 802.11a

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.