Pass4itsure > EC-COUNCIL > EC-COUNCIL Certifications > 312-38 > 312-38 Online Practice Questions and Answers

312-38 Online Practice Questions and Answers

Questions 4

Which of the following protocols is used to exchange encrypted EDI messages via email?

A. S/MIME

B. MIME

C. HTTP

D. HTTPS

Buy Now
Questions 5

In which of the following attacks do computers act as zombies and work together to send out bogus messages, thereby increasing the amount of phony traffic?

A. Smurf attack

B. Buffer-overflow attack

C. DDoS attack

D. Bonk attack

Buy Now
Questions 6

Which of the following ranges of addresses can be used in the first octet of a Class A network address?

A. 0-127

B. 192-223

C. 224-255

D. 128-191

Buy Now
Questions 7

Adam, a malicious hacker, has just succeeded in stealing a secure cookie via a XSS attack. He is able to replay the cookie even while the session is valid on the server. Which of the following is the most likely reason of this cause?

A. Encryption is performed at the network layer (layer 1 encryption).

B. Encryption is performed at the application layer (single encryption key).

C. No encryption is applied.

D. Two way encryption is applied.

Buy Now
Questions 8

John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?

A. Packet Filtering

B. Circuit level gateway

C. Application level gateway

D. Stateful Multilayer Inspection

Buy Now
Questions 9

The _______ protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

A. RARP

B. ICMP

C. ARP

D. DHCP

Buy Now
Questions 10

Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?

A. Session layer firewall.

B. SOCKS host.

C. Bastion host.

D. Edge transport server.

Buy Now
Questions 11

Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:

1.

It has a parity check to store all the information about the data in multiple drives

2.

Help reconstruct the data during downtime.

3.

Process the data at a good speed.

4.

Should not be expensive.

The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?

A. RAID 3.

B. RAID 1

C. RAID 0

D. RAID 10

Buy Now
Questions 12

Which among the following is used to limit the number of cmdlets or administrative privileges of administrator, user, or service accounts?

A. Just Enough Administration (EA)

B. User Account Control (UAC)

C. Windows Security Identifier (SID)

D. Credential Guard

Buy Now
Questions 13

Fill in the blank with the appropriate word. The primary goal of risk analysis is to determine the proportion of effect and theoretical response.

Buy Now
Exam Code: 312-38
Exam Name: EC-Council Certified Network Defender (CND)
Last Update: Dec 29, 2024
Questions: 653
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99