EC-Council 312-38 Real Exam Questions
The questions for 312-38 were last updated at Nov 19,2024.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: Nov 19,2024
Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching.
Which type of network-based IDS is Sam implementing?
- A . Behavior-based IDS
- B . Anomaly-based IDS
- C . Stateful protocol analysis
- D . Signature-based IDS
Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server’s data daily to ensure nothing is lost. The power in the company’s office is not always reliable, Kyle needs to make sure the servers do not go down or are without power for too long. Kyle decides to purchase an Uninterruptible Power Supply (UPS) that has a pair of inverters and converters to charge the battery and provides power when needed.
What type of UPS has Kyle purchased?
- A . Kyle purchased a Ferro resonant Standby UPS.
- B . Kyle purchased a Line-Interactive UPS
- C . He has bought a Standby UPS
- D . He purchased a True Online UPS.
John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization’s network.
Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?
- A . Tcp.flags==0x2b
- B . Tcp.flags=0x00
- C . Tcp.options.mss_val<1460
- D . Tcp.options.wscale_val==20
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices.
At what layer of the OSI model does an IPsec tunnel function on?
- A . They work on the session layer.
- B . They function on either the application or the physical layer.
- C . They function on the data link layer
- D . They work on the network layer
Alex is administrating the firewall in the organization’s network.
What command will he use to check the ports applications open?
- A . Netstat -an
- B . Netstat -o
- C . Netstat -a
- D . Netstat -ao
Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities.
What type of network security approach is Daniel adopting?
- A . Preventative
- B . Reactive
- C . Retrospective
- D . Defense-in-depth
Which OSI layer does a Network Interface Card (NIC) work on?
- A . Physical layer
- B . Presentation layer
- C . Network layer
- D . Session layer
David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the______framework, as it provides a set of controls over IT and consolidates them to form a framework.
- A . RMIS
- B . ITIL
- C . ISO 27007
- D . COBIT
James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails.
What should James use?
- A . James could use PGP as a free option for encrypting the company’s emails.
- B . James should utilize the free OTP software package.
- C . James can use MD5 algorithm to encrypt all the emails
- D . James can enforce mandatory HTTPS in the email clients to encrypt emails
Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees.
Which network topology will help the administrator solve the problem of needing to add new employees and expand?
- A . Bus
- B . Star
- C . Ring
- D . Mesh