EC-Council 312-38 Real Exam Questions
The questions for 312-38 were last updated at Nov 19,2024.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: Nov 19,2024
The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header.
What mode of ESP does Jacob need to use to encrypt the IP traffic?
- A . He should use ESP in transport mode.
- B . Jacob should utilize ESP in tunnel mode.
- C . Jacob should use ESP in pass-through mode.
- D . He should use ESP in gateway mode
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the servers and the user network.
- A . SAN
- B . SCSA
- C . NAS
- D . SAS
The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed.
What is/are the reason(s) Alex is suggesting that James use a differential backup? (Select all that apply)
- A . Less storage space is required
- B . Father restoration
- C . Slower than a full backup
- D . Faster than a full backup
- E . Less expensive than full backup
Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other.
How will they ensure the authenticity of their emails?
- A . Dan will use his public key to encrypt his mails while Alex will use Dan’s digital signature to verify the authenticity of the mails.
- B . Dan will use his private key to encrypt his mails while Alex will use his digital signature to verify the authenticity of the mails.
- C . Dan will use his digital signature to sign his mails while Alex will use his private key to verify the authenticity of the mails.
- D . Dan will use his digital signature to sign his mails while Alex will use Dan’s public key to verify the authencity of the mails.
What command is used to terminate certain processes in an Ubuntu system?
- A . #grep Kill [Target Process}
- B . #kill-9[PID]
- C . #ps ax Kill
- D . # netstat Kill [Target Process]
John wants to implement a packet filtering firewall in his organization’s network.
What TCP/IP layer does a packet filtering firewall work on?
- A . Application layer
- B . Network Interface layer
- C . TCP layer
- D . IP layer
Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private.
What encryption method did Ivan settle on?
- A . Ivan settled on the private encryption method.
- B . Ivan settled on the symmetric encryption method.
- C . Ivan settled on the asymmetric encryption method
- D . Ivan settled on the hashing encryption method
Mark is monitoring the network traffic on his organization’s network. He wants to detect a TCP and UDP ping sweep on his network.
Which type of filter will be used to detect this on the network?
- A . Tcp.srcport==7 and udp.srcport==7
- B . Tcp.srcport==7 and udp.dstport==7
- C . Tcp.dstport==7 and udp.srcport==7
- D . Tcp.dstport==7 and udp.dstport==7
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials.
Which of following physical security measures should the administrator use?
- A . Bollards
- B . Fence
- C . Video surveillance
- D . Mantrap
What is the name of the authority that verifies the certificate authority in digital certificates?
- A . Directory management system
- B . Certificate authority
- C . Registration authority
- D . Certificate Management system