EC-Council 312-38 Certified Network Defender Online Training
EC-Council 312-38 Online Training
The questions for 312-38 were last updated at May 07,2025.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: May 07,2025
Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS.
What type of detection is this network-based IDS system using?
- A . This network-based IDS system is using anomaly detection.
- B . This network-based IDS system is using dissimilarity algorithms.
- C . This system is using misuse detection.
- D . This network-based IDS is utilizing definition-based detection.
Mark is monitoring the network traffic on his organization’s network. He wants to detect a TCP and UDP ping sweep on his network.
Which type of filter will be used to detect this on the network?
- A . Tcp.srcport==7 and udp.srcport==7
- B . Tcp.srcport==7 and udp.dstport==7
- C . Tcp.dstport==7 and udp.srcport==7
- D . Tcp.dstport==7 and udp.dstport==7
Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private.
What encryption method did Ivan settle on?
- A . Ivan settled on the private encryption method.
- B . Ivan settled on the symmetric encryption method.
- C . Ivan settled on the asymmetric encryption method
- D . Ivan settled on the hashing encryption method
Identify the password cracking attempt involving precomputed hash values stored as plaintext and using these to crack the password.
- A . Bruteforce
- B . Rainbow table
- C . Dictionary
- D . Hybrid
Justine has been tasked by her supervisor to ensure that the company’s physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees.
What should she install to prevent piggybacking?
- A . She should install a mantrap
- B . Justine needs to install a biometrics station at each entrance
- C . Justine will need to install a revolving security door
- D . She should install a Thompson Trapdoor.
Tom works as a network administrator in a multinational organization having branches across North America and Europe. Tom wants to implement a storage technology that can provide centralized data storage and provide free data backup on the server. He should be able to perform data backup and recovery more efficiently with the selected technology.
Which of the following storage technologies best suits Tom’s requirements?
- A . DAS
- B . PAS
- C . RAID
- D . NAS
Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.
- A . FHSS
- B . DSSS
- C . OFDM
- D . ISM
Jason has set a firewall policy that allows only a specific list of network services and deny everything else. This strategy is known as a____________.
- A . Default allow
- B . Default deny
- C . Default restrict
- D . Default access
You are responsible for network functions and logical security throughout the corporation. Your company has over 250 servers running Windows Server 2012, 5000 workstations running Windows 10, and 200 mobile users working from laptops on Windows 8. Last week 10 of your company’s laptops were stolen from a salesman, while at a conference in Barcelona. These laptops contained proprietary company information. While doing a damage assessment, a news story leaks about a blog post containing information about the stolen laptops and the sensitive information.
What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?
- A . You should have used 3DES.
- B . You should have implemented the Distributed File System (DFS).
- C . If you would have implemented Pretty Good Privacy (PGP).
- D . You could have implemented the Encrypted File System (EFS)
Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees.
Which network topology will help the administrator solve the problem of needing to add new employees and expand?
- A . Bus
- B . Star
- C . Ring
- D . Mesh