EC-Council 312-38 Certified Network Defender Online Training
EC-Council 312-38 Online Training
The questions for 312-38 were last updated at May 06,2025.
- Exam Code: 312-38
- Exam Name: Certified Network Defender
- Certification Provider: EC-Council
- Latest update: May 06,2025
Henry needs to design a backup strategy for the organization with no service level downtime.
Which backup method will he select?
- A . Normal backup
- B . Warm backup
- C . Hot backup
- D . Cold backup
James wants to implement certain control measures to prevent denial-of-service attacks against the organization.
Which of the following control measures can help James?
- A . Strong passwords
- B . Reduce the sessions time-out duration for the connection attempts
- C . A honeypot in DMZ
- D . Provide network-based anti-virus
An US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that require a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations.
What RAID level is John considering to meet this requirement?
- A . RAID level 1
- B . RAID level 10
- C . RAID level 5
- D . RAID level 50
An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts.
Which of the following password cracking techniques is the attacker trying?
- A . Bruteforce
- B . Rainbow table
- C . Hybrid
- D . Dictionary
A company wants to implement a data backup method which allows them to encrypt the data ensuring its security as well as access at any time and from any location.
What is the appropriate backup method that
should be implemented?
- A . Onsite backup
- B . Hot site backup
- C . Offsite backup
- D . Cloud backup
If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?
- A . Water
- B . Wet chemical
- C . Dry chemical
- D . Raw chemical
Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server’s data daily to ensure nothing is lost. The power in the company’s office is not always reliable, Kyle needs to make sure the servers do not go down or are without power for too long. Kyle decides to purchase an Uninterruptible Power Supply (UPS) that has a pair of inverters and converters to charge the battery and provides power when needed.
What type of UPS has Kyle purchased?
- A . Kyle purchased a Ferro resonant Standby UPS.
- B . Kyle purchased a Line-Interactive UPS
- C . He has bought a Standby UPS
- D . He purchased a True Online UPS.
Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders.
Which access control did Ross implement?
- A . Discretionary access control
- B . Mandatory access control
- C . Non-discretionary access control
- D . Role-based access control
Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and
out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets.
What is this type of server called?
- A . Bastion host
- B . Edge transport server
- C . SOCKS hsot
- D . Session layer firewall
Larry is responsible for the company’s network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server outside of the company’s internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls.
What logical area is Larry putting the new email server into?
- A . He is going to place the server in a Demilitarized Zone (DMZ)
- B . He will put the email server in an IPsec zone.
- C . Larry is going to put the email server in a hot-server zone.
- D . For security reasons, Larry is going to place the email server in the company’s Logical Buffer Zone (LBZ).