Certification Provider: EC-Council
Exam Name: Certified Network Defender
Exam Code: 312-38
Official Exam Time: 240 mins
Number of questions in the Official Exam: 100 Q&As
Latest update time in our database: May 31,2023
312-38 Official Exam Topics:
  • Topic1 : Network Attacks and Defense Strategies
  • Topic2 : Discuss various Regulatory Frameworks, Laws, and Acts / Discuss cryptographic security techniques
  • Topic3 : Discuss various cryptographic algorithms / Discuss effective deployment of network and host-based IDS
  • Topic4 : Understand Window OS and Security Concerns / Discuss and implement various enterprise-level mobile security management Solutions
  • Topic5 : Discuss and implement Application Whitelisting and Blacklisting / Discuss and implement Web Application Firewall (WAF)
  • Topic6 : Discuss the implementation of Encryption of “Data at transit” in Email Delivery / Understand Virtualization Essential Concepts
  • Topic7 : Understand Cloud Computing Fundamentals / Discuss security in Microsoft Azure Cloud
  • Topic8 : Discuss Security in Google Cloud Platform (GCP) / Network Traffic Monitoring and Analysis
  • Topic9 : Perform network monitoring and analysis for suspicious traffic using Wireshark / Discuss centralized log monitoring and analysis
  • Topic10 : Incident Response - 10% / Incident Response and Forensic Investigation
  • Topic11 : Understand the role of first responder in incident response / Learn different Risk Management Frameworks (RMF)
  • Topic12 : Understand the attack surface analysis / Understand and visualize your attack surface
  • Topic13 : Learn to conduct attack simulation /

What is the first step they should do to create the network vulnerability assessment plan?

Smith is an IT technician that has been appointed to his company’s network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed.

What is the first step they should do to create the network vulnerability assessment plan?
A . Their first step is to analyze the data they have currently gathered from the company or interviews.
B . Their first step is to make a hypothesis of what their final findings will be.
C . Their first step is to create an initial Executive report to show the management team.
D . Their first step is the acquisition of required documents, reviewing of security policies and compliance.

Answer: D

At what layer of the OSI model does an IPsec tunnel function on?

Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices.

At what layer of the OSI model does an IPsec tunnel function on?
A . They work on the session layer.
B . They function on either the application or the physical layer.
C . They function on the data link layer
D . They work on the network layer

Answer: D

What are they?

Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor.

What are they? (Select all that apply) Risk factor =………….X……………X………..
A . Vulnerability
B . Impact
C . Attack
D . Threat

Answer: A,B,D

What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?

The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers.

What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?
A . You should run the up2date -d -f -u command
B . You should run the up2data -u command
C . You should run the WSUS -d -f -u command.
D . You should type the sysupdate -d command

Answer: A