312-38 Certified Network Defender exam is a hot EC-Council certification exam, Exam4Training offers you the latest free online 312-38 dumps to practice. You can get online training in the following questions, all these questions are verified by EC-Council experts. If this exam changed, we will share new update questions.
Certification Provider: EC-Council Exam Name: Certified Network Defender Exam Code: 312-38 Official Exam Time: 240 mins Number of questions in the Official Exam: 100 Q&As Latest update time in our database: May 31,2023 312-38 Official Exam Topics:
Topic1 : Network Attacks and Defense Strategies
Topic2 : Discuss various Regulatory Frameworks, Laws, and Acts / Discuss cryptographic security techniques
Topic3 : Discuss various cryptographic algorithms / Discuss effective deployment of network and host-based IDS
Topic4 : Understand Window OS and Security Concerns / Discuss and implement various enterprise-level mobile security management Solutions
Topic5 : Discuss and implement Application Whitelisting and Blacklisting / Discuss and implement Web Application Firewall (WAF)
Topic6 : Discuss the implementation of Encryption of “Data at transit” in Email Delivery / Understand Virtualization Essential Concepts
Topic7 : Understand Cloud Computing Fundamentals / Discuss security in Microsoft Azure Cloud
Topic8 : Discuss Security in Google Cloud Platform (GCP) / Network Traffic Monitoring and Analysis
Topic9 : Perform network monitoring and analysis for suspicious traffic using Wireshark / Discuss centralized log monitoring and analysis
Smith is an IT technician that has been appointed to his company’s network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed.
What is the first step they should do to create the network vulnerability assessment plan? A . Their first step is to analyze the data they have currently gathered from the company or interviews. B . Their first step is to make a hypothesis of what their final findings will be. C . Their first step is to create an initial Executive report to show the management team. D . Their first step is the acquisition of required documents, reviewing of security policies and compliance.
If a network is at risk from unskilled individuals, what type of threat is this? A . External Threats B . Structured Threats C . Unstructured Threats D . Internal Threats
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices.
At what layer of the OSI model does an IPsec tunnel function on? A . They work on the session layer. B . They function on either the application or the physical layer. C . They function on the data link layer D . They work on the network layer
Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor.
What are they? (Select all that apply) Risk factor =………….X……………X……….. A . Vulnerability B . Impact C . Attack D . Threat
A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines.
What are the other f unction(s) of the device? (Select all that apply) A . Provides access memory, achieving high efficiency B . Assigns user addresses C . Enables input/output (I/O) operations D . Manages security keys
Mark is monitoring the network traffic on his organization’s network. He wants to detect a TCP and UDP ping sweep on his network.
Which type of filter will be used to detect this on the network? A . Tcp.srcport==7 and udp.srcport==7 B . Tcp.srcport==7 and udp.dstport==7 C . Tcp.dstport==7 and udp.srcport==7 D . Tcp.dstport==7 and udp.dstport==7
The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers.
What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages? A . You should run the up2date -d -f -u command B . You should run the up2data -u command C . You should run the WSUS -d -f -u command. D . You should type the sysupdate -d command
Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office.
What layer of the OSI model do IPsec tunnels function on? A . The data link layer B . The session layer C . The network layer D . The application and physical layers