312-38 CND Certification Sample Questions

CND Dumps, 312-38 Dumps, 312-38 PDF, CND VCE, EC-Council 312-38 VCEThe purpose of this Sample Question Set is to provide you with information about the EC-Council Certified Network Defender exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the 312-38 certification test. To get familiar with real exam environment, we suggest you try our Sample EC-Council CND Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual EC-Council Certified Network Defender (CND) certification exam.

These sample questions are simple and basic questions that represent likeness to the real EC-Council 312-38 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium EC-Council CND Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

EC-Council 312-38 Sample Questions:

01. Which of the following is a symmetric 64-bit block cipher that can support key lengths up to 448 bits?
a) HAVAL
b) BLOWFISH
c) IDEA
d) XOR
 
02. The IP addresses reserved for experimental purposes belong to which of the following classes?
a) Class E
b) Class C
c) Class A
d) Class D
 
03. Which of the following is a mandatory password-based and key-exchange authentication protocol?
a) PPP
b) CHAP
c) VRRP
d) DH-CHAP
 
04. CSMA/CD is specified in which of the following IEEE standards?
a) 802.3
b) 802.2
c) 802.1
d) 802.15
 
05. Which of the following cables is made of glass or plastic and transmits signals in the form of light?
a) Coaxial cable
b) Twisted pair cable
c) Plenum cable
d) Fiber optic cable
 
06. What is the bit size of the Next Header field in the IPv6 header format?
a) 2 bits
b) 4 bits
c) 8 bits
d) 20 bits
 
07. Attacks are classified into which of the following?
a) Active attack
b) Session hijacking
c) Passive attack
d) Replay attack
 
08. How many layers are present in the OSI layer model?
a) 5
b) 4
c) 7
d) 9
 
09. Which of the following is one of the most commonly used implementations of RAID?
a) RAID 2
b) RAID 3
c) RAID 1
d) RAID 5
 
10. In which of the following conditions does the system enter ROM monitor mode?
a) The router does not have a configuration file.
b) There is a need to set operating parameters.
c) The user interrupts the boot sequence.
d) The router does not find a valid operating system image.

Answers:

Question: 01
Answer: b
Question: 02
Answer: a
Question: 03
Answer: d
Question: 04
Answer: a
Question: 05
Answer: d
Question: 06
Answer: c
Question: 07
Answer: a, c
Question: 08
Answer: c
Question: 09
Answer: d
Question: 10
Answer: c, d

Note: For any error in EC-Council Certified Network Defender (CND) (312-38) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 4.6 / 5 (48 votes)