EC-Council CND (312-38) Certification Sample Questions

CND Dumps, 312-38 Dumps, 312-38 PDF, CND VCE, EC-Council 312-38 VCE, EC-Council CND v3 PDFThe purpose of this Sample Question Set is to provide you with information about the EC-Council Certified Network Defender exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the 312-38 certification test. To get familiar with real exam environment, we suggest you try our Sample EC-Council CND Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual EC-Council Certified Network Defender (CND) certification exam.

These sample questions are simple and basic questions that represent likeness to the real EC-Council 312-38 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium EC-Council CND Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

EC-Council 312-38 Sample Questions:

01. A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access it at any time and from any location. What is the appropriate backup method that should be implemented?
a) Cloud backup
b) Hot site backup
c) Offsite backup
d) Onsite backup
 
02. How is application whitelisting different from application blacklisting?
a) It allows all applications other than the undesirable applications
b) It allows execution of trusted applications in a unified environment
c) It rejects all applications other than the allowed applications
d) It allows execution of untrusted applications in an isolated environment
 
03. Mark is monitoring the network traffic on his organization's network. He wants to detect TCP and UDP ping sweeps on his network. Which type of filter will be used to detect this?
a) tcp.dstport==7 and udp.srcport==7
b) tcp.srcport==7 and udp.dstport==7
c) tcp.dstport==7 and udp.dstport==7
d) tcp.srcport==7 and udp.srcport==7
 
04. Which among the following tools can help in identifying IoEs to evaluate human attack surface?
a) Amass
b) securiCAD
c) SET
d) Skybox
 
05. Which firewall can a network administrator use for better bandwidth management, deep packet inspection, and Hateful inspection?
a) Next generation firewall
b) Circuit-level gateway firewall
c) Network address translation
d) Stateful muIti-layer inspection firewall
 
06. Which of the following is a database encryption feature that secures sensitive data by encrypting it in client applications without revealing the encrypted keys to the data engine in MS SQL Server?
a) IsEncrypted Enabled
b) Allow Encrypted
c) Always Encrypted
d) NeverEncrypted disabled
 
07. Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
a) Nmap
b) Hping
c) NetRanger
d) PSAD
 
08. Which of the following refers to the data that is stored or processed by RAM, CPUs, or databases?
a) Data in Use
b) Data at Rest
c) Data in Transit
d) Data in Backup
 
09. Which risk management phase helps in establishing context and quantifying risks?
a) Risk treatment
b) Risk Identification
c) Risk assessment
d) Risk review
 
10. An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both detect and stop malicious traffic?
a) promiscuous mode
b) passive mode
c) firewall mode
d) inline mode

Answers:

Question: 01
Answer: a
Question: 02
Answer: c
Question: 03
Answer: d
Question: 04
Answer: b
Question: 05
Answer: a
Question: 06
Answer: c
Question: 07
Answer: d
Question: 08
Answer: a
Question: 09
Answer: c
Question: 10
Answer: d

Note: For any error in EC-Council Certified Network Defender (CND) (312-38) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 4.8 / 5 (311 votes)