Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

312-38 ECCouncil Certified Network Defender (CND) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil 312-38 Certified Network Defender (CND) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 6
Total 362 questions

Identify the attack signature analysis technique carried out when attack signatures are contained in packet headers.

A.

Atomic signature-based analysis

B.

Context-based signature analysis

C.

Composite signature-based analysis

D.

Content-based signature analysis

Which command is used to change the permissions of a file or directory?

A.

rmdir

B.

systemctl

C.

kill

D.

chmod

Which of the following is a drawback of traditional perimeter security?

A.

Traditional firewalls are static in nature

B.

Traditional VPNs follow identity centric instead of trust based network centric approach

C.

Traditional perimeter security is identity-centric

D.

Traditional firewalls are dynamic in nature

Which among the following options represents professional hackers with an aim of attacking systems for profit?

A.

Script kiddies

B.

Organized hackers

C.

Hacktivists

D.

Cyber terrorists

John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of

implementing?

A.

Application level gateway

B.

Stateful Multilayer Inspection

C.

Circuit level gateway

D.

Packet Filtering

The CEO of Max Rager wants to send a confidential message regarding the new formula for its coveted soft drink, SuperMax, to its manufacturer in Texas. However, he fears the message could be altered in

transit. How can he prevent this incident from happening and what element of the message ensures the success of this method?

A.

Hashing; hash code

B.

Symmetric encryption; secret key

C.

Hashing; public key

D.

Asymmetric encryption; public key

Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in the system, which can be exploited by the attackers. Which among the following is the correct syntax for

disabling a service?

A.

$ sudo system-ctl disable [service]

B.

$ sudo systemctl disable [service]

C.

$ sudo system.ctl disable [service]

D.

$ sudo system ctl disable [service]

Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?

A.

Contain the damage

B.

Disconnect the five infected devices from the network

C.

Inform the IRT about the incident and wait for their response

D.

Inform everybody in the organization about the attack

Implementing access control mechanisms, such as a firewall, to protect the network is an example of which of the following network defense approach?

A.

Proactive approach

B.

Retrospective approach

C.

Preventive approach

D.

Reactive approach

Identify the minimum number of drives required to setup RAID level 5.

A.

Multiple

B.

3

C.

4

D.

2

Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?

A.

Assign eradication.

B.

Recovery

C.

Containment

D.

A follow-up.

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

A.

Pipe Model

B.

AAA model

C.

Hub-and-Spoke VPN model

D.

Hose mode

Which of the following systems includes an independent NAS Head and multiple storage arrays?

A.

Gateway NAS System

B.

FreeNAS

C.

Integrated NAS System

D.

None of these

The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob

wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header. What mode of ESP does Jacob need to use to encrypt the IP traffic?

A.

He should use ESP in transport mode.

B.

Jacob should utilize ESP in tunnel mode.

C.

Jacob should use ESP in pass-through mode.

D.

He should use ESP in gateway mode

What is Azure Key Vault?

A.

It is secure storage for the keys used to encrypt data at rest in Azure services

B.

It is secure storage for the keys used to encrypt data in motion in Azure services

C.

It is secure storage for the keys used to encrypt data in use in Azure services

D.

It is secure storage for the keys used to configure IAM in Azure services

Which of the following DDoS attacks overloads a service by sending inundate packets?

A.

Network-centric attack

B.

Application-centric attack

C.

Web-centric attack

D.

System-centric attack

Which of the following filters car be applied to detect an ICMP ping sweep attempt using Wireshark?

A.

icmp.type==8

B.

icmp.type==13

C.

icmp.type==17

D.

icmp.type==15

Match the following NIST security life cycle components with their activities:

A.

1-ii, 2-i, 3-v, 4-iv

B.

1-iii, 2-iv, 3-v, 4-i

C.

1-iv, 2-iii, 3-v, 4-i

D.

1-i, 2-v, 3-iii, 4-ii

Identify the firewall technology that monitors the TCP handshake between the packets to determine whether a requested session is legitimate.

A.

Packet Filtering Firewall

B.

Stateful Multilayer Inspection

C.

Circuit Level Gateway

D.

Network Address Translation

Tom works as a network administrator in a multinational organization having branches across North America and Europe. Tom wants to implement a storage technology that can provide centralized data storage and

provide free data backup on the server. He should be able to perform data backup and recovery more efficiently with the selected technology. Which of the following storage technologies best suits Tom's requirements?

A.

DAS

B.

PAS

C.

RAID

D.

NAS

Page: 4 / 6
Total 362 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved