New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free 312-38 Certified Network Defender (CND) Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the ECCouncil 312-38 Exam the most current and reliable questions . To help people study, we've made some of our Certified Network Defender (CND) exam materials available for free to everyone. You can take the Free 312-38 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Which of the following best describes the Log Normalization process?

A.

It is a process of accepting logs from homogenous sources with the same formats and converting them into a different format

B.

It is a process of accepting logs from homogenous sources with different formats and converting them into a common format

C.

It is a process of accepting logs from heterogeneous sources with different formats and converting them into a common format

D.

It is a process of accepting logs from heterogeneous sources with the same formats and converting them into a different format

Question # 7

What is composite signature-based analysis?

A.

Multiple packet analysis is required to detect attack signatures

B.

Attack signatures are contained in packet headers

C.

Attack signatures are contained in packet payloads

D.

Single Packet analysis is enough to identify attack signatures

Question # 8

Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any one of the main

nodes fail?

A.

Failure of the main node affects all other child nodes at the same level irrespective of the main node.

B.

Does not cause any disturbance to the child nodes or its tranmission

C.

Failure of the main node will affect all related child nodes connected to the main node

D.

Affects the root node only

Question # 9

The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager

talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed. What is/are the reason(s) Alex is suggesting that James use a differential backup?

(Select all that apply)

A.

Less storage space is required

B.

Father restoration

C.

Slower than a full backup

D.

Faster than a full backup

E.

Less expensive than full backup

Question # 10

Daniel works as a network administrator in an Information Security company. He has just deployed

an IDS in his organization’s network and wants to calculate the false positive rate for his

implementation. Which of the following formulae can he use to so?

A.

False Negative/False Negative+True Positive

B.

False Positive/False Positive+True Negative

C.

True Negative/False Negative+True Positive

D.

False Negative/True Negative+True positive

Question # 11

Which field is not included in the TCP header?

A.

Source IP address

B.

Acknowledgment number

C.

Sequence number

D.

Source Port

Question # 12

Jason has set a firewall policy that allows only a specific list of network services and deny everything else. This strategy is known as a____________.

A.

Default allow

B.

Default deny

C.

Default restrict

D.

Default access

Question # 13

Who acts as an intermediary to provide connectivity and transport services between cloud consumers and providers?

A.

Cloud Auditor

B.

Cloud Broker

C.

Cloud Carrier

D.

Cloud Consultant

Question # 14

Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and

warning signs.

A.

Administrative control

B.

Physical control

C.

Technical control

D.

Environmental control

Question # 15

Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?

A.

Normal backup

B.

Warm backup

C.

Hot backup

D.

Cold backup

Question # 16

Which of the following intrusion detection techniques observes the network for abnormal usage patterns by determining the performance parameters for regular activities and monitoring for actions

beyond the normal parameters?

A.

Signature/Pattern matching

B.

Stateful protocol analysis

C.

None of these

D.

Statistical anomaly detection

Question # 17

Which of the following statements holds true in terms of virtual machines?

A.

Hardware-level virtualization takes place in VMs

B.

All VMs share the host OS

C.

VMs are light weight than container

D.

OS-level virtualization takes place in VMs

Question # 18

Which of the following provides enhanced password protection, secured loT connections, and encompasses stronger encryption techniques?

A.

WPA3

B.

WEP

C.

WPA

D.

WPA2

Question # 19

Which of the following includes examining the probability, impact status, and exposure of risk?

A.

Risk Review

B.

Risk Tracking

C.

Risk Identification

D.

Risk Assessment

Question # 20

Michelle is a network security administrator working in an MNC company. She wants to set a

resource limit for CPU in a container. Which command-line allows Michelle to limit a container to 2

CPUs?

A.

--cpu=“2”

B.

$cpu=“2”

C.

--cpus=“2”

D.

$cpus=“2”

Question # 21

The SOC manager is reviewing logs in AlienVault USM to investigate an intrusion on the network.

Which CND approach is being used?

A.

Preventive

B.

Reactive

C.

Retrospective

D.

Deterrent

Question # 22

Which Internet access policy starts with all services blocked and the administrator enables safe and necessary services individually, which provides maximum security and logs everything, such as system

and network activities?

A.

Internet access policy

B.

Permissive policy

C.

Prudent policy

D.

Paranoid policy

Question # 23

Sam, a network administrator is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. Which filter will he use to view

the traffic?

A.

Tcp.flags==0x000

B.

Tcp.flags==0000x

C.

Tcp.flags==000x0

D.

Tcp.flags==x0000

Question # 24

Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching. Which type of network-based IDS is Sam implementing?

A.

Behavior-based IDS

B.

Anomaly-based IDS

C.

Stateful protocol analysis

D.

Signature-based IDS

Question # 25

Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or

multiple fields?

A.

Automated Field Correlation

B.

Field-Based Approach

C.

Rule-Based Approach

D.

Graph-Based Approach

Question # 26

USB ports enabled on a laptop is an example of____

A.

System Attack Surface

B.

Network Attack Surface

C.

Physical Attack Surface

D.

Software attack Surface

Question # 27

Which category of suspicious traffic signatures includes SYN flood attempts?

A.

Informational

B.

Denial of Service

C.

Reconnaissance

D.

Unauthorized access

Question # 28

Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. Which step should Malone list as the last step in the incident response methodology?

A.

Malone should list a follow-up as the last step in the methodology

B.

Recovery would be the correct choice for the last step in the incident response methodology

C.

He should assign eradication to the last step.

D.

Containment should be listed on Malone's plan for incident response.

Question # 29

John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?

A.

Application layer

B.

Network Interface layer

C.

TCP layer

D.

IP layer

Question # 30

Which among the following is used to limit the number of cmdlets or administrative privileges of administrator, user, or service accounts?

A.

Just Enough Administration (EA)

B.

User Account Control (UAC)

C.

Windows Security Identifier (SID)

D.

Credential Guard

Question # 31

Which among the following filter is used to detect a SYN/FIN attack?

A.

tcp.flags==0x002

B.

tcp.flags==0x004

C.

tcp.flags==0x003

D.

tcp.flags==0x001

Question # 32

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the--------------------------authentication technique to satisfy the

management request.

A.

Two-factor Authentication

B.

Smart Card Authentication

C.

Single-sign-on

D.

Biometric

Question # 33

According to standard loT security practice, loT Gateway should be connected to a -------------

A.

Border router

B.

Secure router

C.

Pouter that is connected to internal servers

D.

Router that is connected to other subnets

Question # 34

John is a senior network security administrator working at a multinational company. He wants to block specific syscalls from being used by container binaries. Which Linux kernel feature restricts actions

within the container?

A.

Cgroups

B.

LSMs

C.

Seccomp

D.

Userns

Question # 35

Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the

network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this

type of server called?

A.

Bastion host

B.

Edge transport server

C.

SOCKS hsot

D.

Session layer firewall

Question # 36

Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?

A.

Contain the damage

B.

Disconnect the five infected devices from the network

C.

Inform the IRT about the incident and wait for their response

D.

Inform everybody in the organization about the attack

Question # 37

Identify the Password Attack Technique in which the adversary attacks cryptographic hash functions based on the probability, that if a hashing process is used for creating a key, then the same is

used for other keys?

A.

Dictionary Attack

B.

Brute Forcing Attack

C.

Hybrid Attack

D.

Birthday Attack

Question # 38

Which encryption algorithm h used by WPA5 encryption?

A.

RC4.TKIP

B.

RC4

C.

AES-GCMP 256

D.

AES-CCMP

Question # 39

Which of the following statement holds true in terms of containers?

A.

Container requires more memory space

B.

Each container runs in its own OS

C.

Container is fully isolated; hence, more secure

D.

Process-level isolation happens; a container in hence less secure

Question # 40

An organization needs to adhere to the______________rules for safeguarding and protecting the electronically stored health information of employees.

A.

HI PA A

B.

PCI DSS

C.

ISEC

D.

SOX

Question # 41

Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized

traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching

through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts

administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?

A.

Snort is the best tool for their situation

B.

They can implement Wireshark

C.

They could use Tripwire

D.

They need to use Nessus

Question # 42

Which of the information below can be gained through network sniffing? (Select all that apply)

A.

Telnet Passwords

B.

Syslog traffic

C.

DNS traffic

D.

Programming errors

Question # 43

Which technique is used in RAID level 0 where the data is split into blocks and written evenly across multiple disks?

A.

Disk mirroring

B.

Disk stripping

C.

Data splitting

D.

Disk partition

Question # 44

The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

A.

RARP

B.

ICMP

C.

DHCP

D.

ARP

Question # 45

Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this,

Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new

employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What

should the new employees answer?

A.

NICs work on the Session layer of the OSI model.

B.

The new employees should say that NICs perform on the Network layer.

C.

They should tell Bryson that NICs perform on the Physical layer

D.

They should answer with the Presentation layer.

Question # 46

Larry is responsible for the company's network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because

it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server

outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls. What

logical area is Larry putting the new email server into?

A.

He is going to place the server in a Demilitarized Zone (DMZ)

B.

He will put the email server in an IPsec zone.

C.

Larry is going to put the email server in a hot-server zone.

D.

For security reasons, Larry is going to place the email server in the company's Logical Buffer Zone (LBZ).

Question # 47

Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on

logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide

solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement

and be network-wide. What type of solution would be best for Lyle?

A.

A NEPT implementation would be the best choice.

B.

To better serve the security needs of his company, Lyle should use a HIDS system.

C.

Lyle would be best suited if he chose a NIPS implementation

D.

He should choose a HIPS solution, as this is best suited to his needs.

Question # 48

The security network team is trying to implement a firewall capable of operating only in the session

layer, monitoring the TCP inter-packet link protocol to determine when a requested session is legitimate

or not. Using the type of firewall,they could be able to intercept the communication, making the

external network see that the firewall is the source, and facing the user, who responds from the outside

is the firewall itself. They are just limiting a requirements previous listed, because they have already

have a packet filtering firewall and they must add a cheap solution that meets the objective. What kind

of firewall would you recommend?

A.

Application Proxies

B.

Packet Filtering with NAT

C.

Circuit Level Gateway

D.

Application Level Gateways

Question # 49

A local bank wants to protect their cardholder data. Which standard should the bark comply with in order to ensure security of this data?

A.

GDPR

B.

HIPAA

C.

SOX

D.

PCI DSS

Question # 50

Under which of the following acts can an international financial institution be prosecuted if it fails to maintain the privacy of its customer’s information?

A.

GLBA

B.

FISMA

C.

DMCA

D.

SOX

Question # 51

Which of the following security models enable strict identity verification for every user or device attempting to access the network resources?

1. Zero-trust network model

2. Castle-and-Moat model

A.

Both 1 and 2

B.

1 only

C.

2 only

D.

None

Question # 52

If a network is at risk from unskilled individuals, what type of threat is this?

A.

External Threats

B.

Structured Threats

C.

Unstructured Threats

D.

Internal Threats

Question # 53

How is the chip-level security of an loT device achieved?

A.

Encrypting JTAC interface

B.

Keeping the device on a that network

C.

Closing insecure network services

D.

Changing the password of the router

Question # 54

Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is

encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________implementation of a VPN.

A.

Full Mesh Mode

B.

Point-to-Point Mode

C.

Transport Mode

D.

Tunnel Mode

Question # 55

Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of

incident in the plan. Unsuccessful scans and probes are at what severity level?

A.

High severity level

B.

Extreme severity level

C.

Mid severity level

D.

Low severity level

Question # 56

Which mobile-use approach allows an organization’s employees to use devices that they are comfortable with and best fits their preferences and work purposes?

A.

BYOD

B.

COPE

C.

COBO

D.

CYOD

Question # 57

Identify the correct statements regarding a DMZ zone:

A.

It is a file integrity monitoring mechanism

B.

It is a Neutral zone between a trusted network and an untrusted network

C.

It serves as a proxy

D.

It includes sensitive internal servers such as database servers

Question # 58

An US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that require a minimum of six drives but will meet high fault tolerance and with a

high speed for the data read and write operations. What RAID level is John considering to meet this requirement?

A.

RAID level 1

B.

RAID level 10

C.

RAID level 5

D.

RAID level 50

Question # 59

Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company could prepare for an external IT security audit. With

suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic

normally recorded by the IDS. What type of detection is this network-based IDS system using?

A.

This network-based IDS system is using anomaly detection.

B.

This network-based IDS system is using dissimilarity algorithms.

C.

This system is using misuse detection.

D.

This network-based IDS is utilizing definition-based detection.

Question # 60

An employee of a medical service company clicked a malicious link in an email sent by an attacker. Suddenly, employees of the company are not able to access billing information or client record as it is

encrypted. The attacker asked the company to pay money for gaining access to their data. Which type of malware attack is described above?

A.

Logic bomb

B.

Rootkits

C.

Trojan

D.

Ransomware

Question # 61

The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.

A.

255.255.255.0

B.

18.12.4.1

C.

172.168.12.4

D.

169.254.254.254

Question # 62

Which of the following provides a set of voluntary recommended cyber security features to include in network-capable loT devices?

A.

GCMA

B.

FCMA

C.

NIST

D.

GLBA

Question # 63

An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to

recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?

312-38 question answer

A.

Location 2

B.

Location 3

C.

Location 4

D.

Location 1

Question # 64

James wants to implement certain control measures to prevent denial-of-service attacks against the organization. Which of the following control measures can help James?

A.

Strong passwords

B.

Reduce the sessions time-out duration for the connection attempts

C.

A honeypot in DMZ

D.

Provide network-based anti-virus

Question # 65

Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an ______for legal advice to defend

them against this allegation.

A.

PR Specialist

B.

Attorney

C.

Incident Handler

D.

Evidence Manager

Question # 66

An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then

upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?

A.

Bruteforce

B.

Rainbow table

C.

Hybrid

D.

Dictionary

Question # 67

-----------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

A.

802.15.4

B.

802.15

C.

802.12

D.

802.16

Question # 68

Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?

A.

ISO/IEC 27004

B.

ISO/IEC 27002

C.

ISO/IEC 27006

D.

ISO/IEC 27005

Question # 69

Which type of firewall consists of three interfaces and allows further subdivision of the systems based on specific security objectives of the organization?

A.

Screened subnet

B.

Bastion host

C.

Unscreened subnet

D.

Multi-homed firewall

Question # 70

The SNMP contains various commands that reduce the burden on the network administrators.

Which of the following commands is used by SNMP agents to notify SNMP managers about an event occurring in the network?

A.

SET

B.

TRAPS

C.

INFORM

D.

RESPONSE

Question # 71

John, who works as a team lead in Zen Technologies, found that his team members were accessing social networking sites, shopping sites and watching movies during office hours. He approached the

network admin to block such websites. What kind of network security device can be used to implement John’s decision?

A.

Firewall

B.

Internet Content Filter

C.

Proxy server

D.

Network Protocol Analyzer

Question # 72

Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?

A.

ESP

B.

AH

C.

IKE

D.

ISAKMP

Question # 73

Which of the following systems includes an independent NAS Head and multiple storage arrays?

A.

Gateway NAS System

B.

FreeNAS

C.

Integrated NAS System

D.

None of these

Question # 74

How is an “attack” represented?

A.

Motive (goal) + method

B.

Motive (goal) + method + vulnerability

C.

Asset + Threat + Vulnerability

D.

Asset + Threat

Question # 75

Which of the following network security protocols protects from sniffing attacks by encrypting entire communication between the clients and server including user passwords?

A.

TACACS+

B.

RADIUS

C.

CHAP

D.

PAP

Question # 76

How can one identify the baseline for normal traffic?

A.

When the ACK flag appears at the beginning and the RST flag appears at the end of the connection

B.

When the SYN flag appears at the beginning and the FIN flag appears at the end of the connection

C.

When the RST flag appears at the beginning and the ACK flag appears at the end of the connection

D.

When the FIN flag appears at the beginning and the SYN flag appears at the end of the connection

Question # 77

In ______ method, event logs are arranged in the form of a circular buffer.

A.

Non-wrapping method

B.

LIFO method

C.

Wrapping method

D.

FIFO method

Question # 78

Jason has set a firewall policy that allows only a specific list of network services and denies everything else. This strategy is known as a ____________.

A.

Default allow

B.

Default access

C.

Default accept

D.

Default deny

Question # 79

Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in the system, which can be exploited by the attackers. Which among the following is the correct syntax for

disabling a service?

A.

$ sudo system-ctl disable [service]

B.

$ sudo systemctl disable [service]

C.

$ sudo system.ctl disable [service]

D.

$ sudo system ctl disable [service]

Question # 80

Implementing access control mechanisms, such as a firewall, to protect the network is an example of which of the following network defense approach?

A.

Proactive approach

B.

Retrospective approach

C.

Preventive approach

D.

Reactive approach

Question # 81

A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access it at any time and from any location. What is the appropriate backup method

that should be implemented?

A.

Cloud backup

B.

Offsite backup

C.

Hot site backup

D.

Onsite backup

Question # 82

Which of the following Layers of IoT Architecture provides dashboards to monitor, analyze, and implement proactive decisions?

A.

Device Layer

B.

Communication Layer

C.

Cloud Layer

D.

Process Layer

Question # 83

Peter works as a network administrator at an IT company. He wants to avoid exploitation of the cloud, particularly Azure services. Which of the following is a group of PowerShell scripts designed to help the network administrator understand how attacks happen and help them protect the cloud?

A.

MicroBurst

B.

POSH -Sysmon

C.

SecurityPolicyDsc

D.

Sysmon

Question # 84

Which type of attack is used to hack an IoT device and direct large amounts of network traffic toward a web server, resulting in overloading the server with connections and preventing any new connections?

A.

XSS

B.

DDoS

C.

XCRF

D.

Sniffing

Question # 85

Which of the following information security standards defines security policies, technologies and ongoing processes for organizations that handle cardholder information for debit, credit, prepaid, epurse, ATM, and POS cards?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Payment Card Industry Data Security Standard (PCI-DSS)

C.

Information Security Acts: Gramm-Leach-Bliley Act (GLBA)

D.

Information Security Acts: Sarbanes Oxley Act (SOX)

Question # 86

John has implemented________in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.

A.

DMZ

B.

Proxies

C.

VPN

D.

NAT

Question # 87

Patrick wants to change the file permission of a file with permission value 755 to 744. He used a Linux command chmod [permission Value] [File Name] to make these changes. What will be the change

in the file access?

A.

He changed the file permission from rwxr-xr-x to rwx-r--r--

B.

He changes the file permission from rwxr-xr-x to rw-rw-rw-

C.

He changed the file permission from rw------- to rw-r--r--

D.

He changed the file permission from rwxrwxrwx to rwx------

Question # 88

John has been working a* a network administrator at an IT company. He wants to prevent misuse of accounts by unauthorized users. He wants to ensure that no accounts have empty passwords. Which of the following commands does John use to list all the accounts with an empty password?

A.

312-38 question answer

B.

312-38 question answer

C.

312-38 question answer

D.

312-38 question answer

Question # 89

Which authorization lets users access a requested resource on behalf of others?

A.

Explicit Authorization

B.

Decentralized Authorization

C.

Implicit Authorization

D.

Centralized Authorization

Question # 90

Identify the password cracking attempt involving precomputed hash values stored as plaintext and using these to crack the password.

A.

Bruteforce

B.

Rainbow table

C.

Dictionary

D.

Hybrid

Question # 91

Katie has implemented the RAID level that split data into blocks and evenly write the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of________in order to

setup.

A.

Four drives

B.

Three drives

C.

Two drives

D.

Six drives

Question # 92

Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?

A.

High-interaction honeypots

B.

Pure honeypots

C.

Research honeypot

D.

Low-interaction honeypots

Question # 93

Which of the following standards does a cloud service provider has to comply with, to protect the privacy of its customer’s personal information?

A.

ISO/IEC 27018

B.

ISO/IEC 27019

C.

ISO/IEC 27020

D.

ISO/IEC 27021

Question # 94

Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP

addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?

A.

Steven should use a Demilitarized Zone (DMZ)

B.

Steven should use Open Shortest Path First (OSPF)

C.

Steven should use IPsec

D.

Steven should enabled Network Address Translation(NAT)

Question # 95

Which firewall technology can be implemented in all (application, session, transport, network, and presentation) layers of the OSl model?

A.

Circuit-level gateway

B.

Network address translation

C.

VPN

D.

Packet filtering

Question # 96

Maximus Tech Is a multinational company that uses Cisco ASA Firewalls for their systems. Jason is the one of the members of the team that checks the logs at Maximus Tech. As a part of his job. he is going through me logs and he came across a firewall log that looks like this:

May 06 2018 21:27:27 asa 1: % ASA -6-11008: User enable_16' executed the 'configure term' command

Based on the security level mentioned in the log, what did Jason understand about the description of this message?

A.

Normal but significant message

B.

Informational message

C.

Critical condition message

D.

Warning condition message

Question # 97

Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.

A.

Fabric virtualization

B.

Storage device virtualization

C.

Server virtualization

D.

File system virtualization

Question # 98

Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?

A.

Eastbound API

B.

Northbound API

C.

Southbound API

D.

Westbound API

Question # 99

Arman transferred some money to his friend’s account using a net banking service. After a few hours, his friend informed him that he hadn’t received the money yet. Arman logged on to the bank’s website to investigate and discovered that the amount had been transferred to an unknown account instead. The bank, upon receiving Arman’s complaint, discovered that someone had established a station between Arman’s and the bank server’s communication system. The station intercepted the communication and inserted another account number replacing his friend’s account number. What is

such an attack called?

A.

Privilege Escalation

B.

DNS Poisoning

C.

Man-in-the-Middle Attack

D.

DNS Cache Poisoning

Question # 100

The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of

following physical security measures should the administrator use?

A.

Bollards

B.

Fence

C.

Video surveillance

D.

Mantrap

Question # 101

Which of the following is a database encryption feature that secures sensitive data by encrypting it in client applications without revealing the encrypted keys to the data engine in MS SQL Server?

A.

IsEncrypted Enabled

B.

NeverEncrypted disabled

C.

Allow Encrypted

D.

Always Encrypted

Question # 102

Identify the attack where an attacker manipulates or tricks people into revealing their confidential details like bank account information, credit card details, etc.?

A.

Social Engineering Attacks

B.

Port Scanning

C.

DNS Footprinting

D.

ICMP Scanning

Question # 103

Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?

A.

Application sandboxing

B.

Deployment of WAFS

C.

Application whitelisting

D.

Application blacklisting

Question # 104

Rosa is working as a network defender at Linda Systems. Recently, the company migrated from Windows to MacOS. Rosa wants to view the security related logs of her system, where con she find these logs?

A.

/private/var/log

B.

/var/log/cups/access-log

C.

/Library/Logs/Sync

D.

/Library/Logs

Question # 105

Hacktivists are threat actors, who can be described as -------------------

A.

People motivated by religious beliefs

B.

Disgruntled/terminated employees

C.

People motivated by monetary gams

D.

People having political or social agenda

Question # 106

Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?

A.

The data link layer

B.

The session layer

C.

The network layer

D.

The application and physical layers

Question # 107

How is the chip-level security of an IoT device achieved?

A.

By closing insecure network services

B.

By turning off the device when not needed or not in use

C.

By encrypting the JTAG interface

D.

By changing the password of the router

Question # 108

Which event type indicates a significant problem such as loss of data or loss of functionality?

A.

Error

B.

Warning

C.

Information

D.

Failure Audit

312-38 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

312-38 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Certified Network Defender (CND)
  • Last Update: Dec 14, 2025
  • Questions and Answers: 362
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

312-38 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included