Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-38 Exam Dumps - ECCouncil CND Questions and Answers

Question # 64

Leslie, the network administrator of Livewire Technologies, has been recommending multilayer inspection firewalls to deploy the company’s infrastructure. What layers of the TCP/IP model can it protect?

Options:

A.

Network interface, TCP, and IP

B.

Application, TCP, and IP

C.

IP. application, and network interface

D.

Application, IP, and network interface

Buy Now
Question # 65

Which among the following tools can help in identifying IoEs to evaluate human attack surface?

Options:

A.

securiCAD

B.

Amass

C.

Skybox

D.

SET

Buy Now
Question # 66

Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. Which step should Malone list as the last step in the incident response methodology?

Options:

A.

Malone should list a follow-up as the last step in the methodology

B.

Recovery would be the correct choice for the last step in the incident response methodology

C.

He should assign eradication to the last step.

D.

Containment should be listed on Malone's plan for incident response.

Buy Now
Question # 67

What is the name of the authority that verifies the certificate authority in digital certificates?

Options:

A.

Directory management system

B.

Certificate authority

C.

Registration authority

D.

Certificate Management system

Buy Now
Question # 68

What cryptography technique can encrypt small amounts of data and applies it to digital signatures?

Options:

A.

Hashing

B.

Asymmetric encryption

C.

Symmetric encryption

D.

Digital certificates

Buy Now
Question # 69

Which of the following best describes the Log Normalization process?

Options:

A.

It is a process of accepting logs from homogenous sources with the same formats and converting them into a different format

B.

It is a process of accepting logs from homogenous sources with different formats and converting them into a common format

C.

It is a process of accepting logs from heterogeneous sources with different formats and converting them into a common format

D.

It is a process of accepting logs from heterogeneous sources with the same formats and converting them into a different format

Buy Now
Question # 70

Peter works as a network administrator at an IT company. He wants to avoid exploitation of the cloud, particularly Azure services. Which of the following is a group of PowerShell scripts designed to help the network administrator understand how attacks happen and help them protect the cloud?

Options:

A.

MicroBurst

B.

POSH -Sysmon

C.

SecurityPolicyDsc

D.

Sysmon

Buy Now
Question # 71

John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is

called a________and it has to adhere to the_________

Options:

A.

Verification, Security Policies

B.

Mitigation, Security policies

C.

Vulnerability scanning, Risk Analysis

D.

Risk analysis, Risk matrix

Buy Now
Question # 72

A local bank wants to protect their cardholder data. Which standard should the bark comply with in order to ensure security of this data?

Options:

A.

GDPR

B.

HIPAA

C.

SOX

D.

PCI DSS

Buy Now
Question # 73

What should a network administrator perform to execute/test the untrusted or untested programs or code from untrusted or unverified third-parties without risking the host system or OS?

Options:

A.

Application Whitelisting

B.

Application Blacklisting

C.

Deployment of WAFs

D.

Application Sandboxing

Buy Now
Exam Code: 312-38
Exam Name: Certified Network Defender (CND)
Last Update: Mar 9, 2025
Questions: 362
312-38 pdf

312-38 PDF

$25.5  $84.99
312-38 Engine

312-38 Testing Engine

$28.5  $94.99
312-38 PDF + Engine

312-38 PDF + Testing Engine

$40.5  $134.99