Pass4itsure > EC-COUNCIL > Certified Ethical Hacker > 312-38 > 312-38 Online Practice Questions and Answers

312-38 Online Practice Questions and Answers

Questions 4

Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?

A. SuperScan

B. Netscan

C. Hping

D. Nmap

Buy Now
Questions 5

Which of the following tool is used for passive attacks to capture network traffic?

A. Intrusion prevention system

B. Intrusion detection system

C. Sniffer

D. warchalking

E. None

Buy Now
Questions 6

What is needed for idle scan a closed port the next steps? Each correct answer represents a part of the solution. Choose all that apply.

A. Zombie ignores unsolicited RST, and IP ID remains unchanged.

B. The attacker sends a SYN/ACK zombie.

C. In response to the SYN, the target to send RST.

D. Zombie IP ID will increase by only 1.

E. Zombie IP ID 2 rises.

Buy Now
Questions 7

Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?

A. Preventative

B. Reactive

C. Retrospective

D. Defense-in-depth

Buy Now
Questions 8

Which of the following helps in viewing account activity and events for supported services made by AWS?

A. AWS CloudFormation

B. AWS Certificate Manager

C. AWS CloudHSM

D. AWS CloudTrial

Buy Now
Questions 9

Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and warning signs.

A. Technical control

B. Environmental control

C. Physical control

D. Administrative control

Buy Now
Questions 10

An attacker has access to password hashes of a windows 7 computer. Which of the following attacks can the attacker use to reveal the passwords?

A. XSS

B. Rainbow table

C. Brute force

D. Dictionary attacks

Buy Now
Questions 11

Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?

A. Verification

B. Mitigation

C. Remediation

D. Assessment

Buy Now
Questions 12

A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other function(s) of the device? (Choose all that apply.)

A. Enables input/output (I/O) operations

B. Provides access memory, achieving high efficiency

C. Manages security keys

D. Assigns user addresses

Buy Now
Questions 13

Which of the following protocols is a method for implementing virtual private networks?

A. SSL

B. PPTP

C. TLS

D. SNMP

Buy Now
Exam Code: 312-38
Exam Name: Certified Network Defender (CND)
Last Update: Apr 13, 2024
Questions: 653
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99