Certified Network Defender

Here you have the best ECCouncil 312-38 practice exam questions

  • You have 188 total questions to study from
  • Each page has 5 questions, making a total of 38 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on May 29, 2025
  • This site is not affiliated with or endorsed by ECCouncil.
Question 1 of 188

John works as a C programmer. He develops the following C program:

Exam 312-38 Question 1

His program is vulnerable to a __________ attack.

    Correct Answer: C

    This program takes a user-supplied string and copies it into 'buffer1', which can hold up to 10 bytes of data. If a user supplies a string longer than 10 bytes, it would exceed the allocated space for 'buffer1', resulting in a buffer overflow. Buffer overflow can lead to unpredictable behavior, crashes, or security vulnerabilities, as it allows the user to overwrite the memory adjacent to the buffer.

Question 2 of 188

DRAG DROP -

Drag and drop the terms to match with their descriptions.

Select and Place:

Exam 312-38 Question 2
    Correct Answer:
    Exam 312-38 Question 2

    Following are the terms with their descriptions:

    Exam 312-38 Question 2

    A Trojan horse is a malicious software program that contains hidden code and masquerades itself as a normal program. When a Trojan horse program is run, its hidden code runs to destroy or scramble data on the hard disk. An example of a Trojan horse is a program that masquerades as a computer logon to retrieve user names and password information. The developer of a Trojan horse can use this information later to gain unauthorized access to computers. Trojan horses are normally spread by e-mail attachments. Ping sweep is a technique used to determine which of a range of IP addresses map to live hosts. It consists of ICMP

    ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. A ping is often used to check that a network device is functioning. To disable ping sweeps on a network, administrators can block ICMP ECHO requests from outside sources. However, ICMP TIMESTAMP and ICMP

    INFO can be used in a similar manner. Spamware is software designed by or for spammers to send out automated spam e-mail. Spamware is used to search for e-mail addresses to build lists of e-mail addresses to be used either for spamming directly or to be sold to spammers. The spamware package also includes an e- mail harvesting tool. A backdoor is any program that allows a hacker to connect to a computer without going through the normal authentication process. The main advantage of this type of attack is that the network traffic moves from inside a network to the hacker's computer. The traffic moving from inside a network to the outside world is typically the least restrictive, as companies are more concerned about what comes into a network, rather than what leaves it. It, therefore, becomes hard to detect backdoors.

Question 3 of 188

FILL BLANK -

Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient.

    Correct Answer:

Question 4 of 188

FILL BLANK -

Fill in the blank with the appropriate term. A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.

    Correct Answer:

Question 5 of 188

Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.

    Correct Answer: A, C