312 38 Demo
312 38 Demo
Eccouncil
312-38 Exam
Certified Network Defender 2023
https://www.certshero.com/312-38.html
https://www.certshero.com
Questions & Answers PDF Page 2
Version: 11.0
Question: 1
Management decides to implement a risk management system to reduce and maintain the
organization's risk at an acceptable level. Which of the following is the correct order in the risk
management phase?
A. Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review
B. Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk Assessment
C. Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk Identification
D. Risk Identification. Risk Assessment. Risk Monitoring & Review, Risk Treatment
Answer: A
Explanation:
Question: 2
John has implemented________in the network to restrict the limit of public IP addresses in his
organization and to enhance the firewall filtering technique.
A. DMZ
B. Proxies
C. VPN
D. NAT
Answer: D
Explanation:
Question: 3
Answer: C
https://www.certshero.com
Questions & Answers PDF Page 3
Explanation:
Question: 4
Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1
and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any
one of the main
nodes fail?
A. Failure of the main node affects all other child nodes at the same level irrespective of the main
node.
B. Does not cause any disturbance to the child nodes or its tranmission
C. Failure of the main node will affect all related child nodes connected to the main node
D. Affects the root node only
Answer: C
Explanation:
Question: 5
Stephanie is currently setting up email security so all company data is secured when passed through
email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next,
she needs to
ensure that the incoming and the outgoing mail has not been modified or altered using digital
signatures. What is Stephanie working on?
A. Confidentiality
B. Availability
C. Data Integrity
D. Usability
Answer: C
Explanation:
https://www.certshero.com
Questions & Answers PDF Page 4
https://www.certshero.com/312-38.html
https://www.certshero.com