ECCouncil 312-38 - Certified Network Defender Exam
Page: 1 / 124
Total 617 questions
Question #1 (Topic: Single Topic)
John works as a C programmer. He develops the following C program:

His program is vulnerable to a __________ attack.

His program is vulnerable to a __________ attack.
A. SQL injection
B. Denial-of-Service
C. Buffer overflow
D. Cross site scripting
Answer: C
Question #2 (Topic: Single Topic)
DRAG DROP
Drag and drop the terms to match with their descriptions.
Select and Place:

Drag and drop the terms to match with their descriptions.
Select and Place:

Answer:

Question #3 (Topic: Single Topic)
FILL BLANK
Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and
multi-connection technologies in order to be very fast and efficient.
Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and
multi-connection technologies in order to be very fast and efficient.
Answer: NetRanger
Question #4 (Topic: Single Topic)
FILL BLANK
Fill in the blank with the appropriate term. A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or
behavioral traits.
Fill in the blank with the appropriate term. A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or
behavioral traits.
Answer: biometric
Question #5 (Topic: Single Topic)
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer
represents a complete solution. Choose all that apply.
represents a complete solution. Choose all that apply.
A. Wireless sniffer
B. Spectrum analyzer
C. Protocol analyzer
D. Performance Monitor
Answer: AC