EC-Council 312-38 Exam Questions
Certified Network Defender (Page 15 )

Updated On: 24-Feb-2026

FILL BLANK
Fill in the blank with the appropriate term. ________________is a powerful and low-interaction open source honeypot.

  1. Honeyd

Answer(s): A

Explanation:

Honeyd is a powerful and low-interaction open source honeypot. It was released by Niels Provos in 2002. It was written in C and designed for Unix platforms. It introduced a variety of new concepts, including the ability to monitor millions of unused IPs, IP stack spoofing, etc. It can also simulate hundreds of operating systems and monitor all UDP and TCP-based ports.



Which of the following statements are true about volatile memory? Each correct answer represents a complete solution. Choose all that apply.

  1. Read-Only Memory (ROM) is an example of volatile memory.
  2. The content is stored permanently, and even the power supply is switched off.
  3. The volatile storage device is faster in reading and writing data.
  4. It is computer memory that requires power to maintain the stored information.

Answer(s): C,D

Explanation:

Volatile memory, also known as volatile storage, is computer memory that requires power to maintain the stored information, unlike non-volatile memory which does not require a maintained power supply. It has been less popularly known as temporary memory. Most forms of modern random access memory (RAM) are volatile storage, including dynamic random access memory (DRAM) and static random access memory (SRAM). A volatile storage device is faster in reading and writing data. Answer options B and A are incorrect. Non-volatile memory, nonvolatile memory, NVM, or non-volatile storage, in the most basic sense, is computer memory that can retain the stored information even when not powered. Examples of non-volatile memory include read-only memory, flash memory, most types of magnetic computer storage devices (e.g. hard disks, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.



Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall? Each correct answer represents a complete solution. Choose all that apply.

  1. Circuit-level gateway
  2. Stateful
  3. Proxy server
  4. Dynamic packet-filtering

Answer(s): B,D

Explanation:

A dynamic packet-filtering firewall is a fourth generation firewall technology. It is also known as a stateful firewall. It tracks the state of active connections and determines which network packets are allowed to enter through the firewall. It records session information, such as IP addresses and port numbers to implement a more secure network. The dynamic packet-filtering firewall operates at Layer3, Layer4, and Layer5.
Answer option A is incorrect. A circuit-level gateway is a type of firewall that works at the session layer of the OSI model between the application layer and the transport layer of the TCP/IP stack. They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Information passed to a remote computer through a circuit level gateway appears to have originated from the gateway. This is useful for hiding information about protected networks. Circuit-level gateways are relatively inexpensive and have the advantage of hiding information about the private network they protect.
Answer option C is incorrect. A proxy server firewall intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.



Which of the following statements are NOT true about the FAT16 file system? Each correct answer represents a complete solution. Choose all that apply.

  1. It does not support file-level security.
  2. It works well with large disks because the cluster size increases as the disk partition size increases.
  3. It supports the Linux operating system.
  4. It supports file-level compression.

Answer(s): B,D

Explanation:

The FAT16 file system was developed for disks larger than 16MB. It uses 16-bit allocation table entries. The FAT16 file system supports all Microsoft operating systems. It also supports OS/2 and Linux.
Answer options C and A are incorrect. All these statements are true about the FAT16 file system.



FILL BL ANK
Fill in the blank with the appropriate term. The _____________is used for routing voice conversations over the Internet. It is also known by other names such as IP Telephony, Broadband Telephony, etc.

  1. VoIP

Answer(s): A

Explanation:

The Voice over Internet Protocol (VoIP) is used for routing of voice conversation over the Internet. The VoIP is also known by other names such as IP Telephony, Broadband Telephony, etc. Analog signals are used in telephones in which the sound is received as electrical pulsation, which is amplified and then carried to a small loudspeaker attached to the other phone, and the call receiver can hear the sound. In VoIP, analog signals are changed into digital signals, which are transmitted on the Internet. VoIP is used to make free phone calls using an Internet connection, and this can be done by using any VoIP software available in the market.
There are various modes for making phone calls through the Internet. Some of the important modes are as follows:
Through Analog Telephone Adapter (ATA)
In this mode, the traditional phone is attached to the computer through ATA.
ATA receives analog signals from the phone and then converts these signals to digital signals. The digital signals are then received by the Internet Service Providers (ISP), and the system is ready to make calls over VoIP.

Through IP Phone
IP Phones look exactly like the traditional phones, but they differ in that they have RJ-45 Ethernet connectors, instead of RJ-11 phone connectors, for connecting to the computers.

Computer To Computer
This is the easiest way to use VoIP. For this, we need software, microphone, speakers, sound card and an Internet connection through a cable or a DSL modem.

Soft Phones
Soft phone is a software application that can be loaded onto a computer and used anywhere in the broadband connectivity area.






Post your Comments and Discuss EC-Council 312-38 exam dumps with other Community members:

Join the 312-38 Discussion