Eccouncil 312 38 Certified Network Defender Practice Test - Set 1
Test your knowledge with this Eccouncil 312 38 Certified Network Defender mock exam. Get real-world IT questions and prepare for certification success.
312-38: Certified Network Defender (C|ND) - Exam Information
Exam Information
Exam Code
Eccouncil 312 38 Certified Network Defender
Exam Title
312-38: Certified Network Defender (C|ND)
Vendor
EC Council
Difficulty
Intermediate
Duration
4 Hours
Question Format
Multiple Choice
Last Updated
March 8, 2025
The 312-38 exam assesses network security defense skills to prevent, detect, and respond to threats.
69. Which protocol is used for secure ICMP communications?
There is no secure ICMP
IPSec
TLS
SSH
✅ Correct Answer: There is no secure ICMP
70. What is the primary purpose of Router Advertisement Guard?
To prevent rogue IPv6 routers
To encrypt router advertisements
To authenticate router advertisements
To filter router advertisements
✅ Correct Answer: To prevent rogue IPv6 routers
71. Which security control prevents DNS tunneling?
DNS filtering
DNSSEC
DNS caching
DNS load balancing
✅ Correct Answer: DNS filtering
72. What is the purpose of Flexible NetFlow?
To monitor network traffic patterns
To encrypt network flows
To authenticate network flows
To filter network flows
✅ Correct Answer: To monitor network traffic patterns
73. Which protocol is used for secure NetFlow communications?
NetFlow over TLS
SNMP
TFTP
FTP
✅ Correct Answer: NetFlow over TLS
74. What is the primary purpose of sFlow?
To sample network traffic
To encrypt network samples
To authenticate network samples
To filter network samples
✅ Correct Answer: To sample network traffic
75. Which security control prevents MAC spoofing?
Port security
VLANs
Firewalls
VPNs
✅ Correct Answer: Port security
76. What is the purpose of NetFlow Top Talkers?
To identify high-bandwidth users
To encrypt top talker traffic
To authenticate top talkers
To filter top talker traffic
✅ Correct Answer: To identify high-bandwidth users
77. Which protocol is used for secure CDP communications?
There is no secure CDP
LLDP
SNMPv3
SSH
✅ Correct Answer: There is no secure CDP
78. What is the primary purpose of LLDP?
To discover neighboring devices
To encrypt discovery traffic
To authenticate neighboring devices
To filter discovery packets
✅ Correct Answer: To discover neighboring devices
79. Which security control prevents STP manipulation?
BPDU Guard
Root Guard
Port security
VLANs
✅ Correct Answer: BPDU Guard
80. What is the purpose of VTP pruning?
To optimize VLAN traffic
To encrypt VTP updates
To authenticate VTP servers
To filter VTP advertisements
✅ Correct Answer: To optimize VLAN traffic
81. Which protocol is used for secure VTP communications?
There is no secure VTP
VTP over TLS
VTP over SSH
VTP over IPSec
✅ Correct Answer: There is no secure VTP
82. What is the primary purpose of EtherChannel?
To bundle multiple links
To encrypt inter-switch traffic
To authenticate switch peers
To filter inter-switch traffic
✅ Correct Answer: To bundle multiple links
83. Which security control prevents VTP attacks?
Disabling VTP
VTP passwords
VLANs
Firewalls
✅ Correct Answer: Disabling VTP
84. What is the purpose of UDLD?
To detect unidirectional links
To encrypt link detection
To authenticate link peers
To filter link state packets
✅ Correct Answer: To detect unidirectional links
85. Which protocol is used for secure UDLD communications?
There is no secure UDLD
UDLD over TLS
UDLD over SSH
UDLD over IPSec
✅ Correct Answer: There is no secure UDLD
86. What is the primary purpose of HSRP?
To provide router redundancy
To encrypt routing updates
To authenticate router peers
To filter routing advertisements
✅ Correct Answer: To provide router redundancy
87. Which security control prevents HSRP attacks?
HSRP authentication
VLANs
Firewalls
VPNs
✅ Correct Answer: HSRP authentication
88. What is the purpose of GLBP?
To load balance across gateways
To encrypt gateway traffic
To authenticate gateway peers
To filter gateway advertisements
✅ Correct Answer: To load balance across gateways
89. Which protocol is used for secure GLBP communications?
There is no secure GLBP
GLBP over TLS
GLBP over SSH
GLBP over IPSec
✅ Correct Answer: There is no secure GLBP
90. What is the primary purpose of VRRP?
To provide router redundancy
To encrypt routing updates
To authenticate router peers
To filter routing advertisements
✅ Correct Answer: To provide router redundancy
91. Which security control prevents VRRP attacks?
VRRP authentication
VLANs
Firewalls
VPNs
✅ Correct Answer: VRRP authentication
92. What is the purpose of PAgP?
To negotiate EtherChannel
To encrypt port aggregation
To authenticate switch peers
To filter aggregated traffic
✅ Correct Answer: To negotiate EtherChannel
93. Which protocol is used for secure PAgP communications?
There is no secure PAgP
PAgP over TLS
PAgP over SSH
PAgP over IPSec
✅ Correct Answer: There is no secure PAgP
94. What is the primary purpose of LACP?
To bundle multiple links
To encrypt inter-switch traffic
To authenticate switch peers
To filter inter-switch traffic
✅ Correct Answer: To bundle multiple links
95. Which security control prevents LACP attacks?
LACP rate limiting
VLANs
Firewalls
VPNs
✅ Correct Answer: LACP rate limiting
96. What is the purpose of DTP?
To negotiate trunk links
To encrypt trunk traffic
To authenticate trunk peers
To filter trunk traffic
✅ Correct Answer: To negotiate trunk links
97. Which protocol is used for secure DTP communications?
There is no secure DTP
DTP over TLS
DTP over SSH
DTP over IPSec
✅ Correct Answer: There is no secure DTP
98. What is the primary purpose of MSTP?
To optimize spanning tree for multiple VLANs
To encrypt spanning tree traffic
To authenticate spanning tree peers
To filter spanning tree updates
✅ Correct Answer: To optimize spanning tree for multiple VLANs
99. Which security control prevents MSTP attacks?
Root Guard
BPDU Guard
Port security
VLANs
✅ Correct Answer: Root Guard
100. What is the purpose of RSTP?
To speed up spanning tree convergence
To encrypt spanning tree traffic
To authenticate spanning tree peers
To filter spanning tree updates
✅ Correct Answer: To speed up spanning tree convergence
101. Which protocol is used for secure RSTP communications?
There is no secure RSTP
RSTP over TLS
RSTP over SSH
RSTP over IPSec
✅ Correct Answer: There is no secure RSTP
102. What is the primary purpose of PVST+?
To run STP per VLAN
To encrypt spanning tree traffic
To authenticate spanning tree peers
To filter spanning tree updates
✅ Correct Answer: To run STP per VLAN
103. Which security control prevents PVST+ attacks?
BPDU Guard
Root Guard
Port security
VLANs
✅ Correct Answer: BPDU Guard
104. What is the purpose of SPAN?
To mirror network traffic
To encrypt monitored traffic
To authenticate monitoring devices
To filter monitored traffic
✅ Correct Answer: To mirror network traffic
105. Which protocol is used for secure SPAN communications?
There is no secure SPAN
SPAN over TLS
SPAN over SSH
SPAN over IPSec
✅ Correct Answer: There is no secure SPAN
106. What is the primary purpose of RSPAN?
To mirror traffic across switches
To encrypt remote monitoring
To authenticate remote monitors
To filter remote monitoring
✅ Correct Answer: To mirror traffic across switches
107. Which security control prevents RSPAN attacks?
VLAN ACLs
Port security
Firewalls
VPNs
✅ Correct Answer: VLAN ACLs
108. What is the purpose of ERSPAN?
To mirror traffic across routers
To encrypt encapsulated monitoring
To authenticate encapsulating devices
To filter encapsulated traffic
✅ Correct Answer: To mirror traffic across routers
109. Which protocol is used for secure ERSPAN communications?
There is no secure ERSPAN
ERSPAN over TLS
ERSPAN over SSH
ERSPAN over IPSec
✅ Correct Answer: There is no secure ERSPAN
110. What is the primary purpose of NetFlow?
To collect network traffic statistics
To encrypt flow data
To authenticate flow collectors
To filter flow records
✅ Correct Answer: To collect network traffic statistics
The Eccouncil 312 38 Certified Network Defender certification is a globally recognized credential for IT professionals.
This practice test helps you prepare by covering key topics like hardware, networking, troubleshooting, and security.
Want more practice? Check out our other mock exams: