EC-Council • CND
Validates the ability to protect, detect, and respond to network security threats, covering network perimeter protection, endpoint security, firewall and IDS/VPN configuration, network traffic analysis, vulnerability scanning, and incident response.
Questions
562
Duration
240 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The EC-Council Certified Network Defender (CND) is a vendor-neutral, skills-based certification that validates a professional's ability to protect, detect, respond to, and predict network security threats. Exam code 312-38, the certification covers a broad range of network defense disciplines including network perimeter protection, endpoint security across Windows, Linux, mobile, and IoT platforms, firewall and IDS/VPN configuration, network traffic and log analysis, vulnerability scanning, and incident response. The program was updated with a v4 exam blueprint effective April 10, 2024, which introduced new topic segmentation and refreshed domain content while maintaining the same exam format and eligibility criteria.
Built on the cybersecurity education framework established by the National Initiative of Cybersecurity Education (NICE) and mapped to Department of Defense (DoD) work roles for system and network administrators, CND emphasizes real-world, job-task-aligned competencies. The certification spans 20 knowledge domains that collectively address the full lifecycle of enterprise network defense — from administrative governance and compliance to cloud security, wireless security, threat intelligence, and business continuity. It holds accreditation from ANSI, GCHQ, and is approved under the DoD 8570/8140 directive.
CND is designed primarily for network and security professionals who are responsible for the day-to-day protection of enterprise network infrastructure. Core target roles include Network Administrators, Security Administrators, Network Security Engineers, Security Analysts, and Network Defense Technicians. The certification is also relevant to IT professionals transitioning into security-focused roles who already have a foundational understanding of networking.
The program is particularly well-suited for individuals working in environments requiring regulatory compliance or DoD-aligned security frameworks. Those seeking to formalize their hands-on network defense skills with a recognized credential, or professionals aiming to qualify for cybersecurity roles within U.S. government contractors and defense agencies, will find the CND especially applicable.
EC-Council does not impose formal academic prerequisites for the CND exam, but candidates must meet one of two eligibility paths. The first is to complete an official EC-Council-authorized CND training course, after which candidates may sit for the exam without further application. The second path allows candidates to attempt the exam without attending official training, provided they can demonstrate at least two years of work experience in the information security domain. Self-study candidates must submit an eligibility application form along with a non-refundable $100 USD processing fee.
In terms of recommended knowledge, candidates should have a solid understanding of TCP/IP networking fundamentals, familiarity with common network devices and protocols, and basic exposure to operating system administration (Windows and Linux). Prior experience with network monitoring tools, firewall configuration, or security operations will provide a meaningful advantage when preparing for the exam.
The CND certification exam (312-38) consists of 100 multiple-choice questions and must be completed within 4 hours (240 minutes). The exam is delivered through the EC-Council ECC Exam Portal and is available at authorized testing centers as well as via online proctoring. The passing score is set at 70%, though EC-Council notes that cut scores can range from 60% to 85% depending on the specific exam form administered, as each form is independently calibrated by subject matter experts to ensure consistent difficulty across versions.
The exam uses multiple exam forms with varied question banks to maintain exam integrity. There are no unscored pilot questions disclosed. Candidates who do not pass may retake the exam immediately for the second attempt using an ECC Exam Center voucher; a 14-day waiting period is enforced starting from the third attempt onward. The current exam is aligned to the CND v4 blueprint, which became effective on April 10, 2024.
The CND certification qualifies holders for network defense and security operations roles in both private industry and government sectors. Common job titles pursued after earning CND include Network Security Engineer, Security Operations Center (SOC) Analyst, Network Administrator (security-focused), and Information Systems Security Officer (ISSO). The certification satisfies DoD 8570.01-M/DoD 8140 requirements for IAT Level II roles, making it directly applicable for personnel seeking positions with U.S. federal agencies or defense contractors. The average salary for a network security engineer in the United States is approximately $125,000 per year.
Compared to alternatives such as CompTIA Security+ (broader but less network-defense-specific) or the Cisco CyberOps Associate (more SOC-focused), CND occupies a distinct niche in hands-on, defender-oriented network security. It complements offensive certifications like CEH and is often pursued alongside or as a precursor to more advanced credentials such as CISSP or CCNP Security. The certification's ANSI accreditation and GCHQ endorsement give it international recognition beyond the U.S. market.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 562 questions.
1. An organization implements quantitative risk assessment for their data center operations. A critical database server is valued at $500,000. A flood risk assessment determines that such an event would damage 40 percent of the server's value, and floods occur on average once every 10 years. What is the Annualized Loss Expectancy (ALE) for this risk? (Select one!)
Explanation
ALE is calculated using the formula: ALE = SLE × ARO. First calculate Single Loss Expectancy: SLE = Asset Value × Exposure Factor = $500,000 × 0.40 = $200,000. The Annualized Rate of Occurrence for a flood once every 10 years is ARO = 1/10 = 0.1. Therefore, ALE = $200,000 × 0.1 = $20,000 per year. This means the organization should expect to lose $20,000 annually due to flood risk. This quantitative value helps justify spending on risk mitigation controls, such as investing up to $20,000 per year in flood prevention measures.
2. A security operations center implements threat intelligence using the STIX and TAXII standards for automated indicator sharing with industry partners. The SOC needs to exchange threat indicators in real-time including IP addresses, domains, file hashes, and attack patterns. Which statement correctly describes the relationship between STIX and TAXII? (Select one!)
Explanation
TAXII is the transport protocol specification defining how threat intelligence data is exchanged between organizations using standardized API services and message formats. STIX is the data structure format specification defining how to represent threat intelligence information as structured JSON objects including indicators, observables, threat actors, and TTPs. The relationship is that TAXII provides the transport mechanism while STIX provides the payload format. Organizations use TAXII to transmit STIX-formatted threat intelligence. Reversing these roles is incorrect as STIX is not a transport protocol. STIX and TAXII are complementary standards designed to work together, not competing alternatives. Neither standard specifically handles encryption or digital signatures, which are implemented at the transport layer through TLS.
3. A managed service provider implements TACACS+ for centralized authentication and authorization of network device administration across customer environments. The security architect needs to understand the advantages of TACACS+ compared to RADIUS for this specific use case. Which two characteristics make TACACS+ more suitable for network device administration? (Select two!)
Multiple correct answersExplanation
TACACS+ encrypts the entire packet payload except the header, providing confidentiality for credentials and authorization data, whereas RADIUS only encrypts the password field. TACACS+ separates authentication, authorization, and accounting into distinct processes, enabling granular per-command authorization which is critical for network device administration to control exactly which commands administrators can execute. While TACACS+ does use TCP port 49, the reliability benefit is secondary to encryption and AAA separation for this use case. RADIUS uses UDP protocol, not TACACS+, so this is an incorrect characteristic. TACACS+ separates AAA functions rather than combining them, which is actually the RADIUS approach.
4. A web application developer implements session management for an e-commerce platform. To prevent session hijacking attacks, the security team requires implementing multiple cookie security attributes. Which combination of cookie attributes provides the strongest protection against XSS-based cookie theft and cross-site session attacks? (Select one!)
Explanation
The combination of Secure, HttpOnly, and SameSite=Strict provides comprehensive protection. Secure ensures cookies are only transmitted over HTTPS, preventing interception. HttpOnly prevents JavaScript access, blocking XSS-based cookie theft. SameSite=Strict restricts cookies to same-site requests, preventing CSRF attacks. Max-Age limits session lifetime. The second option lacks security attributes entirely. The third option omits Secure, allowing cookie transmission over unencrypted HTTP. The fourth option uses SameSite=None which explicitly allows cross-site cookie sending, defeating CSRF protection.
5. An organization implements a stateful firewall using iptables on a Linux gateway. The administrator needs to allow established connections while blocking new inbound connections except SSH from the management subnet 10.100.0.0/24. Which two iptables rules correctly implement this policy? (Select two!)
Multiple correct answersExplanation
The first rule allows all established and related connections using connection tracking, which is essential for stateful filtering. The second rule allows SSH connections specifically from the management subnet 10.100.0.0/24. These two rules together with a default DROP policy implement the requirements. The third rule would drop all new connections including the required SSH access. The fourth rule allows SSH from any source, violating the subnet restriction. The fifth rule sets the default policy to ACCEPT, which would allow all traffic and contradict the blocking requirement.
One-time access to this exam