Special Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CFR-410 Sample Questions Answers

Questions 4

Which of the following describes United States federal government cybersecurity policies and guidelines?

Options:

A.

NIST

B.

ANSI

C.

NERC

D.

GDPR

Buy Now
Questions 5

Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.)

Options:

A.

Increases browsing speed

B.

Filters unwanted content

C.

Limits direct connection to Internet

D.

Caches frequently-visited websites

E.

Decreases wide area network (WAN) traffic

Buy Now
Questions 6

An administrator investigating intermittent network communication problems has identified an excessive amount of traffic from an external-facing host to an unknown location on the Internet. Which of the following

BEST describes what is occurring?

Options:

A.

The network is experiencing a denial of service (DoS) attack.

B.

A malicious user is exporting sensitive data.

C.

Rogue hardware has been installed.

D.

An administrator has misconfigured a web proxy.

Buy Now
Questions 7

A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future?

Options:

A.

Intrusion prevention system (IPS)

B.

Intrusion detection system (IDS)

C.

Blacklisting

D.

Whitelisting

Buy Now
Questions 8

A security analyst needs to capture network traffic from a compromised Mac host. They attempt to execute the tcpdump command using their general user account but continually receive an "Operation Not Permitted" error.

Use of which of the following commands will allow the analyst to capture traffic using tcpdump successfully?

Options:

A.

sudo

B.

netstat

C.

chroot

D.

chmod

E.

lsof

Buy Now
Questions 9

Malicious code designed to execute in concurrence with a particular event is BEST defined as which of the following?

Options:

A.

Logic bomb

B.

Rootkit

C.

Trojan

D.

Backdoor

Buy Now
Questions 10

What is the primary role of an intrusion detection system (IDS) on a network?

Options:

A.

Blocking malicious packets

B.

Detection of possible threats

C.

Detection of network vulnerabilities

D.

Detection of system failures

Buy Now
Questions 11

After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing. Which of the following tools should the analyst use?

Options:

A.

md5sum

B.

sha256sum

C.

md5deep

D.

hashdeep

Buy Now
Questions 12

Detailed step-by-step instructions to follow during a security incident are considered:

Options:

A.

Policies

B.

Guidelines

C.

Procedures

D.

Standards

Buy Now
Questions 13

When performing a vulnerability assessment from outside the perimeter, which of the following network devices is MOST likely to skew the scan results?

Options:

A.

Access Point

B.

Router

C.

Firewall

D.

IDS

E.

Switch

Buy Now
Questions 14

It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)

Options:

A.

Power resources

B.

Network resources

C.

Disk resources

D.

Computing resources

E.

Financial resources

Buy Now
Questions 15

A company is reviewing the results of the Nikto scan, and they determined that several internal web servers (likely associated with internal web applications) have a number of vulnerabilities. They also noticed several servers that have returned click-jacking vulnerabilities. Which option should be used to remediate this issue?

Options:

A.

Update the SSL server certificate.

B.

Upgrade the SSL version.

C.

Modify the SSL cipher configuration.

D.

Modify the HTTP X-Frame-Options.

Buy Now
Questions 16

An unauthorized network scan may be detected by parsing network sniffer data for:

Options:

A.

IP traffic from a single IP address to multiple IP addresses.

B.

IP traffic from a single IP address to a single IP address.

C.

IP traffic from multiple IP addresses to a single IP address.

D.

IP traffic from multiple IP addresses to other networks.

Buy Now
Questions 17

Windows Server 2016 log files can be found in which of the following locations?

Options:

A.

C:\Windows\System\winevt\Logs

B.

C:\Windows\winevt\System32\Logs

C.

C:\Windows\System32\winevt\Logs

D.

C:\Windows\winevt\System\Logs

Buy Now
Questions 18

What are the two most appropriate binary analysis techniques to use in digital forensics analysis? (Choose two.)

Options:

A.

Injection Analysis

B.

Forensic Analysis

C.

Static Analysis

D.

Dynamic Analysis

Buy Now
Questions 19

When reviewing log files from a recent incident, the response team discovers that most of the network-based indicators are IP-based. It would be helpful to the response team if they could resolve those IP-based indicators to hostnames. Which of the following is BEST suited for this task?

Options:

A.

DNS

B.

RIP

C.

WINS

D.

NTP

E.

NFS

Buy Now
Questions 20

The statement of applicability (SOA) document forms a fundamental part of which framework?

Options:

A.

Generally Accepted Privacy Principles (GAPP)

B.

HIPAA

C.

NIST Privacy Framework

D.

ISO/IEC 27000 series

Buy Now
Questions 21

Which of the following is BEST suited to prevent piggybacking into a sensitive or otherwise restricted area of a facility?

Options:

A.

Mantrap

B.

PIN

C.

Biometric controls

D.

ID Card

Buy Now
Questions 22

According to company policy, all accounts with administrator privileges should have suffix _ja. While reviewing Windows workstation configurations, a security administrator discovers an account without the suffix in the administrator’s group. Which of the following actions should the security administrator take?

Options:

A.

Review the system log on the affected workstation.

B.

Review the security log on a domain controller.

C.

Review the system log on a domain controller.

D.

Review the security log on the affected workstation.

Buy Now
Questions 23

Which of the following attack vectors capitalizes on a previously undisclosed issue with a software application?

Options:

A.

Zero-Day Exploit

B.

Brute Force

C.

Misconfiguration

D.

Ransomware

E.

Phishing

Buy Now
Questions 24

While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization’s server. The analyst would like to investigate and compare contents of the current file with

archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?

Options:

A.

cat * | cut –d ‘,’ –f 2,5,7

B.

more * | grep

C.

diff

D.

sort *

Buy Now
Questions 25

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

Options:

A.

Changing the default password

B.

Updating the device firmware

C.

Setting up new users

D.

Disabling IPv6

E.

Enabling the firewall

Buy Now
Questions 26

An organization wants to deploy a network security tool to alert them but not block malicious activity and network traffic. Which of the following tools would BEST meet the organization's needs?

Options:

A.

IPS

B.

IDS

C.

Firewall

D.

EDR

Buy Now
Questions 27

A security administrator notices a process running on their local workstation called SvrsScEsdKexzCv.exe.

The unknown process is MOST likely:

Options:

A.

Malware

B.

A port scanner

C.

A system process

D.

An application process

Buy Now
Questions 28

Nmap is a tool most commonly used to:

Options:

A.

Map a route for war-driving

B.

Determine who is logged onto a host

C.

Perform network and port scanning

D.

Scan web applications

Buy Now
Questions 29

An incident responder has collected network capture logs in a text file, separated by five or more data fields.

Which of the following is the BEST command to use if the responder would like to print the file (to terminal/ screen) in numerical order?

Options:

A.

cat | tac

B.

more

C.

sort –n

D.

less

Buy Now
Questions 30

An incident at a government agency has occurred and the following actions were taken:

-Users have regained access to email accounts

-Temporary VPN services have been removed

-Host-based intrusion prevention system (HIPS) and antivirus (AV) signatures have been updated

-Temporary email servers have been decommissioned

Which of the following phases of the incident response process match the actions taken?

Options:

A.

Containment

B.

Post-incident

C.

Recovery

D.

Identification

Buy Now
Questions 31

A Windows system administrator has received notification from a security analyst regarding new malware that executes under the process name of “armageddon.exe” along with a request to audit all department workstations for its presence. In the absence of GUI-based tools, what command could the administrator execute to complete this task?

Options:

A.

ps -ef | grep armageddon

B.

top | grep armageddon

C.

wmic process list brief | find “armageddon.exe”

D.

wmic startup list full | find “armageddon.exe”

Buy Now
Questions 32

A security analyst is required to collect detailed network traffic on a virtual machine. Which of the following tools could the analyst use?

Options:

A.

nbtstat

B.

WinDump

C.

fport

D.

netstat

Buy Now
Questions 33

Which of the following is a cybersecurity solution for insider threats to strengthen information protection?

Options:

A.

Web proxy

B.

Data loss prevention (DLP)

C.

Anti-malware

D.

Intrusion detection system (IDS)

Buy Now
Questions 34

ABC Company uses technical compliance tests to verify that its IT systems are configured according to organizational information security policies, standards, and guidelines. Which two tools and controls can ABC Company use to verify that its IT systems are configured accordingly? (Choose two.)

Options:

A.

Implementing Automated Key Management Procedures

B.

Implementing Automated Human Resource Procedures

C.

Performing Vulnerability Assessments and Penetration Testing

D.

Implementing Baseline Configuration Security Controls

Buy Now
Questions 35

Vulnerability scanners generally classify vulnerabilities by which of the following? (Choose two.)

Options:

A.

Exploit range

B.

Costs

C.

Severity level

D.

Zero days

E.

Threat modeling

Buy Now
Questions 36

Network infrastructure has been scanned and the identified issues have been remediated. What is the next step in the vulnerability assessment process?

Options:

A.

Generating reports

B.

Establishing scope

C.

Conducting an audit

D.

Assessing exposures

Buy Now
Questions 37

Which of the following can increase an attack surface?

Options:

A.

Old or unused code

B.

Vulnerability scanning

C.

Mapping of an attack surface

D.

Penetration scanning

Buy Now
Questions 38

What term means that data is valid and not corrupt?

Options:

A.

Confidentiality

B.

Authorization

C.

Integrity

D.

Authentication

Buy Now
Questions 39

A security operations center (SOC) analyst observed an unusually high number of login failures on a particular database server. The analyst wants to gather supporting evidence before escalating the observation to management. Which of the following expressions will provide login failure data for 11/24/2015?

Options:

A.

grep 20151124 security_log | grep –c “login failure”

B.

grep 20150124 security_log | grep “login_failure”

C.

grep 20151124 security_log | grep “login”

D.

grep 20151124 security_log | grep –c “login”

Buy Now
Questions 40

Various logs are collected for a data leakage case to make a forensic analysis. Which of the following are

MOST important for log integrity? (Choose two.)

Options:

A.

Hash value

B.

Time stamp

C.

Log type

D.

Modified date/time

E.

Log path

Buy Now
Questions 41

Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?

Options:

A.

There may be duplicate computer names on the network.

B.

The computer name may not be admissible evidence in court.

C.

Domain Name System (DNS) records may have changed since the log was created.

D.

There may be field name duplication when combining log files.

Buy Now
Questions 42

Traditional SIEM systems provide:

Options:

A.

Unknown Attacks Analysis User Behavior Analysis and Network Anomalies

B.

Aggregation, Normalization, Correlation, and Alerting.

C.

Static Malware Analysis, Dynamic Malware Analysis, and Hybrid Malware Analysis.

D.

Privileged Identity Management. Privileged Access Management, and Identity and Access Management.

Buy Now
Questions 43

After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?

Options:

A.

Covert channels

B.

File sharing services

C.

Steganography

D.

Rogue service

Buy Now
Questions 44

In a Linux operating system, what kind of information does a /var/log/daemon.log file contain?

Options:

A.

Debug-related messages

B.

Various system background processes

C.

System messages

D.

User password

Buy Now
Questions 45

Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?

Options:

A.

Application

B.

Users

C.

Network infrastructure

D.

Configuration files

Buy Now
Questions 46

Which of the following backup strategies will result in the shortest backup time during weekdays and use the least amount of storage space but incur the longest restore time?

Options:

A.

Full weekly backup with daily differential backups.

B.

Mirror backups on a daily basis.

C.

Full backups on a daily basis.

D.

Full weekly backup with daily incremental backups.

Buy Now
Questions 47

Tcpdump is a tool that can be used to detect which of the following indicators of compromise?

Options:

A.

Unusual network traffic

B.

Unknown open ports

C.

Poor network performance

D.

Unknown use of protocols

Buy Now
Questions 48

A system administrator identifies unusual network traffic from outside the local network. Which of the following

is the BEST method for mitigating the threat?

Options:

A.

Malware scanning

B.

Port blocking

C.

Packet capturing

D.

Content filtering

Buy Now
Questions 49

A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?

Options:

A.

tr -d

B.

uniq -c

C.

wc -m

D.

grep -c

Buy Now
Questions 50

A secretary receives an email from a friend with a picture of a kitten in it. The secretary forwards it to the

~COMPANYWIDE mailing list and, shortly thereafter, users across the company receive the following message:

“You seem tense. Take a deep breath and relax!”

The incident response team is activated and opens the picture in a virtual machine to test it. After a short analysis, the following code is found in C:

\Temp\chill.exe:Powershell.exe –Command “do {(for /L %i in (2,1,254) do shutdown /r /m Error! Hyperlink reference not valid.> /f /t / 0 (/c “You seem tense. Take a deep breath and relax!”);Start-Sleep –s 900) } while(1)”

Which of the following BEST represents what the attacker was trying to accomplish?

Options:

A.

Taunt the user and then trigger a shutdown every 15 minutes.

B.

Taunt the user and then trigger a reboot every 15 minutes.

C.

Taunt the user and then trigger a shutdown every 900 minutes.

D.

Taunt the user and then trigger a reboot every 900 minutes.

Buy Now
Questions 51

Which of the following regulations is most applicable to a public utility provider operating in the United States?

Options:

A.

GDPR

B.

NERC

C.

FISMA

D.

HIPAA

Buy Now
Questions 52

Which three tools are used for integrity verification of files? (Choose three.)

Options:

A.

sha256sum

B.

ent

C.

pgp32

D.

md5sum

E.

md5deep

Buy Now
Questions 53

When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use?

Options:

A.

findstr

B.

grep

C.

awk

D.

sigverif

Buy Now
Questions 54

Which two options represent the most basic methods for designing a DMZ network firewall? (Choose two.)

Options:

A.

Software firewall

B.

Single firewall

C.

Triple firewall

D.

Dual firewall

Buy Now
Exam Code: CFR-410
Exam Name: CyberSec First Responder (CFR) Exam
Last Update: Mar 30, 2025
Questions: 180
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CFR-410