Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CFR-410 Sample Questions Answers

Questions 4

A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following

would be the BEST action to take to plan for this kind of attack in the future?

Options:

A.

Scanning email server for vulnerabilities

B.

Conducting security awareness training

C.

Hardening the Microsoft Exchange Server

D.

Auditing account password complexity

Buy Now
Questions 5

In which of the following attack phases would an attacker use Shodan?

Options:

A.

Scanning

B.

Reconnaissance

C.

Gaining access

D.

Persistence

Buy Now
Questions 6

Which of the following is a cybersecurity solution for insider threats to strengthen information protection?

Options:

A.

Web proxy

B.

Data loss prevention (DLP)

C.

Anti-malware

D.

Intrusion detection system (IDS)

Buy Now
Questions 7

Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)

Options:

A.

Installing patches

B.

Updating configurations

C.

Documenting exceptions

D.

Conducting audits

E.

Generating reports

Buy Now
Questions 8

A security administrator notices a process running on their local workstation called SvrsScEsdKexzCv.exe.

The unknown process is MOST likely:

Options:

A.

Malware

B.

A port scanner

C.

A system process

D.

An application process

Buy Now
Questions 9

A security administrator needs to review events from different systems located worldwide. Which of the

following is MOST important to ensure that logs can be effectively correlated?

Options:

A.

Logs should be synchronized to their local time zone.

B.

Logs should be synchronized to a common, predefined time source.

C.

Logs should contain the username of the user performing the action.

D.

Logs should include the physical location of the action performed.

Buy Now
Questions 10

Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?

Options:

A.

There may be duplicate computer names on the network.

B.

The computer name may not be admissible evidence in court.

C.

Domain Name System (DNS) records may have changed since the log was created.

D.

There may be field name duplication when combining log files.

Buy Now
Questions 11

Tcpdump is a tool that can be used to detect which of the following indicators of compromise?

Options:

A.

Unusual network traffic

B.

Unknown open ports

C.

Poor network performance

D.

Unknown use of protocols

Buy Now
Questions 12

Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?

Options:

A.

Application

B.

Users

C.

Network infrastructure

D.

Configuration files

Buy Now
Questions 13

An organization recently suffered a data breach involving a server that had Transmission Control Protocol (TCP) port 1433 inadvertently exposed to the Internet. Which of the following services was vulnerable?

Options:

A.

Internet Message Access Protocol (IMAP)

B.

Network Basic Input/Output System (NetBIOS)

C.

Database

D.

Network Time Protocol (NTP)

Buy Now
Questions 14

When attempting to determine which system or user is generating excessive web traffic, analysis of which of

the following would provide the BEST results?

Options:

A.

Browser logs

B.

HTTP logs

C.

System logs

D.

Proxy logs

Buy Now
Questions 15

Which of the following are legally compliant forensics applications that will detect an alternative data stream (ADS) or a file with an incorrect file extension? (Choose two.)

Options:

A.

Disk duplicator

B.

EnCase

C.

dd

D.

Forensic Toolkit (FTK)

E.

Write blocker

Buy Now
Questions 16

Which of the following attacks involves sending a large amount of spoofed User Datagram Protocol (UDP) traffic to a router’s broadcast address within a network?

Options:

A.

Land attack

B.

Fraggle attack

C.

Smurf attack

D.

Teardrop attack

Buy Now
Questions 17

According to Payment Card Industry Data Security Standard (PCI DSS) compliance requirements, an organization must retain logs for what length of time?

Options:

A.

3 months

B.

6 months

C.

1 year

D.

5 years

Buy Now
Questions 18

A security engineer is setting up security information and event management (SIEM). Which of the following log sources should the engineer include that will contain indicators of a possible web server compromise? (Choose two.)

Options:

A.

NetFlow logs

B.

Web server logs

C.

Domain controller logs

D.

Proxy logs

E.

FTP logs

Buy Now
Questions 19

Various logs are collected for a data leakage case to make a forensic analysis. Which of the following are

MOST important for log integrity? (Choose two.)

Options:

A.

Hash value

B.

Time stamp

C.

Log type

D.

Modified date/time

E.

Log path

Buy Now
Questions 20

The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)

Options:

A.

Wireless router

B.

Switch

C.

Firewall

D.

Access point

E.

Hub

Buy Now
Questions 21

When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use?

Options:

A.

findstr

B.

grep

C.

awk

D.

sigverif

Buy Now
Questions 22

A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:

-Running antivirus scans on the affected user machines

-Checking department membership of affected users

-Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts

-Checking network monitoring tools for anomalous activities

Which of the following phases of the incident response process match the actions taken?

Options:

A.

Identification

B.

Preparation

C.

Recovery

D.

Containment

Buy Now
Questions 23

An incident response team is concerned with verifying the integrity of security information and event

management (SIEM) events after being written to disk. Which of the following represents the BEST option for addressing this concern?

Options:

A.

Time synchronization

B.

Log hashing

C.

Source validation

D.

Field name consistency

Buy Now
Questions 24

During an incident, the following actions have been taken:

-Executing the malware in a sandbox environment

-Reverse engineering the malware

-Conducting a behavior analysis

Based on the steps presented, which of the following incident handling processes has been taken?

Options:

A.

Containment

B.

Eradication

C.

Recovery

D.

Identification

Buy Now
Questions 25

During a log review, an incident responder is attempting to process the proxy server’s log files but finds that

they are too large to be opened by any file viewer. Which of the following is the MOST appropriate technique to open and analyze these log files?

Options:

A.

Hex editor, searching

B.

tcpdump, indexing

C.

PE Explorer, indexing

D.

Notepad, searching

Buy Now
Questions 26

Which of the following is a method of reconnaissance in which a ping is sent to a target with the expectation of receiving a response?

Options:

A.

Active scanning

B.

Passive scanning

C.

Network enumeration

D.

Application enumeration

Buy Now
Questions 27

A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?

Options:

A.

tr -d

B.

uniq -c

C.

wc -m

D.

grep -c

Buy Now
Questions 28

If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

Options:

A.

Covering tracks

B.

Expanding access

C.

Gaining persistence

D.

Performing reconnaissance

Buy Now
Questions 29

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?

Options:

A.

System hardening techniques

B.

System optimization techniques

C.

Defragmentation techniques

D.

Anti-forensic techniques

Buy Now
Questions 30

A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST

likely used by the analyst for the initial discovery?

Options:

A.

syslog

B.

MSConfig

C.

Event Viewer

D.

Process Monitor

Buy Now
Exam Code: CFR-410
Exam Name: CyberSec First Responder
Last Update: Nov 15, 2024
Questions: 100
$64  $159.99
$48  $119.99
$40  $99.99
buy now CFR-410