Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CyberSec First Responder (CFR) Exam Question and Answers

CyberSec First Responder (CFR) Exam

Last Update Apr 28, 2024
Total Questions : 100

We are offering FREE CFR-410 CertNexus exam questions. All you do is to just go and sign up. Give your details, prepare CFR-410 free exam questions and then go for complete pool of CyberSec First Responder (CFR) Exam test questions that will help you more.

CFR-410 pdf

CFR-410 PDF

$35  $99.99
CFR-410 Engine

CFR-410 Testing Engine

$42  $119.99
CFR-410 PDF + Engine

CFR-410 PDF + Testing Engine

$56  $159.99
Questions 1

A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future?

Options:

A.  

Intrusion prevention system (IPS)

B.  

Intrusion detection system (IDS)

C.  

Blacklisting

D.  

Whitelisting

Discussion 0
Questions 2

An incident response team is concerned with verifying the integrity of security information and event

management (SIEM) events after being written to disk. Which of the following represents the BEST option for addressing this concern?

Options:

A.  

Time synchronization

B.  

Log hashing

C.  

Source validation

D.  

Field name consistency

Discussion 0
Questions 3

Which of the following security best practices should a web developer reference when developing a new web- based application?

Options:

A.  

Control Objectives for Information and Related Technology (COBIT)

B.  

Risk Management Framework (RMF)

C.  

World Wide Web Consortium (W3C)

D.  

Open Web Application Security Project (OWASP)

Discussion 0
Questions 4

An unauthorized network scan may be detected by parsing network sniffer data for:

Options:

A.  

IP traffic from a single IP address to multiple IP addresses.

B.  

IP traffic from a single IP address to a single IP address.

C.  

IP traffic from multiple IP addresses to a single IP address.

D.  

IP traffic from multiple IP addresses to other networks.

Discussion 0
Questions 5

A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

Options:

A.  

iptables -A INPUT -p tcp –dport 25 -d x.x.x.x -j ACCEPT

B.  

iptables -A INPUT -p tcp –sport 25 -d x.x.x.x -j ACCEPT

C.  

iptables -A INPUT -p tcp –dport 25 -j DROP

D.  

iptables -A INPUT -p tcp –destination-port 21 -j DROP

E.  

iptables -A FORWARD -p tcp –dport 6881:6889 -j DROP

Discussion 0
Questions 6

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

Options:

A.  

Changing the default password

B.  

Updating the device firmware

C.  

Setting up new users

D.  

Disabling IPv6

E.  

Enabling the firewall

Discussion 0
Questions 7

A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following

would be the BEST action to take to plan for this kind of attack in the future?

Options:

A.  

Scanning email server for vulnerabilities

B.  

Conducting security awareness training

C.  

Hardening the Microsoft Exchange Server

D.  

Auditing account password complexity

Discussion 0
Questions 8

Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage?

Options:

A.  

Cybercriminals

B.  

Hacktivists

C.  

State-sponsored hackers

D.  

Cyberterrorist

Discussion 0
Questions 9

A common formula used to calculate risk is:+ Threats + Vulnerabilities = Risk. Which of the following represents the missing factor in this formula?

Options:

A.  

Exploits

B.  

Security

C.  

Asset

D.  

Probability

Discussion 0
Questions 10

After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?

Options:

A.  

Covert channels

B.  

File sharing services

C.  

Steganography

D.  

Rogue service

Discussion 0
Questions 11

The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)

Options:

A.  

Wireless router

B.  

Switch

C.  

Firewall

D.  

Access point

E.  

Hub

Discussion 0
Questions 12

Various logs are collected for a data leakage case to make a forensic analysis. Which of the following are

MOST important for log integrity? (Choose two.)

Options:

A.  

Hash value

B.  

Time stamp

C.  

Log type

D.  

Modified date/time

E.  

Log path

Discussion 0
Questions 13

Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?

Options:

A.  

There may be duplicate computer names on the network.

B.  

The computer name may not be admissible evidence in court.

C.  

Domain Name System (DNS) records may have changed since the log was created.

D.  

There may be field name duplication when combining log files.

Discussion 0
Questions 14

A security administrator needs to review events from different systems located worldwide. Which of the

following is MOST important to ensure that logs can be effectively correlated?

Options:

A.  

Logs should be synchronized to their local time zone.

B.  

Logs should be synchronized to a common, predefined time source.

C.  

Logs should contain the username of the user performing the action.

D.  

Logs should include the physical location of the action performed.

Discussion 0
Questions 15

Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)

Options:

A.  

Default port state

B.  

Default credentials

C.  

Default protocols

D.  

Default encryption

E.  

Default IP address

Discussion 0