Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

CyberSec First Responder (CFR) Exam Question and Answers

CyberSec First Responder (CFR) Exam

Last Update Nov 30, 2025
Total Questions : 180

We are offering FREE CFR-410 CertNexus exam questions. All you do is to just go and sign up. Give your details, prepare CFR-410 free exam questions and then go for complete pool of CyberSec First Responder (CFR) Exam test questions that will help you more.

CFR-410 pdf

CFR-410 PDF

$36.75  $104.99
CFR-410 Engine

CFR-410 Testing Engine

$43.75  $124.99
CFR-410 PDF + Engine

CFR-410 PDF + Testing Engine

$57.75  $164.99
Questions 1

Recently, a cybersecurity research lab discovered that there is a hacking group focused on hacking into the computers of financial executives in Company A to sell the exfiltrated information to Company B. Which of the

following threat motives does this MOST likely represent?

Options:

A.  

Desire for power

B.  

Association/affiliation

C.  

Reputation/recognition

D.  

Desire for financial gain

Discussion 0
Questions 2

A security administrator notices a process running on their local workstation called SvrsScEsdKexzCv.exe.

The unknown process is MOST likely:

Options:

A.  

Malware

B.  

A port scanner

C.  

A system process

D.  

An application process

Discussion 0
Questions 3

Which two mitigation strategies can prevent an attack delivered via malware? (Choose two.)

Options:

A.  

Daily backups

B.  

Raising user awareness

C.  

Implementing IDS

D.  

Application patching

E.  

Multi-factor authentication

Discussion 0
Questions 4

Which of the following can increase an attack surface?

Options:

A.  

Old or unused code

B.  

Vulnerability scanning

C.  

Mapping of an attack surface

D.  

Penetration scanning

Discussion 0
Questions 5

Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)

Options:

A.  

Default port state

B.  

Default credentials

C.  

Default protocols

D.  

Default encryption

E.  

Default IP address

Discussion 0
Questions 6

Detailed step-by-step instructions to follow during a security incident are considered:

Options:

A.  

Policies

B.  

Guidelines

C.  

Procedures

D.  

Standards

Discussion 0
Questions 7

Which three answer options are password attack methods and techniques? (Choose three.)

Options:

A.  

Cross-Site Scripting attack

B.  

Brute force attack

C.  

Man-in-the-middle attack

D.  

Hybrid attack

E.  

Dictionary attack

Discussion 0
Questions 8

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

Options:

A.  

Stealth scanning

B.  

Xmas scanning

C.  

FINS scanning

D.  

Port scanning

Discussion 0
Questions 9

Which of the following is a method of reconnaissance in which a ping is sent to a target with the expectation of receiving a response?

Options:

A.  

Active scanning

B.  

Passive scanning

C.  

Network enumeration

D.  

Application enumeration

Discussion 0
Questions 10

During recovery from an incident, which three options should a company focus on? (Choose three.)

Options:

A.  

Evaluating the success of the current incident response plan

B.  

Ensuring proper notifications have been made

C.  

Providing details of the breach to media

D.  

Identifying the responsible parties

E.  

Restoring system and network connectivity

F.  

Determining the financial impact of the breach

Discussion 0
Questions 11

An administrator believes that a system on VLAN 12 is Address Resolution Protocol (ARP) poisoning clients on the network. The administrator attaches a system to VLAN 12 and uses Wireshark to capture traffic. After

reviewing the capture file, the administrator finds no evidence of ARP poisoning. Which of the following actions should the administrator take next?

Options:

A.  

Clear the ARP cache on their system.

B.  

Enable port mirroring on the switch.

C.  

Filter Wireshark to only show ARP traffic.

D.  

Configure the network adapter to promiscuous mode.

Discussion 0
Questions 12

A Windows system administrator has received notification from a security analyst regarding new malware that executes under the process name of “armageddon.exe” along with a request to audit all department workstations for its presence. In the absence of GUI-based tools, what command could the administrator execute to complete this task?

Options:

A.  

ps -ef | grep armageddon

B.  

top | grep armageddon

C.  

wmic process list brief | find “armageddon.exe”

D.  

wmic startup list full | find “armageddon.exe”

Discussion 0
Questions 13

In which of the following attack phases would an attacker use Shodan?

Options:

A.  

Scanning

B.  

Reconnaissance

C.  

Gaining access

D.  

Persistence

Discussion 0
Questions 14

Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?

Options:

A.  

There may be duplicate computer names on the network.

B.  

The computer name may not be admissible evidence in court.

C.  

Domain Name System (DNS) records may have changed since the log was created.

D.  

There may be field name duplication when combining log files.

Discussion 0
Questions 15

A security analyst is required to collect detailed network traffic on a virtual machine. Which of the following tools could the analyst use?

Options:

A.  

nbtstat

B.  

WinDump

C.  

fport

D.  

netstat

Discussion 0
Questions 16

Which of the following backup strategies will result in the shortest backup time during weekdays and use the least amount of storage space but incur the longest restore time?

Options:

A.  

Full weekly backup with daily differential backups.

B.  

Mirror backups on a daily basis.

C.  

Full backups on a daily basis.

D.  

Full weekly backup with daily incremental backups.

Discussion 0
Questions 17

A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:

-Running antivirus scans on the affected user machines

-Checking department membership of affected users

-Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts

-Checking network monitoring tools for anomalous activities

Which of the following phases of the incident response process match the actions taken?

Options:

A.  

Identification

B.  

Preparation

C.  

Recovery

D.  

Containment

Discussion 0
Questions 18

Which two answer options are the BEST reasons to conduct post-incident reviews after an incident occurs in an organization? (Choose two.)

Options:

A.  

To help leverage automated scanning tools and ad hoc tests

B.  

To help identify lessons learned and follow-up action.

C.  

To help identify event detection information.

D.  

To help prevent an incident recurrence.

Discussion 0
Questions 19

Which of the following regulations is most applicable to a public utility provider operating in the United States?

Options:

A.  

GDPR

B.  

NERC

C.  

FISMA

D.  

HIPAA

Discussion 0
Questions 20

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

Options:

A.  

Changing the default password

B.  

Updating the device firmware

C.  

Setting up new users

D.  

Disabling IPv6

E.  

Enabling the firewall

Discussion 0
Questions 21

If an organization suspects criminal activity during the response to an incident, when should they notify law enforcement authorities?

Options:

A.  

After one day of network downtime.

B.  

According to a pre-defined cost threshold.

C.  

As soon as criminal activity is suspected.

D.  

After the criminal activity is confirmed.

Discussion 0
Questions 22

Which asset would be the MOST desirable for a financially motivated attacker to obtain from a health insurance company?

Options:

A.  

Transaction logs

B.  

Intellectual property

C.  

PII/PHI

D.  

Network architecture

Discussion 0
Questions 23

An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?

Options:

A.  

Password sniffing

B.  

Brute force attack

C.  

Rainbow tables

D.  

Dictionary attack

Discussion 0
Questions 24

A government organization responsible for critical infrastructure is being attacked and files on the server been deleted. Which of the following are the most immediate communications that should be made regarding the incident? (Choose two.)

Options:

A.  

Notifying law enforcement

B.  

Notifying the media

C.  

Notifying a national compute emergency response team (CERT) or cybersecurity incident response team (CSIRT)

D.  

Notifying the relevant vendor

E.  

Notifying a mitigation expert

Discussion 0
Questions 25

Which of the following security best practices should a web developer reference when developing a new web- based application?

Options:

A.  

Control Objectives for Information and Related Technology (COBIT)

B.  

Risk Management Framework (RMF)

C.  

World Wide Web Consortium (W3C)

D.  

Open Web Application Security Project (OWASP)

Discussion 0
Questions 26

It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)

Options:

A.  

Power resources

B.  

Network resources

C.  

Disk resources

D.  

Computing resources

E.  

Financial resources

Discussion 0
Questions 27

During an incident, the following actions have been taken:

-Executing the malware in a sandbox environment

-Reverse engineering the malware

-Conducting a behavior analysis

Based on the steps presented, which of the following incident handling processes has been taken?

Options:

A.  

Containment

B.  

Eradication

C.  

Recovery

D.  

Identification

Discussion 0
Questions 28

Nmap is a tool most commonly used to:

Options:

A.  

Map a route for war-driving

B.  

Determine who is logged onto a host

C.  

Perform network and port scanning

D.  

Scan web applications

Discussion 0
Questions 29

The incident response team has completed root cause analysis for an incident. Which of the following actions should be taken in the next phase of the incident response process? (Choose two.)

Options:

A.  

Providing a briefing to management

B.  

Updating policies and procedures

C.  

Training staff for future incidents

D.  

Investigating responsible staff

E.  

Drafting a recovery plan for the incident

Discussion 0
Questions 30

A Linux system administrator found suspicious activity on host IP 192.168.10.121. This host is also establishing a connection to IP 88.143.12.123. Which of the following commands should the administrator use to capture only the traffic between the two hosts?

Options:

A.  

# tcpdump -i eth0 host 88.143.12.123

B.  

# tcpdump -i eth0 dst 88.143.12.123

C.  

# tcpdump -i eth0 host 192.168.10.121

D.  

# tcpdump -i eth0 src 88.143.12.123

Discussion 0
Questions 31

Which standard was implemented in the United States to protect the privacy of patient medical information through restricted access to medical records and regulations for sharing medical records?

Options:

A.  

NIST

B.  

GLBA

C.  

SOX

D.  

HIPAA

Discussion 0
Questions 32

Which two answer options correctly highlight the difference between static and dynamic binary analysis techniques? (Choose two.)

Options:

A.  

Dynamic analysis tells everything the program can do. and static analysis tells exactly what the program does when it is executed in a given environment and with a particular input.

B.  

Static analysis tells everything the program can do. and dynamic analysis tells exactly what the program does when it is executed in a given environment and with a particular input.

C.  

Dynamic analysis examines the binary without executing it, while static analysis executes the program and observes its behavior.

D.  

Static analysis examines the binary without executing it. while dynamic analysis executes the program and observes its behavior.

Discussion 0
Questions 33

A security analyst needs to capture network traffic from a compromised Mac host. They attempt to execute the tcpdump command using their general user account but continually receive an "Operation Not Permitted" error.

Use of which of the following commands will allow the analyst to capture traffic using tcpdump successfully?

Options:

A.  

sudo

B.  

netstat

C.  

chroot

D.  

chmod

E.  

lsof

Discussion 0
Questions 34

A forensic analyst has been tasked with analyzing disk images with file extensions such as .001, .002, etc. Which of the following disk imaging tools was MOST LIKELY used to create these image files?

Options:

A.  

Encase

B.  

ExifTool

C.  

SIFT

D.  

FTK

E.  

dd

Discussion 0
Questions 35

Which of the following sources is best suited for monitoring threats and vulnerabilities?

Options:

A.  

QVVASP

B.  

CVE

C.  

DISA STIG

D.  

SANS

Discussion 0
Questions 36

Which of the following are components of Security Content Automation Protocol (SCAP)?

Options:

A.  

CVM, NVD, and OSVDB

B.  

CVE, CVSS, and OSVDB

C.  

CVE, CVSS, and OVAL

D.  

CWE, CWSS, and OVAL

Discussion 0
Questions 37

What are three examples of incident response? (Choose three.)

Options:

A.  

Dealing with systems that are suspected to be used to commit a crime

B.  

Collecting data from computer media

C.  

Dealing with systems suspected to be the victim of a crime

D.  

Analyzing a system

E.  

Threat Modeling

Discussion 0
Questions 38

An incident responder has collected network capture logs in a text file, separated by five or more data fields.

Which of the following is the BEST command to use if the responder would like to print the file (to terminal/ screen) in numerical order?

Options:

A.  

cat | tac

B.  

more

C.  

sort –n

D.  

less

Discussion 0
Questions 39

During an audit, an organization's ability to establish key performance indicators for its service hosting solution is discovered to be weak. What could be the cause of this?

Options:

A.  

Improper deployment of the Service-Oriented Architecture

B.  

Insufficient Service Level Agreement (SLA)

C.  

Absence of a Business Intelligence (Bl) solution

D.  

Inadequate Cost Modeling (CM)

Discussion 0
Questions 40

Which of the following is a cybersecurity solution for insider threats to strengthen information protection?

Options:

A.  

Web proxy

B.  

Data loss prevention (DLP)

C.  

Anti-malware

D.  

Intrusion detection system (IDS)

Discussion 0
Questions 41

Which are successful Disaster Recovery Plan best practices options to be considered? (Choose three.)

Options:

A.  

Isolate the services and data as much as possible.

B.  

Back up to a NAS device that is attached 24 hours a day, 7 days a week.

C.  

Understand which processes are critical to the business and have to run in disaster recovery.

D.  

Maintain integrity between primary and secondary deployments.

E.  

Store any data elements in the root storage that is used for root access for the workspace.

Discussion 0
Questions 42

Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)

Options:

A.  

Installing patches

B.  

Updating configurations

C.  

Documenting exceptions

D.  

Conducting audits

E.  

Generating reports

Discussion 0
Questions 43

Which of the following technologies would reduce the risk of a successful SQL injection attack?

Options:

A.  

Reverse proxy

B.  

Web application firewall

C.  

Stateful firewall

D.  

Web content filtering

Discussion 0
Questions 44

Which of the following, when exposed together, constitutes PII? (Choose two.)

Options:

A.  

Full name

B.  

Birth date

C.  

Account balance

D.  

Marital status

E.  

Employment status

Discussion 0
Questions 45

A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST

likely used by the analyst for the initial discovery?

Options:

A.  

syslog

B.  

MSConfig

C.  

Event Viewer

D.  

Process Monitor

Discussion 0
Questions 46

When performing a vulnerability assessment from outside the perimeter, which of the following network devices is MOST likely to skew the scan results?

Options:

A.  

Access Point

B.  

Router

C.  

Firewall

D.  

IDS

E.  

Switch

Discussion 0
Questions 47

A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?

Options:

A.  

tr -d

B.  

uniq -c

C.  

wc -m

D.  

grep -c

Discussion 0
Questions 48

Which of the following does the command nmap –open 10.10.10.3 do?

Options:

A.  

Execute a scan on a single host, returning only open ports.

B.  

Execute a scan on a subnet, returning detailed information on open ports.

C.  

Execute a scan on a subnet, returning all hosts with open ports.

D.  

Execute a scan on a single host, returning open services.

Discussion 0
Questions 49

A system administrator pulls records from a database that only requires the use of their general user vs. domain admin account. Use of the general user account demonstrates which of the following concepts?

Options:

A.  

Discretionary Access Control

B.  

Separation of Duties

C.  

Least Privilege

D.  

Privileged Access Management

Discussion 0
Questions 50

Vulnerability scanners generally classify vulnerabilities by which of the following? (Choose two.)

Options:

A.  

Exploit range

B.  

Costs

C.  

Severity level

D.  

Zero days

E.  

Threat modeling

Discussion 0
Questions 51

Which of the following enables security personnel to have the BEST security incident recovery practices?

Options:

A.  

Crisis communication plan

B.  

Disaster recovery plan

C.  

Occupant emergency plan

D.  

Incident response plan

Discussion 0
Questions 52

What is the primary purpose of the "information security incident triage and processing function" in the (CSIRT) Computer Security Incident Response Team Services Framework?

Options:

A.  

To analyze and gain an understanding of a confirmed information security incident.

B.  

To initially review, categorize, prioritize, and process a reported information security incident.

C.  

To receive and process reports of potential information security incidents from constituents, Information Security Event Management services, or third parties.

D.  

To accept or receive information about an information security incident, as reported from constituents or third parties.

Discussion 0
Questions 53

When reviewing log files from a recent incident, the response team discovers that most of the network-based indicators are IP-based. It would be helpful to the response team if they could resolve those IP-based indicators to hostnames. Which of the following is BEST suited for this task?

Options:

A.  

DNS

B.  

RIP

C.  

WINS

D.  

NTP

E.  

NFS

Discussion 0
Questions 54

Which of the following could be useful to an organization that wants to test its incident response procedures without risking any system downtime?

Options:

A.  

Blue team exercise

B.  

Business continuity exercise

C.  

Tabletop exercise

D.  

Red team exercise

Discussion 0