Pass the CertNexus CyberSec First Responder (CFR) CFR-410 Questions and answers with CertsForce

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

What term means that data is valid and not corrupt?

Options:

A.

Confidentiality


B.

Authorization


C.

Integrity


D.

Authentication


Questions # 2:

Traditional SIEM systems provide:

Options:

A.

Unknown Attacks Analysis User Behavior Analysis and Network Anomalies


B.

Aggregation, Normalization, Correlation, and Alerting.


C.

Static Malware Analysis, Dynamic Malware Analysis, and Hybrid Malware Analysis.


D.

Privileged Identity Management. Privileged Access Management, and Identity and Access Management.


Questions # 3:

A system administrator identifies unusual network traffic from outside the local network. Which of the following

is the BEST method for mitigating the threat?

Options:

A.

Malware scanning


B.

Port blocking


C.

Packet capturing


D.

Content filtering


Questions # 4:

A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future?

Options:

A.

Intrusion prevention system (IPS)


B.

Intrusion detection system (IDS)


C.

Blacklisting


D.

Whitelisting


Questions # 5:

Which three tools are used for integrity verification of files? (Choose three.)

Options:

A.

sha256sum


B.

ent


C.

pgp32


D.

md5sum


E.

md5deep


Questions # 6:

Which of the following tools can be used as an intrusion detection system (IDS)? (Choose three.)

Options:

A.

Bro


B.

Wireshark/tshark


C.

Metasploit


D.

Suricata


E.

Snort


Questions # 7:

The statement of applicability (SOA) document forms a fundamental part of which framework?

Options:

A.

Generally Accepted Privacy Principles (GAPP)


B.

HIPAA


C.

NIST Privacy Framework


D.

ISO/IEC 27000 series


Questions # 8:

Which three disk image formats are used for evidence collection and preservation? (Choose three.)

Options:

A.

RAW(DD)


B.

E01


C.

AFF


D.

APFS


E.

EXT4


Questions # 9:

Nmap is a tool most commonly used to:

Options:

A.

Map a route for war-driving


B.

Determine who is logged onto a host


C.

Perform network and port scanning


D.

Scan web applications


Questions # 10:

Which of the following can be used as a vulnerability management and assessment tool?

Options:

A.

Nessus


B.

THC Hydra


C.

Cain & Abel


D.

John the Ripper


Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions