Pass the CertNexus CyberSec First Responder (CFR) CFR-410 Questions and answers with CertsForce

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

What term means that data is valid and not corrupt?

Options:

A.

Confidentiality


B.

Authorization


C.

Integrity


D.

Authentication


Expert Solution
Questions # 2:

Traditional SIEM systems provide:

Options:

A.

Unknown Attacks Analysis User Behavior Analysis and Network Anomalies


B.

Aggregation, Normalization, Correlation, and Alerting.


C.

Static Malware Analysis, Dynamic Malware Analysis, and Hybrid Malware Analysis.


D.

Privileged Identity Management. Privileged Access Management, and Identity and Access Management.


Expert Solution
Questions # 3:

A system administrator identifies unusual network traffic from outside the local network. Which of the following

is the BEST method for mitigating the threat?

Options:

A.

Malware scanning


B.

Port blocking


C.

Packet capturing


D.

Content filtering


Expert Solution
Questions # 4:

A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future?

Options:

A.

Intrusion prevention system (IPS)


B.

Intrusion detection system (IDS)


C.

Blacklisting


D.

Whitelisting


Expert Solution
Questions # 5:

Which three tools are used for integrity verification of files? (Choose three.)

Options:

A.

sha256sum


B.

ent


C.

pgp32


D.

md5sum


E.

md5deep


Expert Solution
Questions # 6:

Which of the following tools can be used as an intrusion detection system (IDS)? (Choose three.)

Options:

A.

Bro


B.

Wireshark/tshark


C.

Metasploit


D.

Suricata


E.

Snort


Expert Solution
Questions # 7:

The statement of applicability (SOA) document forms a fundamental part of which framework?

Options:

A.

Generally Accepted Privacy Principles (GAPP)


B.

HIPAA


C.

NIST Privacy Framework


D.

ISO/IEC 27000 series


Expert Solution
Questions # 8:

Which three disk image formats are used for evidence collection and preservation? (Choose three.)

Options:

A.

RAW(DD)


B.

E01


C.

AFF


D.

APFS


E.

EXT4


Expert Solution
Questions # 9:

Nmap is a tool most commonly used to:

Options:

A.

Map a route for war-driving


B.

Determine who is logged onto a host


C.

Perform network and port scanning


D.

Scan web applications


Expert Solution
Questions # 10:

Which of the following can be used as a vulnerability management and assessment tool?

Options:

A.

Nessus


B.

THC Hydra


C.

Cain & Abel


D.

John the Ripper


Expert Solution
Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions